Security and Communication Networks

Privacy Enhancing Technologies for Emerging Computing Systems


Publishing date
01 Dec 2022
Status
Closed
Submission deadline
22 Jul 2022

Lead Editor

1National University of Defense Technology, Changsha, China

2University of Louisiana, Lafayette, USA

3Dublin City University, Dublin, Ireland

4Hunan University, Hunan, China

This issue is now closed for submissions.

Privacy Enhancing Technologies for Emerging Computing Systems

This issue is now closed for submissions.

Description

The research advances of intelligent devices and seamless networking technologies have spawned the emergence of computing systems that are embedded in every aspect of human life. It benefits from developments from evolving computing paradigms, such as edge computing, federated learning, and digital networks, to diverse computing services, such as mobile healthcare, crowdsensing, and the metaverse. The implementations of these emerging computing systems involve data collection and knowledge extraction of users’ daily lives, including smartphones (accessories) that record location, fitness, and other contextual information, and network traffic that conveys sharing behaviors, access records, and application usage patterns. Abusing and disclosing such sensitive information, either implicitly or explicitly, causes significant security concerns and privacy breaches, which go against both user interests and regulations.

To meet users’ privacy requirements in terms of various legislations, Privacy Enhancing Technologies (PETs) are widely investigated and gain expanding attention. PETs explore the joint efforts of homomorphic encryption, secure multi-party computation, differential privacy, and other techniques for building privacy-preserving algorithms, applications, systems, and services. Yet, the emerging computing scenarios exhibit a larger attack surface, prone to new forms of privacy concerns and vulnerabilities, which necessitates insights towards privacy assessment, dedicated solutions, and general design guidelines.

In this Special Issue, we welcome submissions exposing and addressing the underlying privacy issues in emerging computing systems and aim to publish papers presenting recent research results and implementation experiences from academia, industrial communities, and governments. Papers offering a perspective on related work and identifying promising directions are also encouraged. We welcome both original research and review articles.

Potential topics include but are not limited to the following:

  • Privacy and PETs in in-network computing
  • Privacy and PETs in digital networks
  • Privacy and PETs in federal learning
  • PETs for crowdsourcing and crowdsensing
  • Privacy and PETs in the metaverse
  • Artificial intelligence for PETs in emerging computing paradigms
  • Advanced cryptography protocols and algorithms for privacy
  • Privacy-preserving big data analytics
  • Privacy risk assessment and visualization
  • Implementation and adaptive configuration of PETs

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 8673357
  • - Review Article

Economic Globalization and Corporate Accounting Risks: An Analysis of Enterprise Risk Management Based on Big Data

Yantai Zhang
  • Special Issue
  • - Volume 2022
  • - Article ID 9245516
  • - Research Article

Multiparty Threshold Private Set Intersection Protocol with Low Communication Complexity

Xiaopeng Yu | Fagen Li | ... | Dianhua Tang
  • Special Issue
  • - Volume 2022
  • - Article ID 9438027
  • - Review Article

Jamming Meets Antijamming: A Survey of GPS Communication Networks

Yifan Yang
  • Special Issue
  • - Volume 2022
  • - Article ID 7049429
  • - Research Article

A Table Tennis Motion Correction System Based on Human Motion Feature Recognition

Liangzi Han
  • Special Issue
  • - Volume 2022
  • - Article ID 2834982
  • - Research Article

Software Security Testing through Coverage in Deep Neural Networks

Weiyu Fu | Lixia Wang
  • Special Issue
  • - Volume 2022
  • - Article ID 6476168
  • - Research Article

Research on Securities Portfolio Model Based on Genetic Optimization Neural Network

Puming Zhang
  • Special Issue
  • - Volume 2022
  • - Article ID 7864665
  • - Research Article

Analysis of Risk Assessment of Overseas Infrastructure Projects Integrating BP-ANN Algorithm

Chengni Li | Jian Zhou
  • Special Issue
  • - Volume 2022
  • - Article ID 6579066
  • - Research Article

Multitarget Tracking Algorithm in Intelligent Analysis of Football Movement Training Stance

Changrui Li | Qiuping Peng
  • Special Issue
  • - Volume 2022
  • - Article ID 7366480
  • - Research Article

Application of User Experience Gene Extraction Model Based on Industrial Design

Ziwei Yu
  • Special Issue
  • - Volume 2022
  • - Article ID 9548441
  • - Research Article

Path Selection Strategy of Communication Network Based on Graph Convolutional Neural Network

Xiaojun Zhang
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate41%
Submission to final decision54 days
Acceptance to publication27 days
CiteScore3.300
Journal Citation Indicator-
Impact Factor-
 Submit

Article of the Year Award: Outstanding research contributions of 2021, as selected by our Chief Editors. Read the winning articles.