Big Data Privacy Preserving in Multi-Access Edge Computing for Heterogeneous Internet of Things

被引:127
作者
Du, Miao [1 ]
Wang, Kun [2 ,4 ]
Chen, Yuanfang [5 ]
Wang, Xiaoyan [6 ]
Sun, Yanfei [3 ]
机构
[1] Nanjing Univ Posts & Telecommun, Informat Networks, Nanjing, Jiangsu, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Nanjing, Jiangsu, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Coll Telecommun & Informat Engn, Nanjing, Jiangsu, Peoples R China
[4] Hong Kong Polytech Univ, Hong Kong, Hong Kong, Peoples R China
[5] Hangzhou Dianzi Univ, Hangzhou, Zhejiang, Peoples R China
[6] Ibaraki Univ, Coll Engn, Mito, Ibaraki, Japan
基金
中国博士后科学基金;
关键词
NETWORKS;
D O I
10.1109/MCOM.2018.1701148
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the popularity of smart devices, multi-access edge computing (MEC) has become the mainstream of dealing with big data in heterogeneous Internet of Things (H-IoT). MEC makes full use of the computing power of edge nodes, which greatly reduces the computing pressure of data centers, and brings great convenience to the storage and processing of big data. However, it is easy to become the object of hacker attacks due to the lack of centralized management of distributed nodes. Once these nodes are compromised, a series of privacy issues can happen. In this article, we first overview the architecture of MEC for H-IoT. The MEC covers three-level advanced functional entities, including moblie edge (ME) system-level, ME host-level and ME network-level. Second, we draw our attention to the privacy issues in the MEC, especially in data aggregation and data mining. In addition, we consider machine learning privacy preserving as a case study in the application of MEC. Simulation results are shown to reveal the feasibility of the proposed method. Finally, we propose open issues for future work.
引用
收藏
页码:62 / 67
页数:6
相关论文
共 15 条
[1]   Living on the Edge: The Role of Proactive Caching in 5G Wireless Networks [J].
Bastug, Ejder ;
Bennis, Mehdi ;
Debbah, Merouane .
IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (08) :82-89
[2]   FOGGY CLOUDS AND CLOUDY FOGS: A REAL NEED FOR COORDINATED MANAGEMENT OF FOG-TO-CLOUD COMPUTING SYSTEMS [J].
Masip-Bruin, Xavi ;
Marin-Tordera, Eva ;
Tashakor, Ghazal ;
Jukan, Admela ;
Ren, Guang-Jie .
IEEE WIRELESS COMMUNICATIONS, 2016, 23 (05) :120-128
[3]  
Papernot N, 2017, INT C LEARNING REPRE
[4]   CHARACTERIZING FLOW, APPLICATION, AND USER BEHAVIOR IN MOBILE NETWORKS: A FRAMEWORK FOR MOBILE BIG DATA [J].
Qiao, Yuanyuan ;
Xing, Zhizhuang ;
Fadlullah, Zubair Md. ;
Yang, Jie ;
Kato, Nei .
IEEE WIRELESS COMMUNICATIONS, 2018, 25 (01) :40-49
[5]   Mobile-Edge Computing Architecture The role of MEC in the Internet of Things [J].
Sabella, Dario ;
Vaillant, Alessandro ;
Kuure, Pekka ;
Rauschenbach, Uwe ;
Giust, Fabio .
IEEE CONSUMER ELECTRONICS MAGAZINE, 2016, 5 (04) :84-91
[6]   Mobile Edge Computing Potential in Making Cities Smarter [J].
Taleb, Tarik ;
Dutta, Sunny ;
Ksentini, Adlen ;
Iqbal, Muddesar ;
Flinck, Hannu .
IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (03) :38-43
[7]   Strategic Honeypot Game Model for Distributed Denial of Service Attacks in the Smart Grid [J].
Wang, Kun ;
Du, Miao ;
Maharjan, Sabita ;
Sun, Yanfei .
IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (05) :2474-2482
[8]   GREEN INDUSTRIAL INTERNET OF THINGS ARCHITECTURE: AN ENERGY-EFFICIENT PERSPECTIVE [J].
Wang, Kun ;
Wang, Yihui ;
Sun, Yanfei ;
Guo, Song ;
Wu, Jinsong .
IEEE COMMUNICATIONS MAGAZINE, 2016, 54 (12) :48-54
[9]   Attack Detection and Distributed Forensics in Machine-to-Machine Networks [J].
Wang, Kun ;
Du, Miao ;
Sun, Yanfei ;
Vinel, Alexey ;
Zhang, Yan .
IEEE NETWORK, 2016, 30 (06) :49-55
[10]  
Wang K, 2016, IEEE WIREL COMMUN, V23, P30, DOI 10.1109/MWC.2016.7721739