Privacy-Preserving in Edge Computing (Wireless Networks) » MIRLIB.RU - ТВОЯ БИБЛИОТЕКА
Мировое искусство. Оптические иллюзии в живописи и графике Мировое искусство. Оптические иллюзии в живописи и графике Корабли Российского императорского флота (1892-1917) Корабли Российского императорского флота (1892-1917) Андрагогика: основы теории, истории и технологии обучения взрослых Андрагогика: основы теории, истории и технологии обучения взрослых Финансовое моделирование с использованием Excel Финансовое моделирование с использованием Excel Modeling and Simulation of Intelligent Transportation Systems Modeling and Simulation of Intelligent Transportation Systems Complete Starter Guide to Making Bread: From Buns to Baguettes, Essential Recipes for All Bakers Complete Starter Guide to Making Bread: From Buns to Baguettes, Essential Recipes for All Bakers Проблемы новой и новейшей истории Проблемы новой и новейшей истории British Nannies and the Great War British Nannies and the Great War Redcoats to Tommies: The Experience of the British Soldier from the Eighteenth Century Redcoats to Tommies: The Experience of the British Soldier from the Eighteenth Century Some of My Best Friends are Cookies: Over 80 recipes for the best cookies of your life Some of My Best Friends are Cookies: Over 80 recipes for the best cookies of your life Outlier Detection in Python (Final Release) Outlier Detection in Python (Final Release) Мифы о драконах. От змея-искусителя и лернейской гидры до скандинавского Фафнира и морского Левиафана Мифы о драконах. От змея-искусителя и лернейской гидры до скандинавского Фафнира и морского Левиафана Microsoft Copilot for Power Apps: Transforming App Development with AI Assistance Microsoft Copilot for Power Apps: Transforming App Development with AI Assistance Физико-химические расчеты. Возможности компьютерной математи­ки: учебное пособие Физико-химические расчеты. Возможности компьютерной математи­ки: учебное пособие Волшебство и вычисления: практическое пособие для начинающих фокусников и программистов Волшебство и вычисления: практическое пособие для начинающих фокусников и программистов Conjuring with Computation: A Manual of Magic and Computing for Beginners Conjuring with Computation: A Manual of Magic and Computing for Beginners
Мировое искусство. Оптические иллюзии в живописи и графике Мировое искусство. Оптические иллюзии в живописи и графике Корабли Российского императорского флота (1892-1917) Корабли Российского императорского флота (1892-1917) Андрагогика: основы теории, истории и технологии обучения взрослых Андрагогика: основы теории, истории и технологии обучения взрослых Финансовое моделирование с использованием Excel Финансовое моделирование с использованием Excel Modeling and Simulation of Intelligent Transportation Systems Modeling and Simulation of Intelligent Transportation Systems Complete Starter Guide to Making Bread: From Buns to Baguettes, Essential Recipes for All Bakers Complete Starter Guide to Making Bread: From Buns to Baguettes, Essential Recipes for All Bakers Проблемы новой и новейшей истории Проблемы новой и новейшей истории British Nannies and the Great War British Nannies and the Great War Redcoats to Tommies: The Experience of the British Soldier from the Eighteenth Century Redcoats to Tommies: The Experience of the British Soldier from the Eighteenth Century Some of My Best Friends are Cookies: Over 80 recipes for the best cookies of your life Some of My Best Friends are Cookies: Over 80 recipes for the best cookies of your life Outlier Detection in Python (Final Release) Outlier Detection in Python (Final Release) Мифы о драконах. От змея-искусителя и лернейской гидры до скандинавского Фафнира и морского Левиафана Мифы о драконах. От змея-искусителя и лернейской гидры до скандинавского Фафнира и морского Левиафана Microsoft Copilot for Power Apps: Transforming App Development with AI Assistance Microsoft Copilot for Power Apps: Transforming App Development with AI Assistance Физико-химические расчеты. Возможности компьютерной математи­ки: учебное пособие Физико-химические расчеты. Возможности компьютерной математи­ки: учебное пособие Волшебство и вычисления: практическое пособие для начинающих фокусников и программистов Волшебство и вычисления: практическое пособие для начинающих фокусников и программистов Conjuring with Computation: A Manual of Magic and Computing for Beginners Conjuring with Computation: A Manual of Magic and Computing for Beginners
Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Privacy-Preserving in Edge Computing (Wireless Networks)
/
Privacy-Preserving in Edge Computing (Wireless Networks)Название: Privacy-Preserving in Edge Computing
Автор: Longxiang Gao, Tom H. Luan, Bruce Gu
Издательство: Springer
Год: 2021
Страниц: 123
Язык: английский
Формат: pdf (true), epub
Размер: 17.98 MB

With the rapid development of Big Data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requirements of various real-time mobile services. Therefore, the emergence of edge computing has been recently developed as a new computing paradigm that can collect and process data at the edge of the network, which brings significant convenience to solving problems such as delay, bandwidth, and off-loading in the traditional cloud computing paradigm. By extending the functions of the cloud to the edge of the network, edge computing provides effective data access control, computation, processing and storage for end devices. Furthermore, edge computing optimizes the seamless connection from the cloud to devices, which is considered the foundation for realizing the interconnection of everything. However, due to the open features of edge computing, such as content awareness, real-time computing and parallel processing, the existing problems of privacy in the edge computing environment have become more prominent. The access to multiple categories and large numbers of devices in edge computing also creates new privacy issues.

In this book, we discuss on the research background and current research process of privacy protection in edge computing. In the first chapter, the state-of-the-art research of edge computing are reviewed. The second chapter discusses the data privacy issue and attack models in edge computing. Three categories of privacy preserving schemes will be further introduced in the following chapters. Chapter three introduces the context-aware privacy preserving scheme. Chapter four further introduces a location-aware differential privacy preserving scheme. Chapter five presents a new blockchain based decentralized privacy preserving in edge computing. Chapter six summarize this monograph and propose future research directions.

In summary, this book introduces the following techniques in edge computing: 1) describe an MDP-based privacy-preserving model to solve context-aware data privacy in the hierarchical edge computing paradigm; 2) describe a SDN based clustering methods to solve the location-aware privacy problems in edge computing; 3) describe a novel blockchain based decentralized privacy-preserving scheme in edge computing. These techniques enable the rapid development of privacy-preserving in edge computing.

Скачать Privacy-Preserving in Edge Computing





ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!





[related-news]
[/related-news]
Комментарии 0
Комментариев пока нет. Стань первым!