語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Privacy-Preserving in Edge Computing
~
Qu, Youyang.
Privacy-Preserving in Edge Computing
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Privacy-Preserving in Edge Computing/ by Longxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang.
作者:
Gao, Longxiang.
其他作者:
Xiang, Yong.
面頁冊數:
XII, 113 p. 59 illus., 39 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Computer Applications. -
電子資源:
https://doi.org/10.1007/978-981-16-2199-4
ISBN:
9789811621994
Privacy-Preserving in Edge Computing
Gao, Longxiang.
Privacy-Preserving in Edge Computing
[electronic resource] /by Longxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang. - 1st ed. 2021. - XII, 113 p. 59 illus., 39 illus. in color.online resource. - Wireless Networks,2366-1445. - Wireless Networks,.
Chapter 1 An Introduction to Edge Computing -- Chapter 2 Privacy Issues in Edge Computing.-Chapter 3 Context-Aware Privacy-Preserving in Edge Computing -- Chapter 4 Location-Aware Privacy Preserving in Edge Computing -- Chapter 5 Blockchain based Decentralized Privacy Preserving in Edge Computing -- Chapter 6 Conclusion and Future Research Issues.
With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requirements of various real-time mobile services. Therefore, the emergence of edge computing has been recently developed as a new computing paradigm that can collect and process data at the edge of the network, which brings significant convenience to solving problems such as delay, bandwidth, and off-loading in the traditional cloud computing paradigm. By extending the functions of the cloud to the edge of the network, edge computing provides effective data access control, computation, processing and storage for end devices. Furthermore, edge computing optimizes the seamless connection from the cloud to devices, which is considered the foundation for realizing the interconnection of everything. However, due to the open features of edge computing, such as content awareness, real-time computing and parallel processing, the existing problems of privacy in the edge computing environment have become more prominent. The access to multiple categories and large numbers of devices in edge computing also creates new privacy issues. In this book, we discuss on the research background and current research process of privacy protection in edge computing. In the first chapter, the state-of-the-art research of edge computing are reviewed. The second chapter discusses the data privacy issue and attack models in edge computing. Three categories of privacy preserving schemes will be further introduced in the following chapters. Chapter three introduces the context-aware privacy preserving scheme. Chapter four further introduces a location-aware differential privacy preserving scheme. Chapter five presents a new blockchain based decentralized privacy preserving in edge computing. Chapter six summarize this monograph and propose future research directions. In summary, this book introduces the following techniques in edge computing: 1) describe an MDP-based privacy-preserving model to solve context-aware data privacy in the hierarchical edge computing paradigm; 2) describe a SDN based clustering methods to solve the location-aware privacy problems in edge computing; 3) describe a novel blockchain based decentralized privacy-preserving scheme in edge computing. These techniques enable the rapid development of privacy-preserving in edge computing. .
ISBN: 9789811621994
Standard No.: 10.1007/978-981-16-2199-4doiSubjects--Topical Terms:
669785
Computer Applications.
LC Class. No.: TK5105.5-5105.9
Dewey Class. No.: 004.6
Privacy-Preserving in Edge Computing
LDR
:04271nam a22004095i 4500
001
1055125
003
DE-He213
005
20211125211837.0
007
cr nn 008mamaa
008
220103s2021 si | s |||| 0|eng d
020
$a
9789811621994
$9
978-981-16-2199-4
024
7
$a
10.1007/978-981-16-2199-4
$2
doi
035
$a
978-981-16-2199-4
050
4
$a
TK5105.5-5105.9
072
7
$a
UKN
$2
bicssc
072
7
$a
COM075000
$2
bisacsh
072
7
$a
UKN
$2
thema
082
0 4
$a
004.6
$2
23
100
1
$a
Gao, Longxiang.
$e
author.
$0
(orcid)0000-0002-3026-7537
$1
https://orcid.org/0000-0002-3026-7537
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1262517
245
1 0
$a
Privacy-Preserving in Edge Computing
$h
[electronic resource] /
$c
by Longxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang.
250
$a
1st ed. 2021.
264
1
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2021.
300
$a
XII, 113 p. 59 illus., 39 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Wireless Networks,
$x
2366-1445
505
0
$a
Chapter 1 An Introduction to Edge Computing -- Chapter 2 Privacy Issues in Edge Computing.-Chapter 3 Context-Aware Privacy-Preserving in Edge Computing -- Chapter 4 Location-Aware Privacy Preserving in Edge Computing -- Chapter 5 Blockchain based Decentralized Privacy Preserving in Edge Computing -- Chapter 6 Conclusion and Future Research Issues.
520
$a
With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requirements of various real-time mobile services. Therefore, the emergence of edge computing has been recently developed as a new computing paradigm that can collect and process data at the edge of the network, which brings significant convenience to solving problems such as delay, bandwidth, and off-loading in the traditional cloud computing paradigm. By extending the functions of the cloud to the edge of the network, edge computing provides effective data access control, computation, processing and storage for end devices. Furthermore, edge computing optimizes the seamless connection from the cloud to devices, which is considered the foundation for realizing the interconnection of everything. However, due to the open features of edge computing, such as content awareness, real-time computing and parallel processing, the existing problems of privacy in the edge computing environment have become more prominent. The access to multiple categories and large numbers of devices in edge computing also creates new privacy issues. In this book, we discuss on the research background and current research process of privacy protection in edge computing. In the first chapter, the state-of-the-art research of edge computing are reviewed. The second chapter discusses the data privacy issue and attack models in edge computing. Three categories of privacy preserving schemes will be further introduced in the following chapters. Chapter three introduces the context-aware privacy preserving scheme. Chapter four further introduces a location-aware differential privacy preserving scheme. Chapter five presents a new blockchain based decentralized privacy preserving in edge computing. Chapter six summarize this monograph and propose future research directions. In summary, this book introduces the following techniques in edge computing: 1) describe an MDP-based privacy-preserving model to solve context-aware data privacy in the hierarchical edge computing paradigm; 2) describe a SDN based clustering methods to solve the location-aware privacy problems in edge computing; 3) describe a novel blockchain based decentralized privacy-preserving scheme in edge computing. These techniques enable the rapid development of privacy-preserving in edge computing. .
650
2 4
$a
Computer Applications.
$3
669785
650
2 4
$a
Mobile and Network Security.
$3
1211619
650
2 4
$a
Mobile Computing.
$3
1115990
650
2 4
$a
Privacy.
$3
575491
650
1 4
$a
Computer Communication Networks.
$3
669310
650
0
$a
Application software.
$3
528147
650
0
$a
Computer networks
$x
Security measures.
$3
555385
650
0
$a
Mobile computing.
$3
562918
650
0
$a
Computer security.
$3
557122
650
0
$a
Computer communication systems.
$3
1115394
700
1
$a
Xiang, Yong.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1062830
700
1
$a
Qu, Youyang.
$e
author.
$0
(orcid)0000-0002-2944-4647
$1
https://orcid.org/0000-0002-2944-4647
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1353484
700
1
$a
Gu, Bruce.
$e
author.
$1
https://orcid.org/0000-0002-3008-6285
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1360279
700
1
$a
Luan, Tom H.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1262518
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811621987
776
0 8
$i
Printed edition:
$z
9789811622007
776
0 8
$i
Printed edition:
$z
9789811622014
830
0
$a
Wireless Networks,
$x
2366-1186
$3
1258208
856
4 0
$u
https://doi.org/10.1007/978-981-16-2199-4
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入