Decentralized Privacy Preservation in Smart Cities [electronic resource] / by Cheng Huang, Xuemin (Sherman) Shen.

Por: Huang, Cheng [author.]Colaborador(es): Shen, Xuemin (Sherman) [author.] | SpringerLink (Online service)Tipo de material: TextoTextoSeries Wireless NetworksEditor: Cham : Springer Nature Switzerland : Imprint: Springer, 2024Edición: 1st ed. 2024Descripción: XII, 168 p. 45 illus., 36 illus. in color. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9783031540752Tema(s): Cooperating objects (Computer systems) | Telecommunication | Data protection -- Law and legislation | Cyber-Physical Systems | Communications Engineering, Networks | PrivacyFormatos físicos adicionales: Printed edition:: Sin título; Printed edition:: Sin título; Printed edition:: Sin títuloClasificación CDD: 621.38 Clasificación LoC:TK7895.E42TK5105.8857Recursos en línea: Libro electrónicoTexto
Contenidos:
Chapter 1. Introduction -- Chapter 2. Basic Techniques for Decentralized Privacy Preservation -- Chapter 3. Privacy-Preserving Identity Management in Car Sharing -- Chapter 4. Privacy-Preserving Cross-Domain Authentication in Internet of Things -- Chapter 5. Privacy-Preserving Data Analytics in Usage-Based Insurance -- Chapter 6. Privacy-Preserving Data Search in Cloud Storage -- Chapter 7. Conclusions and Future Research Directions.
En: Springer Nature eBookResumen: This book investigates decentralized trust-based privacy-preserving solutions in smart cities. The authors first present an overview of smart cities and privacy challenges and discuss the benefits of adopting decentralized trust models in achieving privacy preservation. The authors then give a comprehensive review of fundamental decentralized techniques and privacy-preserving cryptographic techniques. The next four chapters each detail a decentralized trust-based scheme, focusing respectively on privacy-preserving identity management, cross-domain authentication, data analytics, and data search, in specific use cases. Finally, the book explores open issues and outlines future research directions in the field of decentralized privacy preservation. Discusses benefits and challenges of applying decentralized trusts in smart cities Provides scheme designs and security analysis for use cases in smart cities, offering insights into applications Includes cryptographic knowledge accompanied by practical algorithm and protocol implementations.
Star ratings
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Colección Signatura Copia número Estado Fecha de vencimiento Código de barras
Libro Electrónico Biblioteca Electrónica
Colección de Libros Electrónicos 1 No para préstamo

Chapter 1. Introduction -- Chapter 2. Basic Techniques for Decentralized Privacy Preservation -- Chapter 3. Privacy-Preserving Identity Management in Car Sharing -- Chapter 4. Privacy-Preserving Cross-Domain Authentication in Internet of Things -- Chapter 5. Privacy-Preserving Data Analytics in Usage-Based Insurance -- Chapter 6. Privacy-Preserving Data Search in Cloud Storage -- Chapter 7. Conclusions and Future Research Directions.

This book investigates decentralized trust-based privacy-preserving solutions in smart cities. The authors first present an overview of smart cities and privacy challenges and discuss the benefits of adopting decentralized trust models in achieving privacy preservation. The authors then give a comprehensive review of fundamental decentralized techniques and privacy-preserving cryptographic techniques. The next four chapters each detail a decentralized trust-based scheme, focusing respectively on privacy-preserving identity management, cross-domain authentication, data analytics, and data search, in specific use cases. Finally, the book explores open issues and outlines future research directions in the field of decentralized privacy preservation. Discusses benefits and challenges of applying decentralized trusts in smart cities Provides scheme designs and security analysis for use cases in smart cities, offering insights into applications Includes cryptographic knowledge accompanied by practical algorithm and protocol implementations.

UABC ; Perpetuidad

Con tecnología Koha