Trust, Security and Privacy for Big Data 2022
DOI: 10.1201/9781003194538-2
|View full text |Cite
|
Sign up to set email alerts
|

Federated Learning Role in Big Data, Jot Services and Applications Security, Privacy and Trust in Jot A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

2
7

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…Autonomous driving technology is making its way into regular vehicles with the advancement of vehicular IoT. A reliable self-driving system requires a real-time connection with a multi-access communication environment ( Yarradoddi & Gadekallu, 2022 ). Spatial and temporal variations of the vehicular environment necessitate an intelligent solution that can adapt to the changing climate.…”
Section: Resultsmentioning
confidence: 99%
“…Autonomous driving technology is making its way into regular vehicles with the advancement of vehicular IoT. A reliable self-driving system requires a real-time connection with a multi-access communication environment ( Yarradoddi & Gadekallu, 2022 ). Spatial and temporal variations of the vehicular environment necessitate an intelligent solution that can adapt to the changing climate.…”
Section: Resultsmentioning
confidence: 99%
“…In general, big data is currently characterized by seven Vs as follows: volume (a large amount of data), variety (including structured, semi-structured, and unstructured data with different formats), velocity (high rates of data inflow and real-time processing), veracity (detailed data accumulation), value (in-depth and meaningful information), variability (offering extensionality and scalability), and valence (data interconnection) [49]. About the big data workflow, a four-step process should be followed with big data generation (generated from different sources: internal data from hospitals and medical centers, IoT data, data from Internet, and biomedical data), big data acquisition (including data collection, transmission, and pre-processing), big data storage, and big data analysis [50], [51], [52].…”
Section: B Big Datamentioning
confidence: 99%
“…For the idealized distributed settings with i.i.d. data and no attacks, which cannot be guaranteed for edge IoT systems [56], PSO and FL are integrated [55] in a simplistic manner. The majority of earlier works emphasized client communication and broad optimization to boost the performance of FL.…”
Section: Related Workmentioning
confidence: 99%