Security and Communication Networks

Data Security and Privacy for Fog/Edge Computing-Based IoT 2022


Publishing date
01 Dec 2022
Status
Published
Submission deadline
12 Aug 2022

Lead Editor
Guest Editors

1Anhui University, Hefei, China

2Free University of Bozen-Bolzano, Bolzano, Italy

3Changsha University of Science and Technology, Changsha, China

4University of Leicester, Leicester, UK


Data Security and Privacy for Fog/Edge Computing-Based IoT 2022

Description

The Internet of Things (IoT) generates tremendous amounts of data to be processed at the network edge. In a world powered by the IoT, people are surrounded in their daily lives by IoT devices that collect, store, transmit, and process data constantly. By processing these data, consumers and organizations may gain valuable insights to help them make informed decisions. The novel fog computing (also often referred to as edge computing) paradigm moves cloud-like computing and storage resources from the remote cloud to the network edge within end-users’ geographic proximity. In a fog/edge computing environment, fog/edge servers are deployed at the network edge around end-users. Each fog/edge server can be regarded as a highly virtualized computing system, similar to a lightweight cloud server. Fog/edge servers can provide end-users with high-quality services of data storage, computing, and analysis and can therefore provide strong support for processing IoT data upon their generation.

However, fog/edge servers and terminal IoT devices are located at the network edge, and there are a lack of protection measures to resist various cyber attacks. They are more vulnerable to some attacks than others, such as device theft, device manipulation, identity theft, and data eavesdropping. When a fog/edge computing-based IoT system is invaded, there may be a serious impact on data security and privacy. It is therefore of tremendous importance to protect the security and privacy of IoT data with the help and support of fog/edge computing.

The aim of this Special Issue is to gather research on the latest developments for data security and privacy, from storage and analysis to new frameworks, in fog-edge computing-based IoT. We welcome both original research and review articles.

Potential topics include but are not limited to the following:

  • Data security framework development for fog/edge computing-based IoT
  • Secure data system integration of fog/edge computing-based IoT
  • Secure data transmission in fog/edge computing-based IoT
  • Secure data storage in fog/edge computing-based IoT
  • Secure data computing in fog/edge computing-based IoT
  • Secure data analysis in fog/edge computing-based IoT
  • Adaptive data privacy, trust, and security solutions for fog/edge computing-based IoT
  • Advanced cryptography methods and tools for fog/edge computing-based IoT
  • Data security and privacy protection for terminal devices
  • Data security applications of fog/edge computing-based IoT
  • Secure devices and their applications in fog/edge computing-based IoT

Articles

  • Special Issue
  • - Volume 2023
  • - Article ID 9143563
  • - Research Article

SAIFC: A Secure Authentication Scheme for IOV Based on Fog-Cloud Federation

Yashar Salami | Vahid Khajehvand | Esmaeil Zeinali
  • Special Issue
  • - Volume 2022
  • - Article ID 1729413
  • - Research Article

Internet of Vehicles Information Processing Method with Vehicle-Mounted Cloud Grid as the Underlying Data Fusion Structure

Yibo Han | Xia Li | ... | Jingshuo Li
  • Special Issue
  • - Volume 2022
  • - Article ID 3214913
  • - Research Article

A New Certificateless Signcryption Scheme for Securing Internet of Vehicles in the 5G Era

Beibei Cui | Lu Wei | Wei He
  • Special Issue
  • - Volume 2022
  • - Article ID 4645585
  • - Research Article

Blockchain-Based Electronic Medical Records System with Smart Contract and Consensus Algorithm in Cloud Environment

Sanjeev Kumar Dwivedi | Ruhul Amin | ... | Vijayakumar Pandi
  • Special Issue
  • - Volume 2022
  • - Article ID 2332769
  • - Research Article

Telematics Collaborative Resource Allocation Algorithm Based on Cloud Sidecar

Zheng Zhang | Yanling Shao | ... | Yibo Han
  • Special Issue
  • - Volume 2022
  • - Article ID 8758156
  • - Research Article

Trust-Based Certificateless Privacy-Preserving Authentication in Internet of Vehicles

Chang Yu | Kezhong Lu
  • Special Issue
  • - Volume 2022
  • - Article ID 4202084
  • - Research Article

Towards Fair and Decentralized Federated Learning System for Gradient Boosting Decision Trees

Shiqi Gao | Xianxian Li | ... | Chunpei Li
  • Special Issue
  • - Volume 2022
  • - Article ID 8998339
  • - Research Article

An Enhanced RFID-Based Authentication Protocol using PUF for Vehicular Cloud Computing

Vikas Kumar | Rahul Kumar | ... | Chien-Ming Chen
  • Special Issue
  • - Volume 2022
  • - Article ID 1336094
  • - Research Article

Privacy-Aware Task Assignment for IoT Audit Applications on Collaborative Edge Devices

Linyuan Liu | Haibin Zhu | ... | Zhiqiu Huang
  • Special Issue
  • - Volume 2022
  • - Article ID 6911463
  • - Research Article

Toward Privacy-Preserving Blockchain-Based Electricity Auction for V2G Networks in the Smart Grid

Weijian Zhang | Wen Yang | ... | Min Luo
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.