London Jeans

Privacy-Preserving in Edge Computing by Longxiang Gao (English) Paperback Book

Description: Privacy-Preserving in Edge Computing by Longxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang Therefore, the emergence of edge computing has been recently developed as a new computing paradigm that can collect and process data at the edge of the network, which brings significant convenience to solving problems such as delay, bandwidth, and off-loading in the traditional cloud computing paradigm. FORMAT Paperback LANGUAGE English CONDITION Brand New Publisher Description With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requirements of various real-time mobile services. Therefore, the emergence of edge computing has been recently developed as a new computing paradigm that can collect and process data at the edge of the network, which brings significant convenience to solving problems such as delay, bandwidth, and off-loading in the traditional cloud computing paradigm. By extending the functions of the cloud to the edge of the network, edge computing provides effective data access control, computation, processing and storage for end devices. Furthermore, edge computing optimizes the seamless connection from the cloud to devices, which is considered the foundation for realizing the interconnection of everything. However, due to the open features of edge computing, such as content awareness, real-time computing and parallel processing, the existing problems of privacy in the edge computing environment have become more prominent. The access to multiple categories and large numbers of devices in edge computing also creates new privacy issues. In this book, we discuss on the research background and current research process of privacy protection in edge computing. In the first chapter, the state-of-the-art research of edge computing are reviewed. The second chapter discusses the data privacy issue and attack models in edge computing. Three categories of privacy preserving schemes will be further introduced in the following chapters. Chapter three introduces the context-aware privacy preserving scheme. Chapter four further introduces a location-aware differential privacy preserving scheme. Chapter five presents a new blockchain based decentralized privacy preserving in edge computing. Chapter six summarize this monograph and propose future research directions.In summary, this book introduces the following techniques in edge computing: 1) describe an MDP-based privacy-preserving model to solve context-aware data privacy in the hierarchical edge computing paradigm; 2) describe a SDN based clustering methods to solve the location-aware privacy problems in edge computing; 3) describe a novel blockchain based decentralized privacy-preserving scheme in edge computing. These techniques enable the rapid development of privacy-preserving in edge computing. Back Cover With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requirements of various real-time mobile services. Therefore, the emergence of edge computing has been recently developed as a new computing paradigm that can collect and process data at the edge of the network, which brings significant convenience to solving problems such as delay, bandwidth, and off-loading in the traditional cloud computing paradigm. By extending the functions of the cloud to the edge of the network, edge computing provides effective data access control, computation, processing and storage for end devices. Furthermore, edge computing optimizes the seamless connection from the cloud to devices, which is considered the foundation for realizing the interconnection of everything. However, due to the open features of edge computing, such as content awareness, real-time computing and parallel processing, the existing problems of privacy in the edge computing environment have become more prominent. The access to multiple categories and large numbers of devices in edge computing also creates new privacy issues. In this book, we discuss on the research background and current research process of privacy protection in edge computing. In the first chapter, the state-of-the-art research of edge computing are reviewed. The second chapter discusses the data privacy issue and attack models in edge computing. Three categories of privacy preserving schemes will be further introduced in the following chapters. Chapter three introduces the context-aware privacy preserving scheme. Chapter four further introduces a location-aware differential privacy preserving scheme. Chapter five presents a new blockchain based decentralized privacy preserving in edge computing. Chapter six summarize this monograph and propose future research directions. In summary, this book introduces the following techniques in edge computing: 1) describe an MDP-based privacy-preserving model to solve context-aware data privacy in the hierarchical edge computing paradigm; 2) describe a SDN based clustering methods to solve the location-aware privacy problems in edge computing; 3) describe a novel blockchain based decentralized privacy-preserving scheme in edge computing. These techniques enable the rapid development of privacy-preserving in edge computing. Author Biography Longxiang Gao received his PhD in Computer Science from Deakin University, Australia. He is currently a Senior Lecturer and Deputy Director of Deakin Blockchain Innovation Lab at Deakin University. His research interests include Edge computing, Blockchain, 5G and AI and mobile networks. Dr. Gao has over 80 publications, including patent, monograph, book chapter, journal and conference papers. Some of his publications have been published in the top venue, such as IEEE TMC, IEEE TPDS, IEEE IoTJ, IEEE TDSC, IEEE TVT, IEEE TCSS, IEEE TII and IEEE Access. He has been Chief Investigator (CI) for more than 20 research projects (the total awarded amount is $5.5million), from pure research project to contracted industry research. Dr. Gao is a Senior Member of IEEE and active in IEEE Communication Society. He has served as the TPC co-chair, publicity co-chair, organization chair and TPC member for many international conferences. He is the Associate Editor of IEEE Access and the Assessor of Australian Research Council (ARC) projects.Tom H Luan received the B.E. degree from the Xian Jiaotong University, China, in 2004, the Master degree from the Hong Kong University of Science and Technology, Hong Kong, in 2007, and the Ph.D. degree from the University of Waterloo, Canada, in 2012, all in Electrical and Computer Engineering. During 2013 to 2017, Dr. Luan was a Lecturer in Mobile and Apps at the Deakin University, Australia. Since 2017, he is with the School of Cyber Engineering in Xidian University, China, as a professor. His research mainly focuses on the content distribution and media streaming in vehicular ad hoc networks and peer-to-peer networking, and protocol design and performance evaluation of wireless cloud computing and edge computing. Dr. Luan has published more than 100 technical works and received IEEE VTS 2017 Best Land Transportation Paper Award.Bruce Gu is currently a Lecturer in the Discipline of Information Technology, College of Engineering and Science, Victoria University. He received his PhD in Computer Science from Deakin University, Australia in 2020. In 2009 and 2011, he received his BInfoTech and MIT degrees from Deakin University, respectively. He has over 10 years of industry engagement experience in Australia. His research interests include artificial intelligence, cybersecurity, privacy preserving, blockchain, Internet of Things and Edge AI. He has served as the TPC member for many international conferences. He also serve as reviewer for many top quality journals. Youyang Qu received his PhD at School of Information Technology, Deakin University, Australia. He is currently a research fellow of Deakin University. His research interests focus on dealing with security and customizable privacy issues in Blockchain, Social Networks, Machine Learning, and Edge Computing. He has published over 30 publications including high-quality journals such as IEEE Internet of Things Journal, IEEE Wireless Communications, IEEE Transactions on Industrial informatics, etc. He is active in IEEE Communication Society and has served as a TPC Member for IEEE flagship conferences including IEEE ICC and IEEE Globecom. He also served as the publicity chair of SPDE2020.Yong Xiang received the PhD degree in the Electrical and Electronic Engineering from The University of Melbourne, Australia. He is a Professor at the School of Information Technology, Deakin University, Australia. His research interests include information security and privacy, signal and image processing, data analytics and machine intelligence, Internet of Things, and blockchain. He has published 5 monographs, over 150 refereed journal articles, and numerous conference papers in these areas. He is the Senior Area Editor of IEEE Signal Processing Letters and the Associate Editor of IEEE Communications Surveys and Tutorials. He has served as Honorary Chair, General Chair, Program Chair, TPC Chair, Symposium Chair, and Track Chair for a number of international conferences. Table of Contents Chapter 1 An Introduction to Edge Computing.- Chapter 2 Privacy Issues in Edge Computing.-Chapter 3 Context-Aware Privacy-Preserving in Edge Computing.- Chapter 4 Location-Aware Privacy Preserving in Edge Computing.- Chapter 5 Blockchain based Decentralized Privacy Preserving in Edge Computing.- Chapter 6 Conclusion and Future Research Issues. Feature Broadens readers understanding of privacy preserving in edge computing Equips readers to tackle complex privacy issues in edge computing Shares many tips and insights into core privacy preservation issues in edge computing Details ISBN9811622019 Author Yong Xiang Pages 113 Series Wireless Networks Language English Year 2022 ISBN-10 9811622019 ISBN-13 9789811622014 Format Paperback Publisher Springer Verlag, Singapore Edition 1st Imprint Springer Verlag, Singapore Place of Publication Singapore Country of Publication Singapore Publication Date 2022-06-03 UK Release Date 2022-06-03 Illustrations 39 Illustrations, color; 20 Illustrations, black and white; XII, 113 p. 59 illus., 39 illus. in color. Edition Description 1st ed. 2021 Alternative 9789811621987 DEWEY 004.678 Audience Professional & Vocational We've got this At The Nile, if you're looking for it, we've got it. With fast shipping, low prices, friendly service and well over a million items - you're bound to find what you want, at a price you'll love! TheNile_Item_ID:135370749;

Price: 290 AUD

Location: Melbourne

End Time: 2025-01-30T03:10:00.000Z

Shipping Cost: 9.34 AUD

Product Images

Privacy-Preserving in Edge Computing by Longxiang Gao (English) Paperback Book

Item Specifics

Restocking fee: No

Return shipping will be paid by: Buyer

Returns Accepted: Returns Accepted

Item must be returned within: 30 Days

Format: Paperback

Language: English

ISBN-13: 9789811622014

Author: Longxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang

Type: Does not apply

Book Title: Privacy-Preserving in Edge Computing

Recommended

Privacy-Preserving Machine Learning by Chang
Privacy-Preserving Machine Learning by Chang

$65.99

View Details
Chbeir - Security and Privacy Preserving in Social Networks - New pap - S9000z
Chbeir - Security and Privacy Preserving in Social Networks - New pap - S9000z

$132.07

View Details
Privacy-Preserving Data Mining: Models and Algorithms by Charu C Aggarwal: New
Privacy-Preserving Data Mining: Models and Algorithms by Charu C Aggarwal: New

$242.14

View Details
Privacy-Preserving Machine Learning by Di Zhuang (English) Paperback Book
Privacy-Preserving Machine Learning by Di Zhuang (English) Paperback Book

$67.37

View Details
Security and Privacy-Preserving Techniques in Wireless Robotics
Security and Privacy-Preserving Techniques in Wireless Robotics

$34.79

View Details
Abd El-Latif - Security and Privacy Preserving for IoT and 5G Network - T9000z
Abd El-Latif - Security and Privacy Preserving for IoT and 5G Network - T9000z

$234.46

View Details
Privacy-Preserving Machine Learning: A use-case-driven approach to building and
Privacy-Preserving Machine Learning: A use-case-driven approach to building and

$53.10

View Details
Preserving Privacy in Data Outsourcing - 9781441976581
Preserving Privacy in Data Outsourcing - 9781441976581

$91.14

View Details
Preserving Privacy Against Side-Channel Leaks: From Data Publishing to Web Appli
Preserving Privacy Against Side-Channel Leaks: From Data Publishing to Web Appli

$132.20

View Details
Privacy-Preserving in Mobile Crowdsensing by Chuan Zhang (English) Hardcover Boo
Privacy-Preserving in Mobile Crowdsensing by Chuan Zhang (English) Hardcover Boo

$199.76

View Details