Welcome to Francis Academic Press

Academic Journal of Computing & Information Science, 2022, 5(9); doi: 10.25236/AJCIS.2022.050911.

Privacy retrieval method of big data in mobile network based on edge computing

Author(s)

Pingping Jiao, Xianchun Zhou

Corresponding Author:
Pingping Jiao
Affiliation(s)

School of Information and Intelligence Engineering, Sanya University, Sanya, Hainan, China

Abstract

In order to better achieve the goal of big data privacy retrieval and ensure user data security, a mobile network big data privacy retrieval method based on edge computing is proposed. Combined with the principle of edge computing, identify the privacy characteristics of mobile network big data, build a feature database for data management, optimize the privacy data security encryption algorithm, and simplify the privacy retrieval process of mobile network big data. Finally, experiments show that the mobile network big data privacy retrieval method based on edge computing has high security and effectiveness in the process of practical application, and fully meets the research requirements.

Keywords

edge calculation; Mobile network; Data privacy; Data retrieval

Cite This Paper

Pingping Jiao, Xianchun Zhou. Privacy retrieval method of big data in mobile network based on edge computing. Academic Journal of Computing & Information Science (2022), Vol. 5, Issue 9: 65-76. https://doi.org/10.25236/AJCIS.2022.050911.

References

[1] Zhang W, Chen X, Liu Y, Xi Q. 2020, A Distributed Storage and Computation k-Nearest Neighbor Algorithm Based Cloud-Edge Computing for Cyber-Physical-Social Systems. IEEE Access, PP (99):1-1.

[2] Sun Y, Song C, Yu S, Liu Y, Zeng P. 2021, Energy-Efficient Task Offloading Based on Differential Evolution in Edge Computing System With Energy Harvesting. IEEE Access, 9:16383-16391.

[3] Xie Y. 2021, Research on Vertical Search Method of Multidimensional Resources in English Discipline Based on Edge Computing. Mobile Information Systems, 2021(1):1-10.

[4] Kim J, Lee J, Kim T. 2021, AdaMM: Adaptive Object Movement and Motion Tracking in Hierarchical Edge Computing System. Sensors, 21(12):4089.

[5] Martino B D, Venticinque S, Esposito A, D'Angelo S. 2020, A Methodology Based on Computational Patterns for Offloading of Big Data Applications on Cloud-Edge Platforms. Future Internet, 12(2):28.

[6] Andrejev A, Orsborn K, Risch T. 2020, Strategies for array data retrieval from a relational back-end based on access patterns. Computing, 102(5):1139-1158.

[7] Cw A, Fang Q B, Djsr C. 2020, Cloud assisted big data information retrieval system for critical data supervision in disaster regions - ScienceDirect. Computer Communications, 151(56):548-555.

[8] Li Z F. 2021, Research on mobile network coverage quality evaluation method based on grid and big data. Wireless Internet technology, 18 (09): 24-25.

[9] Gezawa A S, Zhang Y, Wang Q, Lei Y. 2020, A Review on Deep Learning Approaches for 3D Data Representations in Retrieval and Classifications. IEEE Access, 8(6):57566-57593.

[10] Marcos-Pablos S, FJ García-Pealvo. 2020, Information retrieval methodology for aiding scientific database search. Soft Computing, 24(8):5551-5560.

[11] Seeling P. 2020, WWW Retrieval Handling Optimization wρ3: A metric for webpage timeout setting performance evaluation and comparison - ScienceDirect. Future Generation Computer Systems, 110(3):1055-1066.

[12] B Y W A, A J L, B W D, Xiaolong Xu c, Buqing Cao a, Jinjun Chen a d. 2020, Scheduling workflows with privacy protection constraints for big data applications on cloud. Future Generation Computer Systems, 108(3):1084-1091.

[13] Liu J M, Zhao H Q, Liu C, Jia QQ. 2021, Privacy Data Security Policy of Medical Cloud Platform Based on Lightweight Algorithm Model. Scientific Programming, 2021(4):1-9.

[14] Sheikhalishahi M, Saracino A, Martinelli F, Marra AL. 2021, Privacy preserving data sharing and analysis for edge-based architectures. International Journal of Information Security, 34(12):1-23.

[15] Zapechnikov S. 2021, Contemporary trends in privacy-preserving data pattern recognition. Procedia Computer Science, 190(4):838-844.

[16] Aivazpour Z, Rao V. 2020, Information Disclosure and Privacy Paradox: The Role of Impulsivity. The data base for advances in information systems, 51(1):14-36.

[17] Hua J. 2020, A privacy-enhancing scheme against contextual knowledge-based attacks in location-based services. Frontiers of Computer Science, 14(3):1-4.

[18] Kousika N, Premalatha K. 2021, An improved privacy-preserving data mining technique using singular value decomposition with three-dimensional rotation data perturbation. The Journal of Supercomputing, 34(6):1-9.

[19] Gsa B, Xx A, Zq A, Wei LLB. 2021, Edge computing assisted privacy-preserving data computation for IoT devices. Computer Communications, 166(4):208-215.

[20] Hussain A, Lasrado L A, Mukkamala R R, Tanveer U. 2021, Sharing Is Caring – Design and Demonstration of a Data Privacy Tool for Interorganizational Transfer of Data. Procedia Computer Science, 181(PB):394-402.