001437185 000__ 04946cam\a2200553\i\4500 001437185 001__ 1437185 001437185 003__ OCoLC 001437185 005__ 20230309004135.0 001437185 006__ m\\\\\o\\d\\\\\\\\ 001437185 007__ cr\un\nnnunnun 001437185 008__ 210605s2021\\\\si\\\\\\ob\\\\000\0\eng\d 001437185 019__ $$a1255466619$$a1262381298$$a1285211084$$a1285803670$$a1295589187$$a1296463178 001437185 020__ $$a9789811621994$$q(electronic bk.) 001437185 020__ $$a9811621993$$q(electronic bk.) 001437185 020__ $$z9811621985 001437185 020__ $$z9789811621987 001437185 0247_ $$a10.1007/978-981-16-2199-4$$2doi 001437185 035__ $$aSP(OCoLC)1255234340 001437185 040__ $$aEBLCP$$beng$$erda$$epn$$cEBLCP$$dYDX$$dGW5XE$$dOCLCO$$dEBLCP$$dWAU$$dOCLCO$$dSFB$$dOCLCF$$dUKAHL$$dOCLCQ 001437185 049__ $$aISEA 001437185 050_4 $$aQA76.583 001437185 08204 $$a004.67/8$$223 001437185 1001_ $$aGao, Longxiang,$$eauthor. 001437185 24510 $$aPrivacy-preserving in edge computing /$$cLongxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang. 001437185 264_1 $$aSingapore :$$bSpringer,$$c[2021] 001437185 300__ $$a1 online resource (xii, 113 pages) 001437185 336__ $$atext$$btxt$$2rdacontent 001437185 337__ $$acomputer$$bc$$2rdamedia 001437185 338__ $$aonline resource$$bcr$$2rdacarrier 001437185 4901_ $$aWireless Networks 001437185 504__ $$aIncludes bibliographical references. 001437185 5050_ $$aChapter 1 An Introduction to Edge Computing -- Chapter 2 Privacy Issues in Edge Computing.-Chapter 3 Context-Aware Privacy-Preserving in Edge Computing -- Chapter 4 Location-Aware Privacy Preserving in Edge Computing -- Chapter 5 Blockchain based Decentralized Privacy Preserving in Edge Computing -- Chapter 6 Conclusion and Future Research Issues. 001437185 506__ $$aAccess limited to authorized users. 001437185 520__ $$aWith the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requirements of various real-time mobile services. Therefore, the emergence of edge computing has been recently developed as a new computing paradigm that can collect and process data at the edge of the network, which brings significant convenience to solving problems such as delay, bandwidth, and off-loading in the traditional cloud computing paradigm. By extending the functions of the cloud to the edge of the network, edge computing provides effective data access control, computation, processing and storage for end devices. Furthermore, edge computing optimizes the seamless connection from the cloud to devices, which is considered the foundation for realizing the interconnection of everything. However, due to the open features of edge computing, such as content awareness, real-time computing and parallel processing, the existing problems of privacy in the edge computing environment have become more prominent. The access to multiple categories and large numbers of devices in edge computing also creates new privacy issues. In this book, we discuss on the research background and current research process of privacy protection in edge computing. In the first chapter, the state-of-the-art research of edge computing are reviewed. The second chapter discusses the data privacy issue and attack models in edge computing. Three categories of privacy preserving schemes will be further introduced in the following chapters. Chapter three introduces the context-aware privacy preserving scheme. Chapter four further introduces a location-aware differential privacy preserving scheme. Chapter five presents a new blockchain based decentralized privacy preserving in edge computing. Chapter six summarize this monograph and propose future research directions. In summary, this book introduces the following techniques in edge computing: 1) describe an MDP-based privacy-preserving model to solve context-aware data privacy in the hierarchical edge computing paradigm; 2) describe a SDN based clustering methods to solve the location-aware privacy problems in edge computing; 3) describe a novel blockchain based decentralized privacy-preserving scheme in edge computing. These techniques enable the rapid development of privacy-preserving in edge computing. 001437185 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed June 23, 2021). 001437185 650_0 $$aEdge computing$$xSecurity measures. 001437185 655_0 $$aElectronic books. 001437185 7001_ $$aLuan, Tom H.,$$eauthor. 001437185 7001_ $$aGu, Bruce,$$eauthor. 001437185 7001_ $$aQu, Youyang,$$eauthor. 001437185 7001_ $$aXiang, Yong$$c(Of Deakin University),$$eauthor. 001437185 77608 $$iPrint version:$$aGao, Longxiang.$$tPrivacy-Preserving in Edge Computing.$$dSingapore : Springer Singapore Pte. Limited, ©2021$$z9789811621987 001437185 830_0 $$aWireless networks (Springer (Firm)) 001437185 852__ $$bebk 001437185 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-981-16-2199-4$$zOnline Access$$91397441.1 001437185 909CO $$ooai:library.usi.edu:1437185$$pGLOBAL_SET 001437185 980__ $$aBIB 001437185 980__ $$aEBOOK 001437185 982__ $$aEbook 001437185 983__ $$aOnline 001437185 994__ $$a92$$bISE