000866544 000__ 03183cam\a2200493Ki\4500 000866544 001__ 866544 000866544 005__ 20230306145718.0 000866544 006__ m\\\\\o\\d\\\\\\\\ 000866544 007__ cr\cn\nnnunnun 000866544 008__ 190404s2019\\\\sz\a\\\\ob\\\\000\0\eng\d 000866544 019__ $$a1091695602 000866544 020__ $$a9783030133702$$q(electronic book) 000866544 020__ $$a3030133702$$q(electronic book) 000866544 020__ $$z9783030133696 000866544 020__ $$z3030133699 000866544 035__ $$aSP(OCoLC)on1091299805 000866544 035__ $$aSP(OCoLC)1091299805$$z(OCoLC)1091695602 000866544 040__ $$aYDX$$beng$$erda$$cYDX$$dGW5XE$$dYDXIT$$dEBLCP 000866544 049__ $$aISEA 000866544 050_4 $$aQA76.9.A25$$bB54 2019 000866544 08204 $$a005.7$$223 000866544 1001_ $$aPan, Miao,$$eauthor. 000866544 24510 $$aBig data privacy preservation for cyber-physical systems /$$cMiao Pan [and five others]. 000866544 264_1 $$aCham, Switzerland :$$bSpringer,$$c[2019] 000866544 300__ $$a1 online resource 000866544 336__ $$atext$$btxt$$2rdacontent 000866544 337__ $$acomputer$$bc$$2rdamedia 000866544 338__ $$aonline resource$$bcr$$2rdacarrier 000866544 4901_ $$aSpringerBriefs in electrical and computer engineering,$$x2191-8112 000866544 504__ $$aIncludes bibliographical references. 000866544 5058_ $$a3.4.1 Simulation Setup3.4.2 Privacy and Performance Analysis; References; 4 Optimization for Utility Providers with Privacy Preservation of Users' Energy Profile; 4.1 Network Model; 4.1.1 Data-Driven Prediction; 4.1.2 Cost Minimization Problem Formulation; 4.1.3 Solution to the Optimization Problem; 4.2 Performance Evaluation; References; 5 Caching with Users' Differential Privacy Preservation in Information-Centric Networks; 5.1 Network Model and Preliminaries; 5.1.1 System Description; 5.1.2 Data-Driven Analysis of Content Popularity 000866544 5058_ $$a5.1.3 Caching Revenue Maximization Problem with Local Privacy Preservation5.1.4 Solution to Caching Optimization Under Distribution Uncertainty; 5.2 Performance Evaluation; References; 6 Clock Auction Inspired Privacy Preservation in Colocation Data Centers; 6.1 System Model and Preliminaries; 6.1.1 System Architecture; 6.1.2 Threat Model and Design Goals; 6.2 Mechanism and Problem Formulation of PPCA for EDR; 6.2.1 Homomorphic Encryption for Aggregation; 6.2.2 Mechanism for Price Descending Clock Auction; 6.2.2.1 Set Up Phase; 6.2.2.2 Key Generation Phase; 6.2.2.3 Auction Phase 000866544 5058_ $$a6.2.3 Mechanism for Energy Descending Clock Auction6.2.3.1 Set Up Phase; 6.2.3.2 Key Generation Phase; 6.2.3.3 Auction Phase; 6.2.4 Differential Privacy Preservation; 6.3 Security and Performance Analysis; 6.3.1 Security Analysis; 6.3.2 Performance Analysis; 6.3.2.1 Computation Overhead; 6.3.2.2 Communication Overhead; References 000866544 506__ $$aAccess limited to authorized users. 000866544 588__ $$aDescription based on print version record. 000866544 650_0 $$aBig data$$xSecurity measures. 000866544 650_0 $$aCooperating objects (Computer systems) 000866544 7001_ $$aPan, Miao. 000866544 77608 $$iPrint version: $$z3030133699$$z9783030133696$$w(OCoLC)1083027911 000866544 830_0 $$aSpringerBriefs in electrical and computer engineering. 000866544 852__ $$bebk 000866544 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-13370-2$$zOnline Access$$91397441.1 000866544 909CO $$ooai:library.usi.edu:866544$$pGLOBAL_SET 000866544 980__ $$aEBOOK 000866544 980__ $$aBIB 000866544 982__ $$aEbook 000866544 983__ $$aOnline 000866544 994__ $$a92$$bISE