Secure Edge Computing

Download Secure Edge Computing PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 1000427315
Total Pages : 304 pages
Book Rating : 4.0/5 (4 download)

DOWNLOAD NOW!


Book Synopsis Secure Edge Computing by : Mohiuddin Ahmed

Download or read book Secure Edge Computing written by Mohiuddin Ahmed and published by CRC Press. This book was released on 2021-08-12 with total page 304 pages. Available in PDF, EPUB and Kindle. Book excerpt: The internet is making our daily life as digital as possible and this new era is called the Internet of Everything (IoE). Edge computing is an emerging data analytics concept that addresses the challenges associated with IoE. More specifically, edge computing facilitates data analysis at the edge of the network instead of interacting with cloud-based servers. Therefore, more and more devices need to be added in remote locations without any substantial monitoring strategy. This increased connectivity and the devices used for edge computing will create more room for cyber criminals to exploit the system’s vulnerabilities. Ensuring cyber security at the edge should not be an afterthought or a huge challenge. The devices used for edge computing are not designed with traditional IT hardware protocols. There are diverse-use cases in the context of edge computing and Internet of Things (IoT) in remote locations. However, the cyber security configuration and software updates are often overlooked when they are most needed to fight cyber crime and ensure data privacy. Therefore, the threat landscape in the context of edge computing becomes wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of the network. In this context, this book addresses the cyber security challenges associated with edge computing, which provides a bigger picture of the concepts, techniques, applications, and open research directions in this area. In addition, the book serves as a single source of reference for acquiring the knowledge on the technology, process and people involved in next generation computing and security. It will be a valuable aid for researchers, higher level students and professionals working in the area.

Fog/Edge Computing For Security, Privacy, and Applications

Download Fog/Edge Computing For Security, Privacy, and Applications PDF Online Free

Author :
Publisher : Springer Nature
ISBN 13 : 3030573281
Total Pages : 417 pages
Book Rating : 4.0/5 (35 download)

DOWNLOAD NOW!


Book Synopsis Fog/Edge Computing For Security, Privacy, and Applications by : Wei Chang

Download or read book Fog/Edge Computing For Security, Privacy, and Applications written by Wei Chang and published by Springer Nature. This book was released on 2021-01-04 with total page 417 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.

Cases on Edge Computing and Analytics

Download Cases on Edge Computing and Analytics PDF Online Free

Author :
Publisher : IGI Global
ISBN 13 : 1799848744
Total Pages : 327 pages
Book Rating : 4.7/5 (998 download)

DOWNLOAD NOW!


Book Synopsis Cases on Edge Computing and Analytics by : Ambika, Paranthaman

Download or read book Cases on Edge Computing and Analytics written by Ambika, Paranthaman and published by IGI Global. This book was released on 2021-01-08 with total page 327 pages. Available in PDF, EPUB and Kindle. Book excerpt: Edge computing and analytics are fascinating the whole world of computing. Industry and business are keenly embracing this sound concept to develop customer-centric solutions by enhancing their operations, offerings, and outputs. There is a bevy of advancements in this domain that came with the arrival of IoT devices. The seamless convergence of microservices and serverless computing creates vast opportunities. With the help of IoT devices and these other developments, there has become a deep interest in business automation and additional improvisations in edge computing. With the steady growth of edge devices and applications of IoT fog/edge computing and analytics, there are also distinct challenges and threats. Research has been keenly focused on identifying and understanding these issues and shortcomings to bring viable solution approaches and algorithms. Cases on Edge Computing and Analytics describes the latest innovations, improvements, and transformations happening with edge devices and computing. It addresses the key concerns of the edge computing paradigm, how they are processed, and the various technologies and tools empowering edge computing and analytics. While highlighting topics within edge computing such as the key drivers for implementation, computing capabilities, security considerations, and use-cases, this book is ideal for IT industry professionals and project managers, computer scientists, computer engineers, and practitioners, stakeholders, researchers, academicians, and students looking for research on the latest trends and transitions in edge computing.

Edge Computing

Download Edge Computing PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 1000483592
Total Pages : 180 pages
Book Rating : 4.0/5 (4 download)

DOWNLOAD NOW!


Book Synopsis Edge Computing by : K. Anitha Kumari

Download or read book Edge Computing written by K. Anitha Kumari and published by CRC Press. This book was released on 2021-11-22 with total page 180 pages. Available in PDF, EPUB and Kindle. Book excerpt: This reference text presents the state-of-the-art in edge computing, its primitives, devices and simulators, applications, and healthcare-based case studies. The text provides integration of blockchain with edge computing systems and integration of edge with Internet of Things (IoT) and cloud computing. It will facilitate readers to setup edge-based environment and work with edge analytics. It covers important topics, including cluster computing, fog computing, networking architecture, edge computing simulators, edge analytics, privacy-preserving schemes, edge computing with blockchain, autonomous vehicles, and cross-domain authentication. Aimed at senior undergraduate, graduate students and professionals in the fields of electrical engineering, electronics engineering, computer science, and information technology, this text: Discusses edge data storage security with case studies and blockchain integration with the edge computing system Covers theoretical methods with the help of applications, use cases, case studies, and examples Provides healthcare real-time case studies elaborated by utilizing the virtues of homomorphic encryption Discusses real-time interfaces, devices, and simulators in detail

Security and Risk Analysis for Intelligent Edge Computing

Download Security and Risk Analysis for Intelligent Edge Computing PDF Online Free

Author :
Publisher : Springer Nature
ISBN 13 : 3031281500
Total Pages : 246 pages
Book Rating : 4.0/5 (312 download)

DOWNLOAD NOW!


Book Synopsis Security and Risk Analysis for Intelligent Edge Computing by : Gautam Srivastava

Download or read book Security and Risk Analysis for Intelligent Edge Computing written by Gautam Srivastava and published by Springer Nature. This book was released on 2023-06-24 with total page 246 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book offers the latest research results in security and privacy for Intelligent Edge Computing Systems. It presents state-of-the art content and provides an in-depth overview of the basic background in this related field. Practical areas in both security and risk analysis are addressed as well as connections directly linked to Edge Computing paradigms. This book also offers an excellent foundation on the fundamental concepts and principles of security, privacy and risk analysis in Edge Computation infrastructures. It guides the reader through the core ideas with relevant ease. Edge Computing has burst onto the computational scene offering key technologies for allowing more flexibility at the edge of networks. As Edge Computing has evolved as well as the need for more in-depth solutions in security, privacy and risk analysis at the edge. This book includes various case studies and applications on Edge Computing. It includes the Internet of Things related areas, such as smart cities, blockchain, mobile networks, federated learning, cryptography and cybersecurity. This book is one of the first reference books covering security and risk analysis in Edge Computing Systems. Researchers and advanced-level students studying or working in Edge Computing and related security fields will find this book useful as a reference. Decision makers, managers and professionals working within these fields will want to purchase this book as well.

Fog, Edge, and Pervasive Computing in Intelligent IoT Driven Applications

Download Fog, Edge, and Pervasive Computing in Intelligent IoT Driven Applications PDF Online Free

Author :
Publisher : John Wiley & Sons
ISBN 13 : 1119670071
Total Pages : 464 pages
Book Rating : 4.1/5 (196 download)

DOWNLOAD NOW!


Book Synopsis Fog, Edge, and Pervasive Computing in Intelligent IoT Driven Applications by : Deepak Gupta

Download or read book Fog, Edge, and Pervasive Computing in Intelligent IoT Driven Applications written by Deepak Gupta and published by John Wiley & Sons. This book was released on 2021-01-07 with total page 464 pages. Available in PDF, EPUB and Kindle. Book excerpt: A practical guide to the design, implementation, evaluation, and deployment of emerging technologies for intelligent IoT applications With the rapid development in artificially intelligent and hybrid technologies, IoT, edge, fog-driven, and pervasive computing techniques are becoming important parts of our daily lives. This book focuses on recent advances, roles, and benefits of these technologies, describing the latest intelligent systems from a practical point of view. Fog, Edge, and Pervasive Computing in Intelligent IoT Driven Applications is also valuable for engineers and professionals trying to solve practical, economic, or technical problems. With a uniquely practical approach spanning multiple fields of interest, contributors cover theory, applications, and design methodologies for intelligent systems. These technologies are rapidly transforming engineering, industry, and agriculture by enabling real-time processing of data via computational, resource-oriented metaheuristics and machine learning algorithms. As edge/fog computing and associated technologies are implemented far and wide, we are now able to solve previously intractable problems. With chapters contributed by experts in the field, this book: Describes Machine Learning frameworks and algorithms for edge, fog, and pervasive computing Considers probabilistic storage systems and proven optimization techniques for intelligent IoT Covers 5G edge network slicing and virtual network systems that utilize new networking capacity Explores resource provisioning and bandwidth allocation for edge, fog, and pervasive mobile applications Presents emerging applications of intelligent IoT, including smart farming, factory automation, marketing automation, medical diagnosis, and more Researchers, graduate students, and practitioners working in the intelligent systems domain will appreciate this book’s practical orientation and comprehensive coverage. Intelligent IoT is revolutionizing every industry and field today, and Fog, Edge, and Pervasive Computing in Intelligent IoT Driven Applications provides the background, orientation, and inspiration needed to begin.

Edge Computing

Download Edge Computing PDF Online Free

Author :
Publisher : Springer
ISBN 13 : 3319990616
Total Pages : 188 pages
Book Rating : 4.3/5 (199 download)

DOWNLOAD NOW!


Book Synopsis Edge Computing by : Fadi Al-Turjman

Download or read book Edge Computing written by Fadi Al-Turjman and published by Springer. This book was released on 2018-11-09 with total page 188 pages. Available in PDF, EPUB and Kindle. Book excerpt: In this book, contributors provide insights into the latest developments of Edge Computing/Mobile Edge Computing, specifically in terms of communication protocols and related applications and architectures. The book provides help to Edge service providers, Edge service consumers, and Edge service developers interested in getting the latest knowledge in the area. The book includes relevant Edge Computing topics such as applications; architecture; services; inter-operability; data analytics; deployment and service; resource management; simulation and modeling; and security and privacy. Targeted readers include those from varying disciplines who are interested in designing and deploying Edge Computing. Features the latest research related to Edge Computing, from a variety of perspectives; Tackles Edge Computing in academia and industry, featuring a variety of new and innovative operational ideas; Provides a strong foundation for researchers to advance further in the Edge Computing domain.

Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities

Download Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities PDF Online Free

Author :
Publisher : Springer Nature
ISBN 13 : 3031510976
Total Pages : 259 pages
Book Rating : 4.0/5 (315 download)

DOWNLOAD NOW!


Book Synopsis Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities by : Ahmed A. Abd El-Latif

Download or read book Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities written by Ahmed A. Abd El-Latif and published by Springer Nature. This book was released on with total page 259 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Cloud Computing with Security

Download Cloud Computing with Security PDF Online Free

Author :
Publisher : Springer Nature
ISBN 13 : 3030246124
Total Pages : 355 pages
Book Rating : 4.0/5 (32 download)

DOWNLOAD NOW!


Book Synopsis Cloud Computing with Security by : Naresh Kumar Sehgal

Download or read book Cloud Computing with Security written by Naresh Kumar Sehgal and published by Springer Nature. This book was released on 2019-09-04 with total page 355 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book provides readers with an overview of Cloud Computing, starting with historical background on mainframe computers and early networking protocols, leading to current concerns such as hardware and systems security, performance, emerging areas of IoT, Edge Computing etc. Readers will benefit from the in-depth discussion of cloud computing usage and the underlying architectures. The authors explain carefully the “why’s and how’s” of Cloud Computing, so engineers will find this book an invaluable source of information to the topic. This second edition includes new material on Cloud Computing Security, Threat Vectors and Trust Models, as well as best practices for a using dynamic cloud infrastructure, and cloud operations management. Several new examples and analysis of cloud security have been added, including edge computing with IoT devices.

IoT and Edge Computing for Architects

Download IoT and Edge Computing for Architects PDF Online Free

Author :
Publisher : Packt Publishing Ltd
ISBN 13 : 1839218878
Total Pages : 633 pages
Book Rating : 4.8/5 (392 download)

DOWNLOAD NOW!


Book Synopsis IoT and Edge Computing for Architects by : Perry Lea

Download or read book IoT and Edge Computing for Architects written by Perry Lea and published by Packt Publishing Ltd. This book was released on 2020-03-06 with total page 633 pages. Available in PDF, EPUB and Kindle. Book excerpt: Learn to design, implement, and secure your IoT infrastructure. Revised and expanded for edge computing. Key FeaturesBuild a complete IoT system that's the best fit for your organizationLearn about different concepts, tech, and trade-offs in the IoT architectural stackUnderstand the theory and implementation of each element that comprises IoT designBook Description Industries are embracing IoT technologies to improve operational expenses, product life, and people's well-being. An architectural guide is needed if you want to traverse the spectrum of technologies needed to build a successful IoT system, whether that's a single device or millions of IoT devices. IoT and Edge Computing for Architects, Second Edition encompasses the entire spectrum of IoT solutions, from IoT sensors to the cloud. It examines modern sensor systems, focusing on their power and functionality. It also looks at communication theory, paying close attention to near-range PAN, including the new Bluetooth® 5.0 specification and mesh networks. Then, the book explores IP-based communication in LAN and WAN, including 802.11ah, 5G LTE cellular, Sigfox, and LoRaWAN. It also explains edge computing, routing and gateways, and their role in fog computing, as well as the messaging protocols of MQTT 5.0 and CoAP. With the data now in internet form, you'll get an understanding of cloud and fog architectures, including the OpenFog standards. The book wraps up the analytics portion with the application of statistical analysis, complex event processing, and deep learning models. The book then concludes by providing a holistic view of IoT security, cryptography, and shell security in addition to software-defined perimeters and blockchains. What you will learnUnderstand the role and scope of architecting a successful IoT deploymentScan the landscape of IoT technologies, from sensors to the cloud and moreSee the trade-offs in choices of protocols and communications in IoT deploymentsBecome familiar with the terminology needed to work in the IoT spaceBroaden your skills in the multiple engineering domains necessary for the IoT architectImplement best practices to ensure reliability, scalability, and security in your IoT infrastructureWho this book is for This book is for architects, system designers, technologists, and technology managers who want to understand the IoT ecosphere, technologies, and trade-offs, and develop a 50,000-foot view of IoT architecture. An understanding of the architectural side of IoT is necessary.

The Cloud-to-Thing Continuum

Download The Cloud-to-Thing Continuum PDF Online Free

Author :
Publisher : Springer Nature
ISBN 13 : 3030411109
Total Pages : 183 pages
Book Rating : 4.0/5 (34 download)

DOWNLOAD NOW!


Book Synopsis The Cloud-to-Thing Continuum by : Theo Lynn

Download or read book The Cloud-to-Thing Continuum written by Theo Lynn and published by Springer Nature. This book was released on 2020-07-07 with total page 183 pages. Available in PDF, EPUB and Kindle. Book excerpt: The Internet of Things offers massive societal and economic opportunities while at the same time significant challenges, not least the delivery and management of the technical infrastructure underpinning it, the deluge of data generated from it, ensuring privacy and security, and capturing value from it. This Open Access Pivot explores these challenges, presenting the state of the art and future directions for research but also frameworks for making sense of this complex area. This book provides a variety of perspectives on how technology innovations such as fog, edge and dew computing, 5G networks, and distributed intelligence are making us rethink conventional cloud computing to support the Internet of Things. Much of this book focuses on technical aspects of the Internet of Things, however, clear methodologies for mapping the business value of the Internet of Things are still missing. We provide a value mapping framework for the Internet of Things to address this gap. While there is much hype about theInternet of Things, we have yet to reach the tipping point. As such, this book provides a timely entrée for higher education educators, researchers and students, industry and policy makers on the technologies that promise to reshape how society interacts and operates.

Edge Computing and IoT: Systems, Management and Security

Download Edge Computing and IoT: Systems, Management and Security PDF Online Free

Author :
Publisher : Springer Nature
ISBN 13 : 3030734293
Total Pages : 191 pages
Book Rating : 4.0/5 (37 download)

DOWNLOAD NOW!


Book Synopsis Edge Computing and IoT: Systems, Management and Security by : Hongbo Jiang

Download or read book Edge Computing and IoT: Systems, Management and Security written by Hongbo Jiang and published by Springer Nature. This book was released on 2021-04-08 with total page 191 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the refereed post-conference proceedings of the First International Conference Edge Computing and IoT, ICECI 2020, held in November 2020 in Changsha, China. Due to COVID-19 pandemic the conference was held virtually. The rapidly increasing devices and data traffic in the Internet-of-Things (IoT) era are posing significant burdens on the capacity-limited Internet and uncontrollable service delay. The 11 full papers of ICECI 2020 were selected from 79 submissions and present results and ideas in the area of edge computing and IoT.

Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies

Download Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies PDF Online Free

Author :
Publisher : IGI Global
ISBN 13 : 1799838188
Total Pages : 333 pages
Book Rating : 4.7/5 (998 download)

DOWNLOAD NOW!


Book Synopsis Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies by : Cornetta, Gianluca

Download or read book Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies written by Cornetta, Gianluca and published by IGI Global. This book was released on 2020-06-26 with total page 333 pages. Available in PDF, EPUB and Kindle. Book excerpt: The adoption of cloud and IoT technologies in both the industrial and academic communities has enabled the discovery of numerous applications and ignited countless new research opportunities. With numerous professional markets benefiting from these advancements, it is easy to forget the non-technical issues that accompany technologies like these. Despite the advantages that these systems bring, significant ethical questions and regulatory issues have become prominent areas of discussion. Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies is a pivotal reference source that provides vital research on the non-technical repercussions of IoT technology adoption. While highlighting topics such as smart cities, environmental monitoring, and data privacy, this publication explores the regulatory and ethical risks that stem from computing technologies. This book is ideally designed for researchers, engineers, practitioners, students, academicians, developers, policymakers, scientists, and educators seeking current research on the sociological impact of cloud and IoT technologies.

Privacy and Security for Cloud Computing

Download Privacy and Security for Cloud Computing PDF Online Free

Author :
Publisher : Springer Science & Business Media
ISBN 13 : 144714189X
Total Pages : 313 pages
Book Rating : 4.4/5 (471 download)

DOWNLOAD NOW!


Book Synopsis Privacy and Security for Cloud Computing by : Siani Pearson

Download or read book Privacy and Security for Cloud Computing written by Siani Pearson and published by Springer Science & Business Media. This book was released on 2012-08-28 with total page 313 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book analyzes the latest advances in privacy, security and risk technologies within cloud environments. With contributions from leading experts, the text presents both a solid overview of the field and novel, cutting-edge research. A Glossary is also included at the end of the book. Topics and features: considers the various forensic challenges for legal access to data in a cloud computing environment; discusses privacy impact assessments for the cloud, and examines the use of cloud audits to attenuate cloud security problems; reviews conceptual issues, basic requirements and practical suggestions for provisioning dynamically configured access control services in the cloud; proposes scoped invariants as a primitive for analyzing a cloud server for its integrity properties; investigates the applicability of existing controls for mitigating information security risks to cloud computing environments; describes risk management for cloud computing from an enterprise perspective.

Privacy and Security Challenges in Cloud Computing

Download Privacy and Security Challenges in Cloud Computing PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 1000542750
Total Pages : 291 pages
Book Rating : 4.0/5 (5 download)

DOWNLOAD NOW!


Book Synopsis Privacy and Security Challenges in Cloud Computing by : T. Ananth Kumar

Download or read book Privacy and Security Challenges in Cloud Computing written by T. Ananth Kumar and published by CRC Press. This book was released on 2022-03-15 with total page 291 pages. Available in PDF, EPUB and Kindle. Book excerpt: This reference text discusses various security techniques and challenges for cloud data protection from both software and hardware aspects. The text provides readers with an overview of cloud computing, beginning with historical perspectives on mainframe computers and early networking protocols, moving to current issues such as security of hardware and networks, performance, evolving IoT areas, edge computing, etc. It also deals with threat detection and incident response in cloud security. It covers important topics including operational security agitations in cloud computing, cyber artificial intelligence (AI) platform for cloud security, and security concerns of virtualization in cloud computing. The book will serve as a useful resource for graduate students and professionals in the fields of electrical engineering, electronics engineering, computer science, and information technology.

IoT Security

Download IoT Security PDF Online Free

Author :
Publisher : John Wiley & Sons
ISBN 13 : 1119527945
Total Pages : 327 pages
Book Rating : 4.1/5 (195 download)

DOWNLOAD NOW!


Book Synopsis IoT Security by : Madhusanka Liyanage

Download or read book IoT Security written by Madhusanka Liyanage and published by John Wiley & Sons. This book was released on 2019-12-24 with total page 327 pages. Available in PDF, EPUB and Kindle. Book excerpt: An up-to-date guide to an overview of authentication in the Internet of Things (IoT) The Internet of things (IoT) is the network of the countless physical devices that have the possibility to connect and exchange data. Among the various security requirements, authentication to the IoT is the first step to prevent the impact of attackers. IoT Security offers an important guide into the development of the many authentication mechanisms that provide IoT authentication at various levels such as user level, device level and network level. The book covers a wide range of topics including an overview of IoT and addresses in detail the security challenges at every layer by considering both the technologies and the architecture used. The authors—noted experts on the topic—provide solutions for remediation of compromised security, as well as methods for risk mitigation, and offer suggestions for prevention and improvement. In addition, IoT Security offers a variety of illustrative use cases. This important book: Offers an authoritative reference designed for use by all IoT stakeholders Includes information for securing devices at the user, device, and network levels Contains a classification of existing vulnerabilities Written by an international group of experts on the topic Provides a guide to the most current information available on IoT security Written for network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations, and security solution developers, IoT Security is an essential guide that contains information on security features, including underlying networks, architectures, and security requirements.

Privacy-Preserving in Edge Computing

Download Privacy-Preserving in Edge Computing PDF Online Free

Author :
Publisher : Springer Nature
ISBN 13 : 9811621993
Total Pages : 113 pages
Book Rating : 4.8/5 (116 download)

DOWNLOAD NOW!


Book Synopsis Privacy-Preserving in Edge Computing by : Longxiang Gao

Download or read book Privacy-Preserving in Edge Computing written by Longxiang Gao and published by Springer Nature. This book was released on 2021-06-01 with total page 113 pages. Available in PDF, EPUB and Kindle. Book excerpt: With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requirements of various real-time mobile services. Therefore, the emergence of edge computing has been recently developed as a new computing paradigm that can collect and process data at the edge of the network, which brings significant convenience to solving problems such as delay, bandwidth, and off-loading in the traditional cloud computing paradigm. By extending the functions of the cloud to the edge of the network, edge computing provides effective data access control, computation, processing and storage for end devices. Furthermore, edge computing optimizes the seamless connection from the cloud to devices, which is considered the foundation for realizing the interconnection of everything. However, due to the open features of edge computing, such as content awareness, real-time computing and parallel processing, the existing problems of privacy in the edge computing environment have become more prominent. The access to multiple categories and large numbers of devices in edge computing also creates new privacy issues. In this book, we discuss on the research background and current research process of privacy protection in edge computing. In the first chapter, the state-of-the-art research of edge computing are reviewed. The second chapter discusses the data privacy issue and attack models in edge computing. Three categories of privacy preserving schemes will be further introduced in the following chapters. Chapter three introduces the context-aware privacy preserving scheme. Chapter four further introduces a location-aware differential privacy preserving scheme. Chapter five presents a new blockchain based decentralized privacy preserving in edge computing. Chapter six summarize this monograph and propose future research directions. In summary, this book introduces the following techniques in edge computing: 1) describe an MDP-based privacy-preserving model to solve context-aware data privacy in the hierarchical edge computing paradigm; 2) describe a SDN based clustering methods to solve the location-aware privacy problems in edge computing; 3) describe a novel blockchain based decentralized privacy-preserving scheme in edge computing. These techniques enable the rapid development of privacy-preserving in edge computing.