Skip to main content

Context-Aware Privacy Preserving in Edge Computing

  • Chapter
  • First Online:
Privacy-Preserving in Edge Computing

Abstract

In edge computing, edge nodes are hierarchically arranged, while data transmission is allowed among edge nodes. Because end devices are the closest to raw data sources, they usually submit requests with sensitive information to the edge nodes. Privacy issues occur during the transmission process. In addition, when an end user sends a request to edge nodes, the end user connects to the closest edge node initially, and the request is passed to the upper-layer edge nodes for further processing when the resources of the initial nodes are exhausted. The resource limitation includes computation, storage capabilities, and the number of users. For example, if a user generates one request to the connected edge node exceeding its computation power, the upper-layer edge node will be involved in the operation. Additionally, the information will be transmitted to the other edge nodes, which might be malicious. Thus, privacy preservation is necessary to prevent privacy leakage from data transition among multiple edge nodes in hierarchical structures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. F. Bonomi, R. Milito, P. Natarajan, J. Zhu, Fog Computing: A Platform for Internet of Things and Analytics (Springer International Publishing, Cham, 2014), pp. 169–186

    Google Scholar 

  2. Q. Wang, Y. Zhang, X. Lu, Z. Wang, Z. Qin, K. Ren, Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy. IEEE Trans. Depend. Secure Comput. 15(4), 591–606 (2018)

    Google Scholar 

  3. Y. Qu, S. Yu, W. Zhou, S. Peng, G. Wang, K. Xiao, Privacy of things: emerging challenges and opportunities in wireless internet of things. IEEE Wirel. Commun. 25(6), 91–97 (2018)

    Article  Google Scholar 

  4. M. Abu Alsheikh, D.T. Hoang, D. Niyato, H. Tan, S. Lin, Markov decision processes with applications in wireless sensor networks: a survey. IEEE Commun. Surv. Tutor. 17(3), 1239–1267 (thirdquarter 2015)

    Google Scholar 

  5. Z. Zhou, M. Dong, K. Ota, R. Shi, Z. Liu, T. Sato, Game-theoretic approach to energy-efficient resource allocation in device-to-device underlay communications. IET Commun. 9(3), 375–385 (2015)

    Article  Google Scholar 

  6. V. Srivastava, J. Neel, A.B. Mackenzie, R. Menon, L.A. Dasilva, J.E. Hicks, J.H. Reed, R.P. Gilles, Using game theory to analyze wireless ad hoc networks. IEEE Commun. Surv. Tutor. 7(4), 46–56 (fourth 2005)

    Google Scholar 

  7. Yelp 12th round dataset. https://www.yelp.com/dataset. Accessed October 2018

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Gao, L., Luan, T.H., Gu, B., Qu, Y., Xiang, Y. (2021). Context-Aware Privacy Preserving in Edge Computing. In: Privacy-Preserving in Edge Computing. Wireless Networks. Springer, Singapore. https://doi.org/10.1007/978-981-16-2199-4_3

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-2199-4_3

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-2198-7

  • Online ISBN: 978-981-16-2199-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics