0
Your cart

Your cart is empty

Books > Computing & IT > Computer communications & networking > Network security

Buy Now

Privacy-Enhancing Fog Computing and Its Applications (Paperback, 1st ed. 2018) Loot Price: R1,539
Discovery Miles 15 390
Privacy-Enhancing Fog Computing and Its Applications (Paperback, 1st ed. 2018): Xiaodong Lin, Jianbing Ni, Xuemin (Sherman) Shen

Privacy-Enhancing Fog Computing and Its Applications (Paperback, 1st ed. 2018)

Xiaodong Lin, Jianbing Ni, Xuemin (Sherman) Shen

Series: SpringerBriefs in Electrical and Computer Engineering

 (sign in to rate)
Loot Price R1,539 Discovery Miles 15 390 | Repayment Terms: R144 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

This SpringerBrief covers the security and privacy challenges in fog computing, and proposes a new secure and privacy-preserving mechanisms to resolve these challenges for securing fog-assisted IoT applications. Chapter 1 introduces the architecture of fog-assisted IoT applications and the security and privacy challenges in fog computing. Chapter 2 reviews several promising privacy-enhancing techniques and illustrates examples on how to leverage these techniques to enhance the privacy of users in fog computing. Specifically, the authors divide the existing privacy-enhancing techniques into three categories: identity-hidden techniques, location privacy protection and data privacy enhancing techniques. The research is of great importance since security and privacy problems faced by fog computing impede the healthy development of its enabled IoT applications. With the advanced privacy-enhancing techniques, the authors propose three secure and privacy-preserving protocols for fog computing applications, including smart parking navigation, mobile crowdsensing and smart grid. Chapter 3 introduces identity privacy leakage in smart parking navigation systems, and proposes a privacy-preserving smart parking navigation system to prevent identity privacy exposure and support efficient parking guidance retrieval through road-side units (fogs) with high retrieving probability and security guarantees. Chapter 4 presents the location privacy leakage, during task allocation in mobile crowdsensing, and propose a strong privacy-preserving task allocation scheme that enables location-based task allocation and reputation-based report selection without exposing knowledge about the location and reputation for participators in mobile crowdsensing. Chapter 5 introduces the data privacy leakage in smart grid, and proposes an efficient and privacy-preserving smart metering protocol to allow collectors (fogs) to achieve real-time measurement collection with privacy-enhanced data aggregation. Finally, conclusions and future research directions are given in Chapter 6. This brief validates the significant feature extension and efficiency improvement of IoT devices without sacrificing the security and privacy of users against dishonest fog nodes. It also provides valuable insights on the security and privacy protection for fog-enabled IoT applications. Researchers and professionals who carry out research on security and privacy in wireless communication will want to purchase this SpringerBrief. Also, advanced level students, whose main research area is mobile network security will also be interested in this SpringerBrief.

General

Imprint: Springer Nature Switzerland AG
Country of origin: Switzerland
Series: SpringerBriefs in Electrical and Computer Engineering
Release date: November 2018
First published: 2018
Authors: Xiaodong Lin • Jianbing Ni • Xuemin (Sherman) Shen
Dimensions: 235 x 155mm (L x W)
Format: Paperback
Pages: 89
Edition: 1st ed. 2018
ISBN-13: 978-3-03-002112-2
Categories: Books > Computing & IT > Computer communications & networking > Network security
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > WAP (wireless) technology
Promotions
LSN: 3-03-002112-2
Barcode: 9783030021122

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

CISA - Certified Information Systems…
Cannon Paperback R1,704 R1,343 Discovery Miles 13 430
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,248 R1,109 Discovery Miles 11 090
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,405 Discovery Miles 24 050
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,432 R1,187 Discovery Miles 11 870
Security Careers - Skills, Compensation…
Stephen W. Walker, James E. Foushee Paperback R1,859 Discovery Miles 18 590
PCI Dss: A Pocket Guide
IT Governance Paperback R375 Discovery Miles 3 750
Two-Factor Authentication
Mark Stanislav Paperback R489 Discovery Miles 4 890
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R650 Discovery Miles 6 500
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,847 Discovery Miles 68 470
Hacking - Computer Hacking for…
Adam Dodson Hardcover R609 R515 Discovery Miles 5 150
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R8,595 Discovery Miles 85 950
Introduction to Computer Security…
Michael Goodrich, Roberto Tamassia Paperback R2,361 Discovery Miles 23 610

See more

Partners