Data Security and Privacy for Fog/Edge Computing-Based IoT
1Anhui University, Hefei, China
2Free University of Bozen-Bolzano, Bolzano, Italy
3Changsha University of Science and Technology, Changsha, China
4University of Leicester, Leicester, UK
Data Security and Privacy for Fog/Edge Computing-Based IoT
Description
The Internet of Things (IoT) generates tremendous amounts of data to be processed at the network edge. In a world powered by the IoT, people are surrounded in their daily lives by IoT devices that collect, store, transmit, and process data constantly. By processing these data, consumers and organizations may gain valuable insights to help them make informed decisions. The novel fog computing (also often referred to as edge computing) paradigm moves cloud-like computing and storage resources from the remote cloud to the network edge within end-users’ geographic proximity. In a fog/edge computing environment, fog/edge servers are deployed at the network edge around end-users. Each fog/edge server can be regarded as a highly virtualized computing system, similar to a lightweight cloud server. Fog/edge servers can provide end-users with high-quality services of data storage, computing, and analysis and can therefore provide strong support for processing IoT data upon their generation.
However, fog/edge servers and terminal IoT devices are located at the network edge, and there are a lack of protection measures to resist various cyber attacks. They are more vulnerable to some attacks than others, such as device theft, device manipulation, identity theft, and data eavesdropping. When a fog/edge computing-based IoT system is invaded, there may be a serious impact on data security and privacy. It is therefore of tremendous importance to protect the security and privacy of IoT data with the help and support of fog/edge computing.
The aim of this Special Issue is to gather research on the latest developments for data security and privacy, from storage and analysis to new frameworks, in fog-edge computing-based IoT. We welcome both original research and review articles.
Potential topics include but are not limited to the following:
- Data security framework development for fog/edge computing-based IoT
- Secure data system integration of fog/edge computing-based IoT
- Secure data transmission in fog/edge computing-based IoT
- Secure data storage in fog/edge computing-based IoT
- Secure data computing in fog/edge computing-based IoT
- Secure data analysis in fog/edge computing-based IoT
- Adaptive data privacy, trust, and security solutions for fog/edge computing-based IoT
- Advanced cryptography methods and tools for fog/edge computing-based IoT
- Data security and privacy protection for terminal devices
- Data security applications of fog/edge computing-based IoT
- Secure devices and their applications in fog/edge computing-based IoT