File(s) not publicly available

Privacy Issues in Edge Computing

chapter
posted on 2021-01-01, 00:00 authored by Longxiang GaoLongxiang Gao, T H Luan, B Gu, Youyang Qu, Yong XiangYong Xiang
Edge computing extends computing from the cloud to the end near the user and directly processes and makes decisions on the data locally. To a certain extent, it avoids the long-distance transmission of data in the network and reduces the risk of privacy disclosure. However, because edge devices obtain first-hand user data, they can obtain sensitive privacy data. For example, in the edge computing scenario of telecom operators, curious users of edge nodes can easily collect and pry into other users’ location information, service content, and usage frequency. In most of edge computing scenarios, edge nodes lack effective encryption or desensitization measures compared with traditional cloud centers. Once attacked, sniffed and corroded by hackers, stored household consumption, personal health information in the electronic medical system, road event vehicle information, etc. will be leaked.

History

Title of book

Wireless Networks(United Kingdom)

Pagination

15 - 34

ISSN

2366-1186

eISSN

2366-1445

Publication classification

BN Other book chapter, or book chapter not attributed to Deakin

Usage metrics

Read the peer-reviewed publication

Categories

Keywords

Exports