Skip to main content

2021 | Buch

Privacy-Preserving in Edge Computing

verfasst von: Dr. Longxiang Gao, Prof. Tom H. Luan, Dr. Bruce Gu, Dr. Youyang Qu, Prof. Yong Xiang

Verlag: Springer Singapore

Buchreihe : Wireless Networks

insite
SUCHEN

Über dieses Buch

With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requirements of various real-time mobile services. Therefore, the emergence of edge computing has been recently developed as a new computing paradigm that can collect and process data at the edge of the network, which brings significant convenience to solving problems such as delay, bandwidth, and off-loading in the traditional cloud computing paradigm. By extending the functions of the cloud to the edge of the network, edge computing provides effective data access control, computation, processing and storage for end devices. Furthermore, edge computing optimizes the seamless connection from the cloud to devices, which is considered the foundation for realizing the interconnection of everything. However, due to the open features of edge computing, such as content awareness, real-time computing and parallel processing, the existing problems of privacy in the edge computing environment have become more prominent. The access to multiple categories and large numbers of devices in edge computing also creates new privacy issues.

In this book, we discuss on the research background and current research process of privacy protection in edge computing. In the first chapter, the state-of-the-art research of edge computing are reviewed. The second chapter discusses the data privacy issue and attack models in edge computing. Three categories of privacy preserving schemes will be further introduced in the following chapters. Chapter three introduces the context-aware privacy preserving scheme. Chapter four further introduces a location-aware differential privacy preserving scheme. Chapter five presents a new blockchain based decentralized privacy preserving in edge computing. Chapter six summarize this monograph and propose future research directions.

In summary, this book introduces the following techniques in edge computing: 1) describe an MDP-based privacy-preserving model to solve context-aware data privacy in the hierarchical edge computing paradigm; 2) describe a SDN based clustering methods to solve the location-aware privacy problems in edge computing; 3) describe a novel blockchain based decentralized privacy-preserving scheme in edge computing. These techniques enable the rapid development of privacy-preserving in edge computing.

Inhaltsverzeichnis

Frontmatter
Chapter 1. An Introduction to Edge Computing
Abstract
With the continuous development of the Internet of Things (IoTs) applications, such as smart cities and intelligent transportation, and the rapid development of location-aware and context-aware services, the number of IoTs equipment connections and data generated demonstrate massive growth trends.
Longxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang
Chapter 2. Privacy Issues in Edge Computing
Abstract
Edge computing extends computing from the cloud to the end near the user and directly processes and makes decisions on the data locally. To a certain extent, it avoids the long-distance transmission of data in the network and reduces the risk of privacy disclosure. However, because edge devices obtain first-hand user data, they can obtain sensitive privacy data. For example, in the edge computing scenario of telecom operators, curious users of edge nodes can easily collect and pry into other users’ location information, service content, and usage frequency. In most of edge computing scenarios, edge nodes lack effective encryption or desensitization measures compared with traditional cloud centers. Once attacked, sniffed and corroded by hackers, stored household consumption, personal health information in the electronic medical system, road event vehicle information, etc. will be leaked.
Longxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang
Chapter 3. Context-Aware Privacy Preserving in Edge Computing
Abstract
In edge computing, edge nodes are hierarchically arranged, while data transmission is allowed among edge nodes. Because end devices are the closest to raw data sources, they usually submit requests with sensitive information to the edge nodes. Privacy issues occur during the transmission process. In addition, when an end user sends a request to edge nodes, the end user connects to the closest edge node initially, and the request is passed to the upper-layer edge nodes for further processing when the resources of the initial nodes are exhausted. The resource limitation includes computation, storage capabilities, and the number of users. For example, if a user generates one request to the connected edge node exceeding its computation power, the upper-layer edge node will be involved in the operation. Additionally, the information will be transmitted to the other edge nodes, which might be malicious. Thus, privacy preservation is necessary to prevent privacy leakage from data transition among multiple edge nodes in hierarchical structures.
Longxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang
Chapter 4. Location-Aware Privacy Preserving in Edge Computing
Abstract
Edge computing migrates computing to the end user. It directly processes and makes decisions on the data locally. To a certain extent, similar to cloud computing, it avoids the long-distance transmission of data in the network and reduces the risk of privacy leakage. However, due to the users’ real-time data obtained by edge nodes, a large number of sensitive privacy data can be obtained by adversaries. The methodologies ensures the usage of the service without disclosing their sensitive location information have proposed higher requirements for privacy protection algorithms in edge computing.
Longxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang
Chapter 5. Blockchain Based Decentralized Privacy Preserving in Edge Computing
Abstract
Despite the provided conveniences, privacy issues are emerging because data sharing is trending to improve the service performances. It is essential for end devices to share local data to central authorities such as edge servers for global aggregation.
Longxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang
Chapter 6. Conclusion and Future Research Issues
Abstract
The research presented in this monograph mainly focuses on privacy preservation issues in the edge computing paradigm in terms of data utility, privacy protection level, and efficiency of privacy preservation. This monograph consists of five chapters. We first study the current research backgrounds of edge computing and its privacy issues by analyzing the privacy challenges that exist in the edge computing paradigm. According to the challenges, this monograph focuses on the improvement and analysis of the overall paradigm in edge computing at the beginning. Second, based on the solid foundation that was developed, we discuss context-aware privacy issues at the end by proposing a MDP-based mechanism with SARSA reinforcement learning capabilities to archive optimal tradeoffs while enhancing the data utility and privacy level. Furthermore, we concentrate on privacy issues for location-aware applications by proposing a dual-scheme privacy protection model against multiple attacking scenarios. Moreover, we propose a novel decentralized blockchain-enabled federated learning (FL-Block) scheme which allows privacy-preserving local learning updates of end devices exchanges with blockchain-based global learning model.
Longxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang
Metadaten
Titel
Privacy-Preserving in Edge Computing
verfasst von
Dr. Longxiang Gao
Prof. Tom H. Luan
Dr. Bruce Gu
Dr. Youyang Qu
Prof. Yong Xiang
Copyright-Jahr
2021
Verlag
Springer Singapore
Electronic ISBN
978-981-16-2199-4
Print ISBN
978-981-16-2198-7
DOI
https://doi.org/10.1007/978-981-16-2199-4