File(s) not publicly available
Privacy Issues in Edge Computing
chapter
posted on 2021-01-01, 00:00 authored by Longxiang GaoLongxiang Gao, T H Luan, B Gu, Youyang Qu, Yong XiangYong XiangEdge computing extends computing from the cloud to the end near the user and directly processes and makes decisions on the data locally. To a certain extent, it avoids the long-distance transmission of data in the network and reduces the risk of privacy disclosure. However, because edge devices obtain first-hand user data, they can obtain sensitive privacy data. For example, in the edge computing scenario of telecom operators, curious users of edge nodes can easily collect and pry into other users’ location information, service content, and usage frequency. In most of edge computing scenarios, edge nodes lack effective encryption or desensitization measures compared with traditional cloud centers. Once attacked, sniffed and corroded by hackers, stored household consumption, personal health information in the electronic medical system, road event vehicle information, etc. will be leaked.