TY - BOOK AU - Zhang,Guanglin AU - Zhao,Ping AU - Zhang,Anqi ED - SpringerLink (Online service) TI - Privacy Preservation in Distributed Systems: Algorithms and Applications T2 - Signals and Communication Technology, SN - 9783031580130 AV - TK5101-5105.9 U1 - 621.382 23 PY - 2024/// CY - Cham PB - Springer Nature Switzerland, Imprint: Springer KW - Telecommunication KW - Computational intelligence KW - Machine learning KW - Communications Engineering, Networks KW - Computational Intelligence KW - Machine Learning N1 - Introduction -- Part I Privacy lssues in Data Aggregation -- LocMIA: Membership Inference Attacks against Aggregated Location Data -- Synthesizing Privacy Preserving Traces: Enhancing Plausibility with Social Networks -- DAML: Practical Secure Protocol for Data Aggregation based Machine Learning -- Enhancing Privacy Preservation in Speech Data Publishing -- Part II Privacy Issues in Indoor Localization -- Lightweight Privacy-Preserving Scheme in WiFi Fingerprint-Based Indoor Localization -- P3LOC: A Privacy-Preserving Paradigm-Driven framework for Indoor Localization -- Preserving Privacy in WiFi Localization with Plausible Dummy Locations -- Part III Privacy-Preserving Offloading in MEC -- Deep Reinforcement Learning-based Joint Optimization of Delay and Privacy in Multiple-User MEC Systems -- Load Balancing for Energy-Harvesting Mobile Edge Computing -- Learning-based Joint Optimization of Energy-Delay and Privacyin Multiple-User Edge-Cloud Collaboration MEC Systems N2 - This book provides a discussion of privacy in the following three parts: Privacy Issues in Data Aggregation; Privacy Issues in Indoor Localization; and Privacy-Preserving Offloading in MEC. In Part 1, the book proposes LocMIA, which shifts from membership inference attacks against aggregated location data to a binary classification problem, synthesizing privacy preserving traces by enhancing the plausibility of synthetic traces with social networks. In Part 2, the book highlights Indoor Localization to propose a lightweight scheme that can protect both location privacy and data privacy of LS. In Part 3, it investigates the tradeoff between computation rate and privacy protection for task offloading a multi-user MEC system, and verifies that the proposed load balancing strategy improves the computing service capability of the MEC system. In summary, all the algorithms discussed in this book are of great significance in demonstrating the importance of privacy. Addresses privacy concerns related to Data Aggregation, Indoor Localization, and Mobile Edge Computing; Introduces innovative solutions and algorithms to tackle privacy challenges; Offers readers a forward-looking perspective into future developments and challenges in privacy research UR - http://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-58013-0 ER -