2018
DOI: 10.1109/access.2018.2820162
|View full text |Cite
|
Sign up to set email alerts
|

Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
206
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 340 publications
(206 citation statements)
references
References 122 publications
0
206
0
Order By: Relevance
“…It should be noted that our work aims to improve the algorithm efficiency, while the privacy protection of sensitive data is not taken into account. At present, data security has become a focus of attention in the field of artificial intelligence, and some solutions for data privacy protection in complex systems with edge computing have been proposed [41][42][43][44]. In our future work, how to improve the efficiency of quantum machine learning algorithms while ensuring the privacy protection of sensitive data, such as [45][46][47][48], will become our direction.…”
Section: Conclusion and Discussionmentioning
confidence: 99%
“…It should be noted that our work aims to improve the algorithm efficiency, while the privacy protection of sensitive data is not taken into account. At present, data security has become a focus of attention in the field of artificial intelligence, and some solutions for data privacy protection in complex systems with edge computing have been proposed [41][42][43][44]. In our future work, how to improve the efficiency of quantum machine learning algorithms while ensuring the privacy protection of sensitive data, such as [45][46][47][48], will become our direction.…”
Section: Conclusion and Discussionmentioning
confidence: 99%
“…(3) Edge computing can utilize idle resources effectively, which helps further reduce the load of central processing. (4) Edge computing enhances the offline protection of privacy and security [27]. Although a cloud-based solution may also help offload the computation overhead of security protection, users are required to hand in their security keys to cloud servers.…”
Section: Edge Computingmentioning
confidence: 99%
“…Lu et al 5 proposed the LDPA scheme, which can aggregate heterogeneous data on the Internet of things (IoT) applications. In the cloud environment, privacy leakage is one of the major threats because the data of users (including some sensitive personal information) have shifted gradually from their mobile devices to cloud servers 6 . In IoT environments, privacy issues are more severe since there are a great number of users, edge servers, and potential adversaries.…”
Section: Introductionmentioning
confidence: 99%