Survey of Application of Differential Privacy in Edge Computing
In order to address the latency and bandwidth limitations of the traditional cloud computing model and to cope with the demands of the Internet of Things and the big data era,edge computing is making its appearance and gaining widespread atten-tion.In the edge computing environment,the privacy of user data has become an important research hotspot.The combination of differential privacy techniques,which have a solid mathematical foundation,has been widely used in edge computing as an effec-tive privacy-preserving algorithm to improve the problem of low privacy protection and high computational cost.The problems brought about by the development of the Internet are firstly introduced,followed by the basic concepts,features and components of edge computing,and the advantages compared with traditional cloud computing are outlined.The basic concepts and principles of differential privacy are again outlined,followed by a detailed description of the three perturbation methods and common imple-mentation mechanisms of differential privacy,and finally the research on the application of differential privacy under edge compu-ting is reviewed.Finally,the research on the application of differential privacy under edge computing is reviewed and future re-search directions are pointed out.In conclusion,the application of differential privacy techniques to edge computing scenarios is an effective means to protect privacy and data sharing.
Edge computingDifferential privacyLocal differential privacyPrivacy preservingReal-time data processing