|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910568275403321 |
|
|
Titolo |
Privacy preservation in IoT : machine learning approaches : a comprehensive survey and use cases / / Youyang Qu [and three others] |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Singapore : , : Springer, , [2022] |
|
©2022 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (127 pages) |
|
|
|
|
|
|
Collana |
|
SpringerBriefs in Computer Science |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data privacy |
Internet of things - Security measures |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Intro -- Preface -- Acknowledgments -- Contents -- 1 Introduction -- 1.1 IoT Privacy Research Landscape -- 1.2 Machine Learning Driven Privacy Preservation Overview -- 1.3 Contribution of This Book -- 1.4 Book Overview -- 2 Current Methods of Privacy Protection in IoTs -- 2.1 Briefing of Privacy Preservation Study in IoTs -- 2.2 Cryptography-Based Methods in IoTs -- 2.3 Anonymity-Based and Clustering-Based Methods -- 2.4 Differential Privacy Based Methods -- 2.5 Machine Learning and AI Methods -- 2.5.1 Federated Learning -- 2.5.2 Generative Adversarial Network -- References -- 3 Decentralized Privacy Protection of IoTs Using Blockchain-Enabled Federated Learning -- 3.1 Overview -- 3.2 Related Work -- 3.3 Architecture of Blockchain-Enabled Federated Learning -- 3.3.1 Federated Learning in FL-Block -- 3.3.2 Blockchain in FL-Block -- 3.4 Decentralized Privacy Mechanism Based on FL-Block -- 3.4.1 Blocks Establishment -- 3.4.2 Blockchain Protocols Design -- 3.4.3 Discussion on Decentralized Privacy Protection Using Blockchain -- 3.5 System Analysis -- 3.5.1 Poisoning Attacks and Defence -- 3.5.2 Single-Epoch FL-Block Latency Model -- 3.5.3 Optimal Generation Rate of Blocks -- 3.6 Performance Evaluation -- 3.6.1 Simulation Environment Description -- 3.6.2 Global Models and Corresponding Updates -- 3.6.3 Evaluation on Convergence and Efficiency -- 3.6.4 Evaluation on Blockchain -- 3.6.5 Evaluation on Poisoning Attack Resistance -- 3.7 Summary and Future Work -- |
|
|
|
|