2018
DOI: 10.1002/cpe.4735
|View full text |Cite
|
Sign up to set email alerts
|

Differential privacy–based location privacy enhancing in edge computing

Abstract: In the era of edge computing, real-time data preprocessing on the edge node has the potential to improve computational efficiency and data accuracy. However, a significant challenge is private data disclosure, particularly in the case of location-based services. To address this challenge, in this paper, by leveraging differential privacy, we propose a privacy-aware framework for mobile edge computing called MEPA to protect the location privacy in which the edge node is regarded as an anonymous central server. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 19 publications
(16 citation statements)
references
References 29 publications
(51 reference statements)
0
16
0
Order By: Relevance
“…Another work describes the provision of computing services without deploying appropriate infrastructure. In this architecture, the authors solve the problem of constrained computing resources at the edge nodes, and present an algorithm to tackle two‐dimensional spatial data query transmission between the edge nodes. They also present statistical data on moving objects, satisfying the differential privacy preserving model and guaranteeing that the count query of the moving object's position data satisfies differential privacy.…”
Section: Summary Of Contributionsmentioning
confidence: 99%
“…Another work describes the provision of computing services without deploying appropriate infrastructure. In this architecture, the authors solve the problem of constrained computing resources at the edge nodes, and present an algorithm to tackle two‐dimensional spatial data query transmission between the edge nodes. They also present statistical data on moving objects, satisfying the differential privacy preserving model and guaranteeing that the count query of the moving object's position data satisfies differential privacy.…”
Section: Summary Of Contributionsmentioning
confidence: 99%
“…However, considering the limitations of the geo-indistinguishable mechanism, the following premises are required for the inference of a relatively complete perceptual data matrix: (1) the users are uniformly distributed in the region; in other words, the probability that each user appears in the region is equal. Assuming that there are four regions, the probability that region 4 is mapped to another region is equal, p [4,1] = p [4,2] = p [4,3] = p [4,4] = 0; (2) the data reported by the user is accurate.…”
Section: Data Loss and Reconstruction Of Location Differential Prmentioning
confidence: 99%
“…The amount of data is growing rapidly, and the time consumed in the data transmission has become the main challenge that restricts the cloud computing applications. In the cloud computing model, the devices at the edge often only act as consumers; however, people often generate data from the devices that they use [1]. This shift from data consumers to data consumers/producers requires more functionality on the edge node.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In case the communication link between the user and the edge is broken or hacked, then the privacy for personal information is not assured. Due to these reasons, DP is also incorporated into edge computing where the security risk is large [11]- [13]. The existence of common challenges in the provisioning of DP here is,…”
Section: Introductionmentioning
confidence: 99%