04105nam 22005895 450 991086526690332120250807153306.03-031-58013-310.1007/978-3-031-58013-0(MiAaPQ)EBC31359069(Au-PeEL)EBL31359069(CKB)32200393700041(DE-He213)978-3-031-58013-0(EXLCZ)993220039370004120240531d2024 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierPrivacy Preservation in Distributed Systems Algorithms and Applications /by Guanglin Zhang, Ping Zhao, Anqi Zhang1st ed. 2024.Cham :Springer Nature Switzerland :Imprint: Springer,2024.1 online resource (266 pages)Signals and Communication Technology,1860-48703-031-58012-5 Introduction -- Part I Privacy lssues in Data Aggregation -- LocMIA: Membership Inference Attacks against Aggregated Location Data -- Synthesizing Privacy Preserving Traces: Enhancing Plausibility with Social Networks -- DAML: Practical Secure Protocol for Data Aggregation based Machine Learning -- Enhancing Privacy Preservation in Speech Data Publishing -- Part II Privacy Issues in Indoor Localization -- Lightweight Privacy-Preserving Scheme in WiFi Fingerprint-Based Indoor Localization -- P3LOC: A Privacy-Preserving Paradigm-Driven framework for Indoor Localization -- Preserving Privacy in WiFi Localization with Plausible Dummy Locations -- Part III Privacy-Preserving Offloading in MEC -- Deep Reinforcement Learning-based Joint Optimization of Delay and Privacy in Multiple-User MEC Systems -- Load Balancing for Energy-Harvesting Mobile Edge Computing -- Learning-based Joint Optimization of Energy-Delay and Privacyin Multiple-User Edge-Cloud Collaboration MEC Systems.This book provides a discussion of privacy in the following three parts: Privacy Issues in Data Aggregation; Privacy Issues in Indoor Localization; and Privacy-Preserving Offloading in MEC. In Part 1, the book proposes LocMIA, which shifts from membership inference attacks against aggregated location data to a binary classification problem, synthesizing privacy preserving traces by enhancing the plausibility of synthetic traces with social networks. In Part 2, the book highlights Indoor Localization to propose a lightweight scheme that can protect both location privacy and data privacy of LS. In Part 3, it investigates the tradeoff between computation rate and privacy protection for task offloading a multi-user MEC system, and verifies that the proposed load balancing strategy improves the computing service capability of the MEC system. In summary, all the algorithms discussed in this book are of great significance in demonstrating the importance of privacy. Addresses privacy concerns related to Data Aggregation, Indoor Localization, and Mobile Edge Computing; Introduces innovative solutions and algorithms to tackle privacy challenges; Offers readers a forward-looking perspective into future developments and challenges in privacy research.Signals and Communication Technology,1860-4870TelecommunicationComputational intelligenceMachine learningCommunications Engineering, NetworksComputational IntelligenceMachine LearningTelecommunication.Computational intelligence.Machine learning.Communications Engineering, Networks.Computational Intelligence.Machine Learning.621,382Zhang Guanglin1742657Zhao Ping1350298Zhang Anqi1059749MiAaPQMiAaPQMiAaPQBOOK9910865266903321Privacy Preservation in Distributed Systems4169367UNINA