Security and Communication Networks

Data Security and Privacy for Fog/Edge Computing-Based IoT


Publishing date
01 Jan 2022
Status
Closed
Submission deadline
10 Sep 2021

Lead Editor
Guest Editors

1Anhui University, Hefei, China

2Free University of Bozen-Bolzano, Bolzano, Italy

3Changsha University of Science and Technology, Changsha, China

4University of Leicester, Leicester, UK

This issue is now closed for submissions.

Data Security and Privacy for Fog/Edge Computing-Based IoT

This issue is now closed for submissions.

Description

The Internet of Things (IoT) generates tremendous amounts of data to be processed at the network edge. In a world powered by the IoT, people are surrounded in their daily lives by IoT devices that collect, store, transmit, and process data constantly. By processing these data, consumers and organizations may gain valuable insights to help them make informed decisions. The novel fog computing (also often referred to as edge computing) paradigm moves cloud-like computing and storage resources from the remote cloud to the network edge within end-users’ geographic proximity. In a fog/edge computing environment, fog/edge servers are deployed at the network edge around end-users. Each fog/edge server can be regarded as a highly virtualized computing system, similar to a lightweight cloud server. Fog/edge servers can provide end-users with high-quality services of data storage, computing, and analysis and can therefore provide strong support for processing IoT data upon their generation.

However, fog/edge servers and terminal IoT devices are located at the network edge, and there are a lack of protection measures to resist various cyber attacks. They are more vulnerable to some attacks than others, such as device theft, device manipulation, identity theft, and data eavesdropping. When a fog/edge computing-based IoT system is invaded, there may be a serious impact on data security and privacy. It is therefore of tremendous importance to protect the security and privacy of IoT data with the help and support of fog/edge computing.

The aim of this Special Issue is to gather research on the latest developments for data security and privacy, from storage and analysis to new frameworks, in fog-edge computing-based IoT. We welcome both original research and review articles.

Potential topics include but are not limited to the following:

  • Data security framework development for fog/edge computing-based IoT
  • Secure data system integration of fog/edge computing-based IoT
  • Secure data transmission in fog/edge computing-based IoT
  • Secure data storage in fog/edge computing-based IoT
  • Secure data computing in fog/edge computing-based IoT
  • Secure data analysis in fog/edge computing-based IoT
  • Adaptive data privacy, trust, and security solutions for fog/edge computing-based IoT
  • Advanced cryptography methods and tools for fog/edge computing-based IoT
  • Data security and privacy protection for terminal devices
  • Data security applications of fog/edge computing-based IoT
  • Secure devices and their applications in fog/edge computing-based IoT

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 9440886
  • - Research Article

Message Authentication and Network Anomalies Detection in Vehicular Ad Hoc Networks

Leonid Legashev | Irina Bolodurina | ... | Yan Xu
  • Special Issue
  • - Volume 2022
  • - Article ID 5630960
  • - Research Article

Research on Medical Waste Supervision Model and Implementation Method Based on Blockchain

Hui Wang | Longshuai Zheng | ... | Xueqing Li
  • Special Issue
  • - Volume 2022
  • - Article ID 1203691
  • - Research Article

Lightweight and Anonymous Mutual Authentication Protocol for Edge IoT Nodes with Physical Unclonable Function

Hongyuan Wang | Jin Meng | ... | Yong Xie
  • Special Issue
  • - Volume 2021
  • - Article ID 2729949
  • - Research Article

A Virtual Machine Migration Strategy Based on the Relevance of Services against Side-Channel Attacks

Ji-Ming Chen | Shi Chen | ... | Li Wang
  • Special Issue
  • - Volume 2021
  • - Article ID 1360560
  • - Research Article

Combinatorial Spectrum E-Auction for 5G Heterogeneous Networks: A Zether-Based Approach

Zijun Zhao | Zuobin Ying | ... | Jianfeng Ma
  • Special Issue
  • - Volume 2021
  • - Article ID 7035233
  • - Research Article

Dominant Feature Selection and Machine Learning-Based Hybrid Approach to Analyze Android Ransomware

Tanya Gera | Jaiteg Singh | ... | Deepak Thakur
  • Special Issue
  • - Volume 2021
  • - Article ID 5222670
  • - Research Article

Preventing Scan-Based Side-Channel Attacks by Scan Obfuscating with a Configurable Shift Register

Weizheng Wang | Yin Chen | ... | Yan Peng
  • Special Issue
  • - Volume 2021
  • - Article ID 7443260
  • - Research Article

Blockchain-Enabled Intelligent Video Caching and Transcoding in Clustered MEC Networks

Yan Li | Zheng Wan
  • Special Issue
  • - Volume 2021
  • - Article ID 3050953
  • - Research Article

Towards Trustworthy IoT: A Blockchain-Edge Computing Hybrid System with Proof-of-Contribution Mechanism

Huan Dai | Pengzhan Shi | ... | Jun Zhao
  • Special Issue
  • - Volume 2021
  • - Article ID 1224333
  • - Research Article

Security Analysis of Intelligent System Based on Edge Computing

Yibo Han | Weiwei Zhang | Zheng Zhang
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.