2023
DOI: 10.1016/j.array.2023.100293
|View full text |Cite
|
Sign up to set email alerts
|

Differential privacy in edge computing-based smart city Applications:Security issues, solutions and future directions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 87 publications
0
3
0
Order By: Relevance
“…However, this shift has also led to an expansion of potential vulnerabilities due to the intricate nature of largescale frameworks, resulting in increased points of entry from diverse sources [231], [232]. Addressing the future security concerns associated with safeguarding these control systems involves the utilization of security platforms hosted in the cloud [233]. To illustrate, consider innovative platforms that exemplify this approach: Cloud PLC Prototype: A cuttingedge concept known as the "cloud PLC 3 " employs the substantial analytical capabilities of cloud computing resources.…”
Section: E Computing Based On Cloudmentioning
confidence: 99%
“…However, this shift has also led to an expansion of potential vulnerabilities due to the intricate nature of largescale frameworks, resulting in increased points of entry from diverse sources [231], [232]. Addressing the future security concerns associated with safeguarding these control systems involves the utilization of security platforms hosted in the cloud [233]. To illustrate, consider innovative platforms that exemplify this approach: Cloud PLC Prototype: A cuttingedge concept known as the "cloud PLC 3 " employs the substantial analytical capabilities of cloud computing resources.…”
Section: E Computing Based On Cloudmentioning
confidence: 99%
“…Increased attack surface: Since data processing and storage happen on the edge devices themselves, edge computing gives hackers more ways to get in. This makes the attack area bigger and makes it more likely that someone will get in without permission, steal data, or get malware [51]. 2.…”
Section: Challenges In Integrating Edge Computing and Industry 50 In ...mentioning
confidence: 99%
“…This can make traditional cloud computing architectures inadequate in meeting the speed requirements of the IIoT [2]. Taking smart cities as an example, with the increasing amount of edge data and the growing demand for encryption, it has been shown that large-scale centralized server clusters in cloud computing are insufficient to meet the needs of rapidly expanding intelligent IoT systems [3].…”
Section: Introduction 1backgroundmentioning
confidence: 99%