Security and Communication Networks

Privacy Enhancing Technologies for Emerging Computing Systems


Publishing date
01 Dec 2022
Status
Published
Submission deadline
22 Jul 2022

Lead Editor

1National University of Defense Technology, Changsha, China

2University of Louisiana, Lafayette, USA

3Dublin City University, Dublin, Ireland

4Hunan University, Hunan, China


Privacy Enhancing Technologies for Emerging Computing Systems

Description

The research advances of intelligent devices and seamless networking technologies have spawned the emergence of computing systems that are embedded in every aspect of human life. It benefits from developments from evolving computing paradigms, such as edge computing, federated learning, and digital networks, to diverse computing services, such as mobile healthcare, crowdsensing, and the metaverse. The implementations of these emerging computing systems involve data collection and knowledge extraction of users’ daily lives, including smartphones (accessories) that record location, fitness, and other contextual information, and network traffic that conveys sharing behaviors, access records, and application usage patterns. Abusing and disclosing such sensitive information, either implicitly or explicitly, causes significant security concerns and privacy breaches, which go against both user interests and regulations.

To meet users’ privacy requirements in terms of various legislations, Privacy Enhancing Technologies (PETs) are widely investigated and gain expanding attention. PETs explore the joint efforts of homomorphic encryption, secure multi-party computation, differential privacy, and other techniques for building privacy-preserving algorithms, applications, systems, and services. Yet, the emerging computing scenarios exhibit a larger attack surface, prone to new forms of privacy concerns and vulnerabilities, which necessitates insights towards privacy assessment, dedicated solutions, and general design guidelines.

In this Special Issue, we welcome submissions exposing and addressing the underlying privacy issues in emerging computing systems and aim to publish papers presenting recent research results and implementation experiences from academia, industrial communities, and governments. Papers offering a perspective on related work and identifying promising directions are also encouraged. We welcome both original research and review articles.

Potential topics include but are not limited to the following:

  • Privacy and PETs in in-network computing
  • Privacy and PETs in digital networks
  • Privacy and PETs in federal learning
  • PETs for crowdsourcing and crowdsensing
  • Privacy and PETs in the metaverse
  • Artificial intelligence for PETs in emerging computing paradigms
  • Advanced cryptography protocols and algorithms for privacy
  • Privacy-preserving big data analytics
  • Privacy risk assessment and visualization
  • Implementation and adaptive configuration of PETs

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 5853721
  • - Research Article

[Retracted] Engineering Management Model Analysis Using Partial Differential Equation Hilbert Space

Chen Han
  • Special Issue
  • - Volume 2022
  • - Article ID 5606328
  • - Research Article

[Retracted] A New Method for Inverter Diagnosis of Electric Locomotive Using Adversarial Neural Networks

Yingchun Shi | Chunyang Chen | Yu Luo
  • Special Issue
  • - Volume 2022
  • - Article ID 5210810
  • - Research Article

[Retracted] Prediction and Analysis of the Physical Test Scores Based on BP Neural Network and Principal Component Analysis Algorithm

Jiale Qu
  • Special Issue
  • - Volume 2022
  • - Article ID 6371062
  • - Research Article

[Retracted] Network Interconnection Security Buffer Technology for Power Monitoring System

Jifeng Wang | Jinyu Wu | ... | Weijie Qiu
  • Special Issue
  • - Volume 2022
  • - Article ID 4500430
  • - Research Article

[Retracted] Performance Evaluation Method of Online Supply Chain Finance Logistics Enterprises Based on GARCH-VAR

Ting Xia | Junxuan Yang
  • Special Issue
  • - Volume 2022
  • - Article ID 9666677
  • - Research Article

[Retracted] Model Construction of Hierarchical Polarization Characteristics Combined with Social E-Commerce Consumer Behavior

Quan Zhang | Jian Yang
  • Special Issue
  • - Volume 2022
  • - Article ID 6835371
  • - Research Article

[Retracted] Digital Reconstruction Method of Power Metering Production Data Based on Digital Twin Technology

Hao Wang | Hongtao Shen | ... | Zhaosheng Yang
  • Special Issue
  • - Volume 2022
  • - Article ID 8757594
  • - Research Article

Reversible Data Hiding in Encrypted Images Based on Adaptive Gradient Prediction

Jiaohua Qin | Zhibin He | ... | Yun Tan
  • Special Issue
  • - Volume 2022
  • - Article ID 8423643
  • - Research Article

[Retracted] Analysis of Dynamic Influence Mechanism of Network Public Opinion Based on Simulation Feature Extraction

Yang Zhang
  • Special Issue
  • - Volume 2022
  • - Article ID 8793392
  • - Research Article

[Retracted] Intelligent Planning of Tourist Routes Based on Cloud Computing and Marching Algorithm

Junli Lu
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision185 days
Acceptance to publication40 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.