Survey on edge computing security

H Zeyu, X Geming, W Zhaohang… - … Conference on Big Data …, 2020 - ieeexplore.ieee.org
With the advent of the Internet of Everything, emerging application scenarios including
autonomous driving, immersive games based on VR or AR technology, and Industrial …

A Survey on Privacy-Preserving Caching at Network Edge: Classification, Solutions, and Challenges

X Zhang, Y Zhou, D Wu, QZ Sheng, S Riaz… - ACM Computing …, 2025 - dl.acm.org
Caching content at the edge network is a popular and effective technique widely deployed to
alleviate the burden of network backhaul, shorten service delay, and improve service quality …

The capacity of private information retrieval from heterogeneous uncoded caching databases

K Banawan, B Arasli, YP Wei… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
We consider private information retrieval (PIR) of a single file out of K files from N non-
colluding databases with heterogeneous storage constraints m=(m 1,⋯, m N). The aim of this …

Private set intersection: A multi-message symmetric private information retrieval perspective

Z Wang, K Banawan, S Ulukus - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
We study the problem of private set intersection (PSI). In this problem, there are two entities,
for, each storing a set, whose elements are picked from a finite set, on replicated and non …

Multi-party private set intersection: An information-theoretic approach

Z Wang, K Banawan, S Ulukus - IEEE Journal on Selected …, 2021 - ieeexplore.ieee.org
We investigate the problem of multi-party private set intersection (MP-PSI). In MP-PSI, there
are M parties, each storing a data set P i over N i replicated and non-colluding databases …

Semantic private information retrieval

S Vithana, K Banawan, S Ulukus - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
We investigate the problem of semantic private information retrieval (semantic PIR). In
semantic PIR, a user retrieves a message out of independent messages stored in replicated …

The capacity of private information retrieval from decentralized uncoded caching databases

YP Wei, B Arasli, K Banawan, S Ulukus - Information, 2019 - mdpi.com
We consider the private information retrieval (PIR) problem from decentralized uncoded
caching databases. There are two phases in our problem setting, a caching phase, and a …

Private information retrieval from non-replicated databases

K Banawan, S Ulukus - 2019 IEEE International Symposium on …, 2019 - ieeexplore.ieee.org
We consider the problem of private information retrieval (PIR) of a single message out of K
messages from N non-colluding and non-replicated databases. Different from the majority of …

The capacity of private information retrieval under arbitrary collusion patterns for replicated databases

X Yao, N Liu, W Kang - IEEE Transactions on Information …, 2021 - ieeexplore.ieee.org
We study the private information retrieval (PIR) problem under arbitrary collusion patterns for
replicated databases. We find a general characterization of the PIR capacity, which is the …

Symmetric private information retrieval at the private information retrieval rate

Z Wang, S Ulukus - IEEE Journal on Selected Areas in …, 2022 - ieeexplore.ieee.org
We consider the problem of symmetric private information retrieval (SPIR) with user-side
common randomness. In SPIR, a user retrieves a message out of messages from non …