<div class="csl-bib-body">
<div class="csl-entry">Murturi, I., Sedlak, B., Farahani, R., & Dustdar, S. (2026). Performance Evaluation of Privacy Models for Data Streams on the Edge. <i>Internet Technology Letters</i>, <i>9</i>(3), Article e70250. https://doi.org/10.1002/itl2.70250</div>
</div>
-
dc.identifier.uri
http://hdl.handle.net/20.500.12708/227837
-
dc.description.abstract
Recent advances in edge computing enable data stream privacy enforcement directly on resource-constrained devices, reducing latency and the exposure of sensitive information. In this paper, we extend and validate our previously proposed privacy-enforcing framework, which allows high-level privacy policies to be expressed as chains of triggers and transformations, executed at the edge. To assess its practical viability, we conduct a comprehensive performance profiling of multiple privacy models across heterogeneous edge hardware platforms. Six privacy-model chains, ranging from basic face detection to combined face-and-person anonymization, are evaluated across three representative edge devices. Key performance metrics (i.e., execution time, CPU uti-
lization, memory usage, and power consumption) are measured to inform optimal placement of privacy transformations. Our evaluation offers critical insights into the effectiveness of the privacy-enforcing framework on resource-constrained devices, thereby guiding practitioners in selecting suitable deployment targets for privacy-preserving data stream analytics on the edge.
en
dc.language.iso
en
-
dc.publisher
John Wiley & Sons
-
dc.relation.ispartof
Internet Technology Letters
-
dc.subject
data streams
en
dc.subject
edge computing
en
dc.subject
IoT
en
dc.subject
performance
en
dc.subject
privacy
en
dc.title
Performance Evaluation of Privacy Models for Data Streams on the Edge
en
dc.type
Article
en
dc.type
Artikel
de
dc.contributor.affiliation
University of Prishtina, Kosovo
-
dc.contributor.affiliation
Universitat Pompeu Fabra, Spain
-
dc.contributor.affiliation
University of Klagenfurt, Austria
-
dc.type.category
Original Research Article
-
tuw.container.volume
9
-
tuw.container.issue
3
-
tuw.journal.peerreviewed
true
-
tuw.peerreviewed
true
-
wb.publication.intCoWork
International Co-publication
-
tuw.researchTopic.id
I4
-
tuw.researchTopic.name
Information Systems Engineering
-
tuw.researchTopic.value
100
-
dcterms.isPartOf.title
Internet Technology Letters
-
tuw.publication.orgunit
E194-02 - Forschungsbereich Distributed Systems
-
tuw.publisher.doi
10.1002/itl2.70250
-
dc.date.onlinefirst
2026
-
dc.identifier.articleid
e70250
-
dc.identifier.eissn
2476-1508
-
dc.description.numberOfPages
7
-
tuw.author.orcid
0000-0003-0240-3834
-
tuw.author.orcid
0009-0001-2365-8265
-
tuw.author.orcid
0000-0002-2376-5802
-
tuw.author.orcid
0000-0001-6872-8821
-
wb.sciencebranch
Informatik
-
wb.sciencebranch.oefos
1020
-
wb.sciencebranch.value
100
-
item.openairecristype
http://purl.org/coar/resource_type/c_2df8fbb1
-
item.fulltext
no Fulltext
-
item.cerifentitytype
Publications
-
item.openairetype
research article
-
item.grantfulltext
restricted
-
item.languageiso639-1
en
-
crisitem.author.dept
E194-02 - Forschungsbereich Distributed Systems
-
crisitem.author.dept
E194-02 - Forschungsbereich Distributed Systems
-
crisitem.author.dept
E194-02 - Forschungsbereich Distributed Systems
-
crisitem.author.dept
E194-02 - Forschungsbereich Distributed Systems
-
crisitem.author.orcid
0000-0003-0240-3834
-
crisitem.author.orcid
0009-0001-2365-8265
-
crisitem.author.orcid
0000-0002-2376-5802
-
crisitem.author.orcid
0000-0001-6872-8821
-
crisitem.author.parentorg
E194 - Institut für Information Systems Engineering
-
crisitem.author.parentorg
E194 - Institut für Information Systems Engineering
-
crisitem.author.parentorg
E194 - Institut für Information Systems Engineering
-
crisitem.author.parentorg
E194 - Institut für Information Systems Engineering