2019
DOI: 10.1109/access.2019.2922293
|View full text |Cite
|
Sign up to set email alerts
|

Data Loss and Reconstruction of Location Differential Privacy Protection Based on Edge Computing

Abstract: With the development of the Internet of Things (IoT), the delay caused by network transmission has led to low data processing efficiency. The emergence of edge computing can effectively reduce the delay of data transmission and improve data processing capacity. However, at the same time, the IoT faces important challenges, and edge computing uses a large number of distributed devices, making it difficult to perform centralized control. When an edge node is attacked, the attacker can continue to invade its conn… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 29 publications
0
1
0
Order By: Relevance
“…The system falls short of providing adequate security guarantees, leaving it vulnerable to internal and third-party attacks that may compromise the accuracy of location data [12,13]. The lack of a trusted identity verification mechanism in the authentication system increases the risk of user location information leakage.…”
Section: Introductionmentioning
confidence: 99%
“…The system falls short of providing adequate security guarantees, leaving it vulnerable to internal and third-party attacks that may compromise the accuracy of location data [12,13]. The lack of a trusted identity verification mechanism in the authentication system increases the risk of user location information leakage.…”
Section: Introductionmentioning
confidence: 99%