Privacy preserving data aggregation scheme for mobile edge computing assisted IoT applications

X Li, S Liu, F Wu, S Kumari… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
… cloud computing cannot satisfy the requirements, such as low latency, fast data access for IoT
applications. Mobile edge computing (… In this paper, we propose a privacy preserving data …

Data security and privacy-preserving in edge computing paradigm: Survey and open issues

J Zhang, B Chen, Y Zhao, X Cheng, F Hu - IEEE access, 2018 - ieeexplore.ieee.org
… and privacy requirements and challenges in edge computing. We also established a
research architecture of data security in edge computing, in… , access control and privacy-preserving. …

TrustChain: A privacy preserving blockchain with edge computing

U Jayasinghe, GM Lee, Á MacDermott… - … Mobile Computing, 2019 - Wiley Online Library
… a privacy perceiving edge computing architecture based on the concepts of ROOF (ROOF:
Real-Time Onsite Operations Facilitations), Fog, and Cloud computingprivacy preserving and …

Keep your data locally: Federated-learning-based data privacy preservation in edge computing

G Liu, C Wang, X Ma, Y Yang - IEEE Network, 2021 - ieeexplore.ieee.org
… In response to these concerns, we focus on proposing a privacy-preserving framework of
edge computing in this article, which attempts to keep the user data on their local storage. …

An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles

X Xu, Y Xue, L Qi, Y Yuan, X Zhang, T Umer… - Future Generation …, 2019 - Elsevier
… To address this challenge, an edge computing-enabled computation offloading … privacy
preservation for IoV is proposed in this paper. Technically, the privacy conflicts of the computing

Survey on multi-access edge computing security and privacy

P Ranaweera, AD Jurcut… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
… The privacy aspects of MEC deployments are analyzed in Section V. This … MEC privacy
issues in establishing objectives to preserve privacy. Moreover, state-of-the-art privacy preserving

A survey of privacy-preserving offloading methods in mobile-edge computing

T Li, X He, S Jiang, J Liu - Journal of Network and Computer Applications, 2022 - Elsevier
… , serious privacy concerns come along with offloading, due to the vulnerability of edge
Although many research efforts have been devoted to privacy-preserving offloading in recent years…

ECA: An edge computing architecture for privacy-preserving in IoT-based smart city

M Gheisari, QV Pham, M Alazab, X Zhang… - IEEE …, 2019 - ieeexplore.ieee.org
… In this paper, we propose a new privacy-preserving architecture for IoT devices in the smart
… the edge of the network. At first, we propose an ontology that consists of privacy information …

Privacy on the edge: Customizable privacy-preserving context sharing in hierarchical edge computing

B Gu, L Gao, X Wang, Y Qu, J Jin… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
privacy-preserving model in edge computing (MDP-PPFC) environments. The efficiency of
the privacy preservation … protect both privacy issues in a hierarchical edge computing structure…

Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks

K Gai, Y Wu, L Zhu, L Xu… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
privacy-preserving capability and SGN’s functionality. According to our survey, edge computing
… increase the capability of edge computing from preserving privacy, tamper-resistant, and …