000 05431nam a22005895i 4500
001 978-3-030-02113-9
003 DE-He213
005 20210201191259.0
007 cr nn 008mamaa
008 181112s2018 gw | s |||| 0|eng d
020 _a9783030021139
_9978-3-030-02113-9
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
082 0 4 _a005.8
_223
100 1 _aLin, Xiaodong.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aPrivacy-Enhancing Fog Computing and Its Applications
_h[electronic resource] /
_cby Xiaodong Lin, Jianbing Ni, Xuemin (Sherman) Shen.
250 _a1st ed. 2018.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2018.
300 _aXII, 89 p. 14 illus., 13 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSpringerBriefs in Electrical and Computer Engineering,
_x2191-8112
500 _aAcceso multiusuario
505 0 _a1 Introduction -- 2 Privacy-enhancing Technologies -- 3 Identity Privacy Protection in Smart Parking Navigation -- 4 Location Privacy Protection in Mobile Crowdsensing -- 5 Data Privacy Protection in Smart Grid -- 6 Conclusions and Future Directions.
520 _aThis SpringerBrief covers the security and privacy challenges in fog computing, and proposes a new secure and privacy-preserving mechanisms to resolve these challenges for securing fog-assisted IoT applications. Chapter 1 introduces the architecture of fog-assisted IoT applications and the security and privacy challenges in fog computing. Chapter 2 reviews several promising privacy-enhancing techniques and illustrates examples on how to leverage these techniques to enhance the privacy of users in fog computing. Specifically, the authors divide the existing privacy-enhancing techniques into three categories: identity-hidden techniques, location privacy protection and data privacy enhancing techniques. The research is of great importance since security and privacy problems faced by fog computing impede the healthy development of its enabled IoT applications. With the advanced privacy-enhancing techniques, the authors propose three secure and privacy-preserving protocols for fog computing applications, including smart parking navigation, mobile crowdsensing and smart grid. Chapter 3 introduces identity privacy leakage in smart parking navigation systems, and proposes a privacy-preserving smart parking navigation system to prevent identity privacy exposure and support efficient parking guidance retrieval through road-side units (fogs) with high retrieving probability and security guarantees. Chapter 4 presents the location privacy leakage, during task allocation in mobile crowdsensing, and propose a strong privacy-preserving task allocation scheme that enables location-based task allocation and reputation-based report selection without exposing knowledge about the location and reputation for participators in mobile crowdsensing. Chapter 5 introduces the data privacy leakage in smart grid, and proposes an efficient and privacy-preserving smart metering protocol to allow collectors (fogs) to achieve real-time measurement collection with privacy-enhanced data aggregation. Finally, conclusions and future research directions are given in Chapter 6. This brief validates the significant feature extension and efficiency improvement of IoT devices without sacrificing the security and privacy of users against dishonest fog nodes. It also provides valuable insights on the security and privacy protection for fog-enabled IoT applications. Researchers and professionals who carry out research on security and privacy in wireless communication will want to purchase this SpringerBrief. Also, advanced level students, whose main research area is mobile network security will also be interested in this SpringerBrief. .
541 _fUABC ;
_cTemporal ;
_d01/01/2021-12/31/2023.
650 0 _aData protection.
650 0 _aWireless communication systems.
650 0 _aMobile communication systems.
650 0 _aElectrical engineering.
650 1 4 _aSecurity.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I28000
650 2 4 _aWireless and Mobile Communication.
_0https://scigraph.springernature.com/ontologies/product-market-codes/T24100
650 2 4 _aCommunications Engineering, Networks.
_0https://scigraph.springernature.com/ontologies/product-market-codes/T24035
700 1 _aNi, Jianbing.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aShen, Xuemin (Sherman).
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030021122
776 0 8 _iPrinted edition:
_z9783030021146
830 0 _aSpringerBriefs in Electrical and Computer Engineering,
_x2191-8112
856 4 0 _zLibro electrónico
_uhttp://148.231.10.114:2048/login?url=https://doi.org/10.1007/978-3-030-02113-9
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cLIBRO_ELEC
999 _c241647
_d241646