Security and Communication Networks

Theory and Engineering Practice for Security and Privacy of Edge Computing


Publishing date
01 Jun 2021
Status
Closed
Submission deadline
22 Jan 2021

Lead Editor

1Shanghai University, Shanghai, China

2Edinburgh Napier University, Edinburgh, UK

3Cleveland State University, Ohio, USA

4Hangzhou Dianzi University, Hangzhou, China

This issue is now closed for submissions.
More articles will be published in the near future.

Theory and Engineering Practice for Security and Privacy of Edge Computing

This issue is now closed for submissions.
More articles will be published in the near future.

Description

With the development of the Internet of Things, increasing numbers of powerful devices are mediating our daily life. This will result in massive data generated by billions of sensors and devices. Meanwhile, the increasing demand for advanced services and applications, such as virtual reality, augmented reality, and infrastructure for smart cities has created considerable challenges in cloud computing. Edge computing has been proposed as a new computing paradigm where resources like computation and storage are placed closer to the data source. It enables a new class of latency and bandwidth-sensitive applications as data can be processed at the nearest edge. Without sending data to the cloud, edge computing, therefore, enhances security and privacy.

However, edge computing also brings new possibilities and challenges for research in the field of security and privacy, especially from the perspective of engineering, management, and practice. Edge nodes are close to the users, and as a result can potentially receive large amounts privacy-sensitive data. If the data from an edge node is leaked, the consequences can be serious. Furthermore, compared with cloud centers, edge nodes have limited resources, so they cannot support complex security mechanisms. Finally, due to the high mobility of the devices and users, the edge computing environment is always changing. Attackers can quickly join the group, and it is challenging to design security rules with multi-domain overlapping, such as device provider, data generator/user, etc.

The aim of this Special Issue is to collate original research and review articles addressing these key issues in security and privacy of edge computing.

Potential topics include but are not limited to the following:

  • New threat models and attacks in edge computing
  • Defenses and countermeasures
  • Anonymity and privacy in edge computing
  • Scalability issues and solutions
  • Task scheduling of edge computing
  • System and software security of edge nodes
  • Lightweight cryptography, protocols, and standards in edge computing
  • Trust management of edge system
  • Formal method of specification, verification and testing to edge system
  • Security and privacy management of edge system
  • Security issues due to services and application deployment
  • Security issues due to the overall architecture and cooperation
  • Novel privacy, liability, and legal issues raised by edge computing
  • Malware detection in edge application and system
  • Secure service and application design

Articles

  • Special Issue
  • - Volume 2021
  • - Article ID 6688393
  • - Research Article

CF Model: A Coarse-to-Fine Model Based on Two-Level Local Search for Image Copy-Move Forgery Detection

Fang Mei | Tianchang Gao | Yingda Lyu
  • Special Issue
  • - Volume 2021
  • - Article ID 5563312
  • - Research Article

Blockchain-Enhanced Fair Task Scheduling for Cloud-Fog-Edge Coordination Environments: Model and Algorithm

Wenjuan Li | Shihua Cao | ... | Rajkumar Buyya
  • Special Issue
  • - Volume 2021
  • - Article ID 8864552
  • - Research Article

Research on Coordinated Scheduling Strategy of Heat Storage Thermoelectric Units Based on Wind Power Data Acquisition System Using Edge Computing

D. J. Guan | X. Y. Qian | ... | N. Zhang
  • Special Issue
  • - Volume 2021
  • - Article ID 8830879
  • - Research Article

An Intelligent Offloading System Based on Multiagent Reinforcement Learning

Yu Weng | Haozhen Chu | Zhaoyi Shi
  • Special Issue
  • - Volume 2021
  • - Article ID 6666628
  • - Research Article

Reverse Auction-Based Services Optimization in Cloud Computing Environments

Hongkun Zhang | Xinmin Liu
  • Special Issue
  • - Volume 2021
  • - Article ID 6642121
  • - Research Article

PB: A Product-Bitmatrix Construction to Reduce the Complexity of XOR Operations of PM-MSR and PM-MBR Codes over

Chuqiao Xiao | Xueqing Gong | ... | Qian Zhang
  • Special Issue
  • - Volume 2021
  • - Article ID 8873195
  • - Research Article

Deep Learning-Based Security Behaviour Analysis in IoT Environments: A Survey

Yawei Yue | Shancang Li | ... | Fuzhong Li
  • Special Issue
  • - Volume 2020
  • - Article ID 8884924
  • - Research Article

Improving Topic-Based Data Exchanges among IoT Devices

Fu Chen | Peng Liu | ... | Kai Hwang
  • Special Issue
  • - Volume 2020
  • - Article ID 8830310
  • - Research Article

Seam-Carved Image Tampering Detection Based on the Cooccurrence of Adjacent LBPs

Dengyong Zhang | Xiao Chen | ... | Xiangling Ding
  • Special Issue
  • - Volume 2020
  • - Article ID 8891035
  • - Research Article

Visual Object Multimodality Tracking Based on Correlation Filters for Edge Computing

Guosheng Yang | Qisheng Wei
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
Acceptance rate31%
Submission to final decision85 days
Acceptance to publication42 days
CiteScore4.200
Impact Factor1.288
 Submit