Security and Communication Networks

Security, Trust and Privacy for Cloud, Fog and Internet of Things


Publishing date
01 Jul 2021
Status
Published
Submission deadline
26 Feb 2021

Lead Editor

1Shandong University of Science and Technology, Qingdao, China

2Istanbul Gelisim University, Istanbul, Turkey

3National Dong Hwa University, Hualien, Taiwan

4National University of Singapore, Singapore


Security, Trust and Privacy for Cloud, Fog and Internet of Things

Description

Internet of Things (IoT) is a promising networking scenario in the cyber world, bridging physical devices and virtual objects. By considering the limited capacity of smart things, cloud computing is generally applied to store and process the massive data collected by the IoT. Furthermore, fog computing is described as an extension and a complement to cloud computing. It utilises fog nodes to perform storage, computation, and communication locally. The merging of cloud/fog computing and IoT can be seen as the best of two worlds by concurrently offering ubiquitous sensing services and powerful processing capabilities.

Despite the advantages of cloud/fog-assisted IoT, it is unwise to neglect the significance of security and privacy in this highly heterogeneous and interconnected system. Various solutions have recently been put forward independently for cloud, fog, or IoT environments to deal with security threats to IoT devices and sensitive data. However, a few crucial features, such as heterogeneity and scalability, have not been appropriately considered in these solutions.

The objective of this Special Issue is to compile recent research efforts dedicated to studying the security and privacy of rapidly increasing cloud/fog-assisted IoT applications. We welcome both original research and review articles.

Potential topics include but are not limited to the following:

  • Security and protection architectures for cloud/fog-assisted IoT
  • Novel architectures, concepts, and models in cloud/fog-assisted IoT security
  • Cryptography protocols and algorithms for cloud/fog-assisted IoT
  • Threat models and attack strategies for cloud/fog-assisted IoT
  • Threat detection/prevention methods in cloud/fog-assisted IoT
  • Authentication methods in cloud/fog-assisted IoT
  • Machine and deep learning for solving security in cloud/fog-assisted IoT
  • Blockchain technology in cloud/fog-assisted IoT
  • Federated models for privacy and security of cloud/fog-assisted IoT services
  • Big data analytics for heterogeneous cloud/fog-assisted IoT systems
  • State-of-the-art reviews on security and privacy for cloud/fog-assisted IoT

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 9841709
  • - Editorial

Security, Trust and Privacy for Cloud, Fog and Internet of Things

Chien-Ming Chen | Shehzad Ashraf Chaudhry | ... | Muhammad Naveed Aman
  • Special Issue
  • - Volume 2021
  • - Article ID 6688162
  • - Research Article

DAWM: Cost-Aware Asset Claim Analysis Approach on Big Data Analytic Computation Model for Cloud Data Centre

M. S. Mekala | Rizwan Patan | ... | Shehzad Ashraf Chaudhry
  • Special Issue
  • - Volume 2021
  • - Article ID 6676862
  • - Research Article

Fully Constant-Size CP-ABE with Privacy-Preserving Outsourced Decryption for Lightweight Devices in Cloud-Assisted IoT

Zhishuo Zhang | Wei Zhang | Zhiguang Qin
  • Special Issue
  • - Volume 2021
  • - Article ID 5540895
  • - Research Article

A Lightweight Intelligent Intrusion Detection Model for Wireless Sensor Networks

Jeng-Shyang Pan | Fang Fan | ... | Gao-Yuan Liu
  • Special Issue
  • - Volume 2021
  • - Article ID 5563868
  • - Review Article

A Bibliometric Analysis of Edge Computing for Internet of Things

Yiou Wang | Fuquan Zhang | ... | Bo Wang
  • Special Issue
  • - Volume 2021
  • - Article ID 5541974
  • - Research Article

Task Priority-Based Cached-Data Prefetching and Eviction Mechanisms for Performance Optimization of Edge Computing Clusters

Ihsan Ullah | Muhammad Sajjad Khan | ... | Su Min Kim
  • Special Issue
  • - Volume 2021
  • - Article ID 6629098
  • - Research Article

S-DPS: An SDN-Based DDoS Protection System for Smart Grids

Hassan Mahmood | Danish Mahmood | ... | Wang Changda
  • Special Issue
  • - Volume 2021
  • - Article ID 6661450
  • - Research Article

Multiauthority Attribute-Based Encryption with Traceable and Dynamic Policy Updating

Jie Ling | Junwei Chen | ... | Wensheng Gan
  • Special Issue
  • - Volume 2021
  • - Article ID 6677867
  • - Review Article

Assessing Security of Software Components for Internet of Things: A Systematic Review and Future Directions

Zitian Liao | Shah Nazir | ... | Muhammad Shafiq
  • Special Issue
  • - Volume 2021
  • - Article ID 6678194
  • - Research Article

Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function

Yi-Fan Tseng | Zi-Yuan Liu | ... | Raylin Tso
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.