語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Privacy-Enhancing Fog Computing and ...
~
Lin, Xiaodong.
Privacy-Enhancing Fog Computing and Its Applications
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Privacy-Enhancing Fog Computing and Its Applications/ by Xiaodong Lin, Jianbing Ni, Xuemin (Sherman) Shen.
作者:
Lin, Xiaodong.
其他作者:
Ni, Jianbing.
面頁冊數:
XII, 89 p. 14 illus., 13 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Data protection. -
電子資源:
https://doi.org/10.1007/978-3-030-02113-9
ISBN:
9783030021139
Privacy-Enhancing Fog Computing and Its Applications
Lin, Xiaodong.
Privacy-Enhancing Fog Computing and Its Applications
[electronic resource] /by Xiaodong Lin, Jianbing Ni, Xuemin (Sherman) Shen. - 1st ed. 2018. - XII, 89 p. 14 illus., 13 illus. in color.online resource. - SpringerBriefs in Electrical and Computer Engineering,2191-8112. - SpringerBriefs in Electrical and Computer Engineering,.
1 Introduction -- 2 Privacy-enhancing Technologies -- 3 Identity Privacy Protection in Smart Parking Navigation -- 4 Location Privacy Protection in Mobile Crowdsensing -- 5 Data Privacy Protection in Smart Grid -- 6 Conclusions and Future Directions.
This SpringerBrief covers the security and privacy challenges in fog computing, and proposes a new secure and privacy-preserving mechanisms to resolve these challenges for securing fog-assisted IoT applications. Chapter 1 introduces the architecture of fog-assisted IoT applications and the security and privacy challenges in fog computing. Chapter 2 reviews several promising privacy-enhancing techniques and illustrates examples on how to leverage these techniques to enhance the privacy of users in fog computing. Specifically, the authors divide the existing privacy-enhancing techniques into three categories: identity-hidden techniques, location privacy protection and data privacy enhancing techniques. The research is of great importance since security and privacy problems faced by fog computing impede the healthy development of its enabled IoT applications. With the advanced privacy-enhancing techniques, the authors propose three secure and privacy-preserving protocols for fog computing applications, including smart parking navigation, mobile crowdsensing and smart grid. Chapter 3 introduces identity privacy leakage in smart parking navigation systems, and proposes a privacy-preserving smart parking navigation system to prevent identity privacy exposure and support efficient parking guidance retrieval through road-side units (fogs) with high retrieving probability and security guarantees. Chapter 4 presents the location privacy leakage, during task allocation in mobile crowdsensing, and propose a strong privacy-preserving task allocation scheme that enables location-based task allocation and reputation-based report selection without exposing knowledge about the location and reputation for participators in mobile crowdsensing. Chapter 5 introduces the data privacy leakage in smart grid, and proposes an efficient and privacy-preserving smart metering protocol to allow collectors (fogs) to achieve real-time measurement collection with privacy-enhanced data aggregation. Finally, conclusions and future research directions are given in Chapter 6. This brief validates the significant feature extension and efficiency improvement of IoT devices without sacrificing the security and privacy of users against dishonest fog nodes. It also provides valuable insights on the security and privacy protection for fog-enabled IoT applications. Researchers and professionals who carry out research on security and privacy in wireless communication will want to purchase this SpringerBrief. Also, advanced level students, whose main research area is mobile network security will also be interested in this SpringerBrief. .
ISBN: 9783030021139
Standard No.: 10.1007/978-3-030-02113-9doiSubjects--Topical Terms:
557764
Data protection.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Privacy-Enhancing Fog Computing and Its Applications
LDR
:04296nam a22003975i 4500
001
986995
003
DE-He213
005
20200706004643.0
007
cr nn 008mamaa
008
201225s2018 gw | s |||| 0|eng d
020
$a
9783030021139
$9
978-3-030-02113-9
024
7
$a
10.1007/978-3-030-02113-9
$2
doi
035
$a
978-3-030-02113-9
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Lin, Xiaodong.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1203516
245
1 0
$a
Privacy-Enhancing Fog Computing and Its Applications
$h
[electronic resource] /
$c
by Xiaodong Lin, Jianbing Ni, Xuemin (Sherman) Shen.
250
$a
1st ed. 2018.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2018.
300
$a
XII, 89 p. 14 illus., 13 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
SpringerBriefs in Electrical and Computer Engineering,
$x
2191-8112
505
0
$a
1 Introduction -- 2 Privacy-enhancing Technologies -- 3 Identity Privacy Protection in Smart Parking Navigation -- 4 Location Privacy Protection in Mobile Crowdsensing -- 5 Data Privacy Protection in Smart Grid -- 6 Conclusions and Future Directions.
520
$a
This SpringerBrief covers the security and privacy challenges in fog computing, and proposes a new secure and privacy-preserving mechanisms to resolve these challenges for securing fog-assisted IoT applications. Chapter 1 introduces the architecture of fog-assisted IoT applications and the security and privacy challenges in fog computing. Chapter 2 reviews several promising privacy-enhancing techniques and illustrates examples on how to leverage these techniques to enhance the privacy of users in fog computing. Specifically, the authors divide the existing privacy-enhancing techniques into three categories: identity-hidden techniques, location privacy protection and data privacy enhancing techniques. The research is of great importance since security and privacy problems faced by fog computing impede the healthy development of its enabled IoT applications. With the advanced privacy-enhancing techniques, the authors propose three secure and privacy-preserving protocols for fog computing applications, including smart parking navigation, mobile crowdsensing and smart grid. Chapter 3 introduces identity privacy leakage in smart parking navigation systems, and proposes a privacy-preserving smart parking navigation system to prevent identity privacy exposure and support efficient parking guidance retrieval through road-side units (fogs) with high retrieving probability and security guarantees. Chapter 4 presents the location privacy leakage, during task allocation in mobile crowdsensing, and propose a strong privacy-preserving task allocation scheme that enables location-based task allocation and reputation-based report selection without exposing knowledge about the location and reputation for participators in mobile crowdsensing. Chapter 5 introduces the data privacy leakage in smart grid, and proposes an efficient and privacy-preserving smart metering protocol to allow collectors (fogs) to achieve real-time measurement collection with privacy-enhanced data aggregation. Finally, conclusions and future research directions are given in Chapter 6. This brief validates the significant feature extension and efficiency improvement of IoT devices without sacrificing the security and privacy of users against dishonest fog nodes. It also provides valuable insights on the security and privacy protection for fog-enabled IoT applications. Researchers and professionals who carry out research on security and privacy in wireless communication will want to purchase this SpringerBrief. Also, advanced level students, whose main research area is mobile network security will also be interested in this SpringerBrief. .
650
0
$a
Data protection.
$3
557764
650
0
$a
Wireless communication systems.
$3
562740
650
0
$a
Mobile communication systems.
$3
562917
650
0
$a
Electrical engineering.
$3
596380
650
1 4
$a
Security.
$3
1114130
650
2 4
$a
Wireless and Mobile Communication.
$3
1207058
650
2 4
$a
Communications Engineering, Networks.
$3
669809
700
1
$a
Ni, Jianbing.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1211056
700
1
$a
Shen, Xuemin (Sherman).
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1024151
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030021122
776
0 8
$i
Printed edition:
$z
9783030021146
830
0
$a
SpringerBriefs in Electrical and Computer Engineering,
$x
2191-8112
$3
1253713
856
4 0
$u
https://doi.org/10.1007/978-3-030-02113-9
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入