Privacy-Enhancing Fog Computing and Its Applications

Privacy-Enhancing Fog Computing and Its Applications

Jianbing Ni / Xiaodong Lin / Xuemin (Sherman) Shen

68,02 €
IVA incluido
Disponible
Editorial:
Springer Nature B.V.
Año de edición:
2018
Materia
Ingeniería de las comunicaciones/las telecomunicaciones
ISBN:
9783030021122
68,02 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

This SpringerBrief  covers the security and privacy challenges in fog computing, and proposes a  new secure and privacy-preserving mechanisms to resolve these challenges for securing fog-assisted IoT applications. Chapter 1 introduces the architecture of fog-assisted IoT applications and the security and privacy challenges in fog computing. Chapter 2 reviews several promising privacy-enhancing techniques and illustrates examples on how to leverage these techniques to enhance the privacy of users in fog computing. Specifically,  the authors divide the existing privacy-enhancing techniques into three categories: identity-hidden techniques, location privacy protection and data privacy enhancing techniques. The research is of great importance since security and privacy problems faced by fog computing impede the healthy development of its enabled IoT applications. With the advanced privacy-enhancing techniques, the authors propose three secure and privacy-preserving protocols for fog computing applications, including smart parking navigation, mobile crowdsensing and smart grid.  Chapter 3 introduces identity privacy leakage in smart parking navigation systems, and proposes a privacy-preserving smart parking navigation system to prevent identity privacy exposure and support efficient parking guidance retrieval through road-side units (fogs) with high retrieving probability and security guarantees. Chapter 4 presents the location privacy leakage, during task allocation in mobile crowdsensing, and propose a strong privacy-preserving task allocation scheme that enables location-based task allocation and reputation-based report selection without exposing knowledge about the location and reputation for participators in mobile crowdsensing. Chapter 5 introduces the data privacy leakage in smart grid, and proposes an efficient and privacy-preserving smart metering protocol to allow collectors (fogs) to achieve real-time measurement collection with privacy-enhanced data aggregation. Finally, conclusions and future research directions are given in Chapter 6. This brief validates the significant feature extension and efficiency improvement of IoT devices without sacrificing the security and privacy of users against dishonest fog nodes. It also provides valuable insights on the security and privacy protection for fog-enabled IoT applications. Researchers and professionals who carry out research on security and privacy in wireless communication will want to purchase this SpringerBrief.  Also, advanced level students,  whose main research area is mobile network security will also be interested in this SpringerBrief. 

Artículos relacionados

  • Mobile Ad Hoc Robots and Wireless Robotic Systems
    The emergence of wireless robotic systems has provided new perspectives on technology. With the combination of disciplines such as robotic systems, ad hoc networking, telecommunications and more, mobile ad hoc robots have proven essential in aiding future possibilities of technology. Mobile Ad Hoc Robots and Wireless Robotic Systems: Design and Implementation aims to introduce ...
    Disponible

    249,37 €

  • Mobile and Handheld Computing Solutions for Organizations and End-Users
    Mobile and Handheld Computing Solutions for Organizations and End-Users discusses a broad range of topics in order to advance handheld knowledge and apply the proposed methods to real-world issues for organizations and end users. This book brings together researchers and practitioners involved with mobile and handheld computing solutions useful for IT students, researchers, and...
    Disponible

    249,72 €

  • Intelligent Soft Computation and Evolving Data Mining
    Leon Shyue-Lian Wang
    As the applications of data mining, the non-trivial extraction of implicit information in a data set, have expanded in recent years, so has the need for techniques that are tolerable to imprecision, uncertainty, and approximation. Intelligent Soft Computation and Evolving Data Mining: Integrating Advanced Technologies is a compendium that addresses this need. It integrates cont...
    Disponible

    236,89 €

  • Ubiquitous Multimedia and Mobile Agents
    Susmit Bagchi
    Ubiquitous multimedia systems, or mobile multimedia systems, offer the promise of pervasive delivery of multimedia content to mobile users and their handheld devices. Ubiquitous Multimedia and Mobile Agents: Models and Implementations provides the hybridization of two paradigms, namely, ubiquitous/mobile multimedia and mobile agents, where mobile agents act as the platform to r...
    Disponible

    255,90 €

  • Applications of Artificial Intelligence in Wireless Communication Systems
    Karan Kumar
    The application of artificial intelligence technology to 5G wireless communications is now appropriate to address the design of optimized physical layers, complicated decision-making, network management, and resource optimization tasks within networks. In exploring 5G wireless technologies and communication systems, artificial intelligence is a powerful tool and a research topi...
    Disponible

    248,74 €

  • Understanding Weightless
    William Webb
    ...
    Disponible

    38,22 €