|
Showing 1 - 7 of
7 matches in All Departments
With the rapid development of big data, it is necessary to transfer
the massive data generated by end devices to the cloud under the
traditional cloud computing model. However, the delays caused by
massive data transmission no longer meet the requirements of
various real-time mobile services. Therefore, the emergence of edge
computing has been recently developed as a new computing paradigm
that can collect and process data at the edge of the network, which
brings significant convenience to solving problems such as delay,
bandwidth, and off-loading in the traditional cloud computing
paradigm. By extending the functions of the cloud to the edge of
the network, edge computing provides effective data access control,
computation, processing and storage for end devices. Furthermore,
edge computing optimizes the seamless connection from the cloud to
devices, which is considered the foundation for realizing the
interconnection of everything. However, due to the open features of
edge computing, such as content awareness, real-time computing and
parallel processing, the existing problems of privacy in the edge
computing environment have become more prominent. The access to
multiple categories and large numbers of devices in edge computing
also creates new privacy issues. In this book, we discuss on the
research background and current research process of privacy
protection in edge computing. In the first chapter, the
state-of-the-art research of edge computing are reviewed. The
second chapter discusses the data privacy issue and attack models
in edge computing. Three categories of privacy preserving schemes
will be further introduced in the following chapters. Chapter three
introduces the context-aware privacy preserving scheme. Chapter
four further introduces a location-aware differential privacy
preserving scheme. Chapter five presents a new blockchain based
decentralized privacy preserving in edge computing. Chapter six
summarize this monograph and propose future research directions. In
summary, this book introduces the following techniques in edge
computing: 1) describe an MDP-based privacy-preserving model to
solve context-aware data privacy in the hierarchical edge computing
paradigm; 2) describe a SDN based clustering methods to solve the
location-aware privacy problems in edge computing; 3) describe a
novel blockchain based decentralized privacy-preserving scheme in
edge computing. These techniques enable the rapid development of
privacy-preserving in edge computing.
This book proposes the novel network envisions and framework design
principles, in order to systematically expound the next generation
vehicular networks, including the modelling, algorithms and
practical applications. It focuses on the key enabling technologies
to design the next generation vehicular networks with various
vehicular services to realize the safe, convenient and comfortable
driving. The next generation vehicular networks has emerged to
provide services with a high quality of experience (QoE) to
vehicles, where both better network maintainability and
sustainability can be obtained than before. The framework design
principles and related network architecture are also covered in
this book. Then, the series of research topics are discussed
including the reputation based content centric delivery, the
contract based mobile edge caching, the Stackelberg game model
based computation offloading, the auction game based secure
computation offloading, the bargain game based security protection
and the deep learning based autonomous driving. Finally, the
investigation, development and future works are also introduced for
designing the next generation vehicular networks. The primary
audience for this book are researchers, who work in computer
science and electronic engineering. Professionals working in the
field of mobile networks and communications, as well as engineers
and technical staff who work on the development or the standard of
computer networks will also find this book useful as a reference.
With the rapid development of big data, it is necessary to transfer
the massive data generated by end devices to the cloud under the
traditional cloud computing model. However, the delays caused by
massive data transmission no longer meet the requirements of
various real-time mobile services. Therefore, the emergence of edge
computing has been recently developed as a new computing paradigm
that can collect and process data at the edge of the network, which
brings significant convenience to solving problems such as delay,
bandwidth, and off-loading in the traditional cloud computing
paradigm. By extending the functions of the cloud to the edge of
the network, edge computing provides effective data access control,
computation, processing and storage for end devices. Furthermore,
edge computing optimizes the seamless connection from the cloud to
devices, which is considered the foundation for realizing the
interconnection of everything. However, due to the open features of
edge computing, such as content awareness, real-time computing and
parallel processing, the existing problems of privacy in the edge
computing environment have become more prominent. The access to
multiple categories and large numbers of devices in edge computing
also creates new privacy issues. In this book, we discuss on the
research background and current research process of privacy
protection in edge computing. In the first chapter, the
state-of-the-art research of edge computing are reviewed. The
second chapter discusses the data privacy issue and attack models
in edge computing. Three categories of privacy preserving schemes
will be further introduced in the following chapters. Chapter three
introduces the context-aware privacy preserving scheme. Chapter
four further introduces a location-aware differential privacy
preserving scheme. Chapter five presents a new blockchain based
decentralized privacy preserving in edge computing. Chapter six
summarize this monograph and propose future research directions. In
summary, this book introduces the following techniques in edge
computing: 1) describe an MDP-based privacy-preserving model to
solve context-aware data privacy in the hierarchical edge computing
paradigm; 2) describe a SDN based clustering methods to solve the
location-aware privacy problems in edge computing; 3) describe a
novel blockchain based decentralized privacy-preserving scheme in
edge computing. These techniques enable the rapid development of
privacy-preserving in edge computing.
This book proposes the novel network envisions and framework design
principles, in order to systematically expound the next generation
vehicular networks, including the modelling, algorithms and
practical applications. It focuses on the key enabling technologies
to design the next generation vehicular networks with various
vehicular services to realize the safe, convenient and comfortable
driving. The next generation vehicular networks has emerged to
provide services with a high quality of experience (QoE) to
vehicles, where both better network maintainability and
sustainability can be obtained than before. The framework design
principles and related network architecture are also covered in
this book. Then, the series of research topics are discussed
including the reputation based content centric delivery, the
contract based mobile edge caching, the Stackelberg game model
based computation offloading, the auction game based secure
computation offloading, the bargain game based security protection
and the deep learning based autonomous driving. Finally, the
investigation, development and future works are also introduced for
designing the next generation vehicular networks. The primary
audience for this book are researchers, who work in computer
science and electronic engineering. Professionals working in the
field of mobile networks and communications, as well as engineers
and technical staff who work on the development or the standard of
computer networks will also find this book useful as a reference.
This SpringerBrief presents key enabling technologies and
state-of-the-art research on delivering efficient content
distribution services to fast moving vehicles. It describes recent
research developments and proposals towards the efficient,
resilient and scalable content distribution to vehicles through
both infrastructure-based and infrastructure-less vehicular
networks. The authors focus on the rich multimedia services
provided by vehicular environment content distribution including
vehicular communications and media playback, giving passengers many
infotainment applications. Common problems of vehicular network
research are addressed, including network design and optimization,
standardization, and the adaptive playout from a user's
perspective.
|
Ad Hoc Networks and Tools for IT - 13th EAI International Conference, ADHOCNETS 2021, Virtual Event, December 6-7, 2021, and 16th EAI International Conference, TRIDENTCOM 2021, Virtual Event, November 24, 2021, Proceedings (Paperback, 1st ed. 2022)
Wei Bao, Xingliang Yuan, Longxiang Gao, Tom H. Luan, David Bong Jun Choi
|
R2,464
Discovery Miles 24 640
|
Ships in 10 - 15 working days
|
This book constitutes the refereed post-conference proceedings of
the 13th International Conference on Ad Hoc Networks, ADHOCNETS
2021, held in December 2021, and the 16th International Conference
on Tools for Design, Implementation and Verification of Emerging
Information Technologies, TRIDENTCOM 2021, held in November 2021.
Both conferences were held virtually due to COVID 19 pandemic. The
15 full papers of ADHOCNETS 2021 were selected from 29 submissions
and cover a variety of network paradigms including ad hoc networks
(MANETs), wireless sensor networks (WSNs), vehicular ad hoc
networks (Vanets), airborne networks, underwater networks,
underground networks, personal area networks, and home networks,
etc. It promises a wide range of applications in civilian,
commercial, and military areas. The 18 full papers were selected
from 47 submissions and deal the emerging technologies such as
Industry 4.0, blockchain, deep learning, cloud/edge/fog computing,
cyber physical systems, cybersecurity and computer communications.
This brief presents emerging and promising communication methods
for network reliability via delay tolerant networks (DTNs).
Different from traditional networks, DTNs possess unique features,
such as long latency and unstable network topology. As a result,
DTNs can be widely applied to critical applications, such as space
communications, disaster rescue, and battlefield communications.
The brief provides a complete investigation of DTNs and their
current applications, from an overview to the latest development in
the area. The core issue of data forward in DTNs is tackled,
including the importance of social characteristics, which is an
essential feature if the mobile devices are used for human
communication. Security and privacy issues in DTNs are discussed,
and future work is also discussed.
|
|