2019
DOI: 10.1109/jproc.2019.2918749
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Techniques for Edge Computing Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(20 citation statements)
references
References 46 publications
0
20
0
Order By: Relevance
“…Identified privacy regions are encrypted using a profile based privacy protection algorithm so that only the users with a valid access profile can decrypt the image. Privacy solutions specific to edge computing based applications [265] proposes basic privacy building blocks including differential privacy, paving the way for more sophisticated and application specific privacy solutions.…”
Section: G Privacy 1) Lessons Learnedmentioning
confidence: 99%
“…Identified privacy regions are encrypted using a profile based privacy protection algorithm so that only the users with a valid access profile can decrypt the image. Privacy solutions specific to edge computing based applications [265] proposes basic privacy building blocks including differential privacy, paving the way for more sophisticated and application specific privacy solutions.…”
Section: G Privacy 1) Lessons Learnedmentioning
confidence: 99%
“…To protect privacy, access control methods managing how different parties access information are necessary. Edge computing is beneficial to minimize data transmissions through different network elements and enable local processing, improving privacy aspects [33] . Furthermore, users of e-health technology should be made fully aware of what they are consenting to regarding data sharing and processing when they are using such digital solutions.…”
Section: Implementation Challengesmentioning
confidence: 99%
“…It is apparent that the proposed change of variables, transformed equation set (8) into the form appearing in equation set (12), after getting through the relations in (11).…”
Section: Equation Preparationmentioning
confidence: 99%
“…Thus, data encryption emerges as a mandatory element. Nowadays, many techniques and approaches are proposed in the context of the IoT, in all hierarchical levels of data communications, others for ensuring privacy [11] and others for practically ensuring security [12]. As a result, there exist numerous proposals in this sense, usually ubiquitous ones; one such promising option seems to lean towards using chaotic-based encoder-decoder schemes to secure and/or authenticate data transmission in general [13][14][15][16].…”
Section: Introductionmentioning
confidence: 99%