Privacy Preservation in IoT: Machine Learning Approaches Privacy Preservation in IoT: Machine Learning Approaches
SpringerBriefs in Computer Science

Privacy Preservation in IoT: Machine Learning Approaches

A Comprehensive Survey and Use Cases

Youyang Qu and Others
    • €46.99
    • €46.99

Publisher Description

This book aims to sort out the clear logic of the development of machine learning-driven privacy preservation in IoTs, including the advantages and disadvantages, as well as the future directions in this under-explored domain. In big data era, an increasingly massive volume of data is generated and transmitted in Internet of Things (IoTs), which poses great threats to privacy protection. Motivated by this, an emerging research topic, machine learning-driven privacy preservation, is fast booming to address various and diverse demands of IoTs. However, there is no existing literature discussion on this topic in a systematically manner.


The issues of existing privacy protection methods (differential privacy, clustering, anonymity, etc.) for IoTs, such as low data utility, high communication overload, and unbalanced trade-off, are identified to the necessity of machine learning-driven privacy preservation. Besides, the leading and emerging attacks pose further threats to privacy protection in this scenario. To mitigate the negative impact, machine learning-driven privacy preservation methods for IoTs are discussed in detail on both the advantages and flaws, which is followed by potentially promising research directions.


Readers may trace timely contributions on machine learning-driven privacy preservation in IoTs. The advances cover different applications, such as cyber-physical systems, fog computing, and location-based services. This book will be of interest to forthcoming scientists, policymakers, researchers, and postgraduates.

GENRE
Computing & Internet
RELEASED
2022
27 April
LANGUAGE
EN
English
LENGTH
130
Pages
PUBLISHER
Springer Nature Singapore
PROVIDER INFO
Springer Science & Business Media LLC
SIZE
15.2
MB
Personalized Privacy Protection in Big Data Personalized Privacy Protection in Big Data
2021
Science of Cyber Security - SciSec 2022 Workshops Science of Cyber Security - SciSec 2022 Workshops
2023
Security, Privacy, and Anonymity in Computation, Communication, and Storage Security, Privacy, and Anonymity in Computation, Communication, and Storage
2017
Security, Privacy, and Anonymity in Computation, Communication, and Storage Security, Privacy, and Anonymity in Computation, Communication, and Storage
2021
Security and Privacy in New Computing Environments Security and Privacy in New Computing Environments
2019
Security and Privacy in New Computing Environments Security and Privacy in New Computing Environments
2022
Tools for Design, Implementation and Verification of Emerging Information Technologies Tools for Design, Implementation and Verification of Emerging Information Technologies
2023
Personalized Privacy Protection in Big Data Personalized Privacy Protection in Big Data
2021
The Amazing Journey of Reason The Amazing Journey of Reason
2019
Agile Risk Management Agile Risk Management
2014
Introduction to Ethical Software Development Introduction to Ethical Software Development
2025
Digital Image Forgery Detection Digital Image Forgery Detection
2025
Blockchain Without Barriers Blockchain Without Barriers
2025
Human Reconstruction Using mmWave Technology Human Reconstruction Using mmWave Technology
2025