Security and Communication Networks

Multiparty Computations, Co-operations, and Communications for Privacy and Network Security


Publishing date
01 Dec 2022
Status
Published
Submission deadline
22 Jul 2022

Lead Editor

1University of Glasgow, Glasgow, UK

2HKBK College of Engineering, Bengaluru, India

3University of Teramo, Teramo, Italy


Multiparty Computations, Co-operations, and Communications for Privacy and Network Security

Description

Multiparty computation is a form of trustworthy computation approach in which two or more parties jointly evaluate a function and obtain its outcome without accessing the private inputs of the other parties. Cryptography is the classic enabler of Secure Multiparty Computing (SMC), but most real-time and online computations are incompatible with cryptographic activities. Trusted Execution Environments (TEEs) are promising alternatives for making SMC more tractable on any network, since they require hardware enforcement, isolation of code, and data. The emergence of a variety of trusted execution environments in recent years has created an opportunity to offload some security and privacy costs associated with widespread multiparty computation.

Several adversaries are trying to violate the safety and privacy of SMC, and they can be categorized as semihonest, malicious, or covert. Recently, data analytics has co-operated with multiparty communications in various fields such as agriculture, bioinformatics, environmental science, data analytics, and so on. Wherever network communication happens, it is necessary to ensure the co-operation of security and privacy. Artificial Intelligence (AI) can be used to identify spam, viruses, data theft, and improved security are possible in pervasive communication networks. Data breaching, data integrity, and data collusion are all key targets for cybersecurity and privacy attacks on IoT devices and their data. Privacy considerations arise naturally when data is transported to and from the cloud. Indeed, privacy solutions must meet ethical and legal criteria while not impeding viable business models, whereas privacy-preserving solutions are unlikely to become feasible and effective without new rules. Furthermore, if the data is leaked and not properly encrypted, it compromises the user's privacy for nonauthorized virtual profiling.

This Special Issue is to collate original research and review articles describing advances in security awareness and privacy preferences for multiparty communications and computation, as well as legal and economic challenges, solutions in various IoT application domains, and so on.

Potential topics include but are not limited to the following:

  • Security and privacy modeling in the cloud-based system
  • Security/privacy/trust issues in network architectures
  • Attack prediction, prevention, and co-operation using machine learning algorithms
  • Multiparty trust model for the IoT
  • Multitenancy related security/privacy issues
  • Vulnerabilities in network infrastructure
  • Co-operative communication techniques for the IoT
  • Anonymization techniques in cybersecurity
  • Federated learning in digital healthcare using IoT
  • Secure architecture for smart cities using IoT
  • Lightweight cryptography protocols
  • Security testing, ethical hacking, and security certifications
  • Privacy-preserving pervasive computing techniques
  • Intelligent and secure transportation systems
  • Cyber threat intelligence model for the cloud-based system

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 8511809
  • - Research Article

[Retracted] Secure Internet of Things Gateway Technology Based on Multicommunication Methods

Qiangshan Zhang
  • Special Issue
  • - Volume 2022
  • - Article ID 3718340
  • - Research Article

[Retracted] Bio-Optimization of Deep Learning Network Architectures

Shanmugavadivu P | Mary Shanthi Rani M | ... | Vignesh U
  • Special Issue
  • - Volume 2022
  • - Article ID 5430755
  • - Research Article

[Retracted] Application of Distributed Network in Bridge Structure Safety Inspection

Hongwei Xu | Yong Li
  • Special Issue
  • - Volume 2022
  • - Article ID 2507649
  • - Research Article

[Retracted] Research and Development of Digital Assembly Process System for Ultrasonic Transducers

Xinyu Feng | Xijing Zhu | ... | Ruimin Shi
  • Special Issue
  • - Volume 2022
  • - Article ID 1940708
  • - Research Article

[Retracted] Hardware Realization of Kinematic Mechanism and Control System of Multifunctional Industrial Robot

Kai Zhang | Jihao Gao | ... | MingLiang Liang
  • Special Issue
  • - Volume 2022
  • - Article ID 6485195
  • - Research Article

[Retracted] Application Research of Data Encryption Technology in Computer Network Information Security

Meilin Wang
  • Special Issue
  • - Volume 2022
  • - Article ID 8353697
  • - Research Article

[Retracted] Cotraining Algorithm Based on Weighted Principal Component Analysis and Improved Density Peak Clustering

Tao Wang
  • Special Issue
  • - Volume 2022
  • - Article ID 4577411
  • - Research Article

[Retracted] Implementation of Language Appropriateness in Intercultural Communication Based on Distributed Control System

Li Liu | Duan Xue | ... | Xingying Huo
  • Special Issue
  • - Volume 2022
  • - Article ID 7876199
  • - Research Article

[Retracted] Design and Implementation of Cloud Computing Network Security Virtual Computing and Defense Technology

Yongbing Cheng
  • Special Issue
  • - Volume 2022
  • - Article ID 6965880
  • - Research Article

[Retracted] Performance Test and Improvement of Computer Network Virtualization Software in Cloud Computing Environment

Wei Liu
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision185 days
Acceptance to publication40 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.