Security and Communication Networks

Data Security and Privacy for Fog/Edge Computing-Based IoT


Publishing date
01 Jan 2022
Status
Published
Submission deadline
10 Sep 2021

Lead Editor
Guest Editors

1Anhui University, Hefei, China

2Free University of Bozen-Bolzano, Bolzano, Italy

3Changsha University of Science and Technology, Changsha, China

4University of Leicester, Leicester, UK


Data Security and Privacy for Fog/Edge Computing-Based IoT

Description

The Internet of Things (IoT) generates tremendous amounts of data to be processed at the network edge. In a world powered by the IoT, people are surrounded in their daily lives by IoT devices that collect, store, transmit, and process data constantly. By processing these data, consumers and organizations may gain valuable insights to help them make informed decisions. The novel fog computing (also often referred to as edge computing) paradigm moves cloud-like computing and storage resources from the remote cloud to the network edge within end-users’ geographic proximity. In a fog/edge computing environment, fog/edge servers are deployed at the network edge around end-users. Each fog/edge server can be regarded as a highly virtualized computing system, similar to a lightweight cloud server. Fog/edge servers can provide end-users with high-quality services of data storage, computing, and analysis and can therefore provide strong support for processing IoT data upon their generation.

However, fog/edge servers and terminal IoT devices are located at the network edge, and there are a lack of protection measures to resist various cyber attacks. They are more vulnerable to some attacks than others, such as device theft, device manipulation, identity theft, and data eavesdropping. When a fog/edge computing-based IoT system is invaded, there may be a serious impact on data security and privacy. It is therefore of tremendous importance to protect the security and privacy of IoT data with the help and support of fog/edge computing.

The aim of this Special Issue is to gather research on the latest developments for data security and privacy, from storage and analysis to new frameworks, in fog-edge computing-based IoT. We welcome both original research and review articles.

Potential topics include but are not limited to the following:

  • Data security framework development for fog/edge computing-based IoT
  • Secure data system integration of fog/edge computing-based IoT
  • Secure data transmission in fog/edge computing-based IoT
  • Secure data storage in fog/edge computing-based IoT
  • Secure data computing in fog/edge computing-based IoT
  • Secure data analysis in fog/edge computing-based IoT
  • Adaptive data privacy, trust, and security solutions for fog/edge computing-based IoT
  • Advanced cryptography methods and tools for fog/edge computing-based IoT
  • Data security and privacy protection for terminal devices
  • Data security applications of fog/edge computing-based IoT
  • Secure devices and their applications in fog/edge computing-based IoT

Articles

  • Special Issue
  • - Volume 2021
  • - Article ID 5404061
  • - Research Article

SSGD: A Safe and Efficient Method of Gradient Descent

Jinhuan Duan | Xianxian Li | ... | Jinyan Wang
  • Special Issue
  • - Volume 2021
  • - Article ID 4939589
  • - Research Article

A Lightweight and Secure Anonymous User Authentication Protocol for Wireless Body Area Networks

Junsong Zhang | Qikun Zhang | ... | Yong Gan
  • Special Issue
  • - Volume 2021
  • - Article ID 3717702
  • - Research Article

Blockchain-Based Key Management and Green Routing Scheme for Vehicular Named Data Networking

Hao Liu | Rongbo Zhu | ... | Wengang Xu
  • Special Issue
  • - Volume 2021
  • - Article ID 9927325
  • - Research Article

Classification of Abnormal Traffic in Smart Grids Based on GACNN and Data Statistical Analysis

F. F. Hu | S. T. Zhang | ... | N. D. Liao
  • Special Issue
  • - Volume 2021
  • - Article ID 5569064
  • - Research Article

Early Rumor Detection Based on Deep Recurrent Q-Learning

Wei Wang | Yuchen Qiu | ... | Wu Yang
  • Special Issue
  • - Volume 2021
  • - Article ID 9939796
  • - Research Article

STQ-SCS: An Efficient and Secure Scheme for Fine-Grained Spatial-Temporal Top- Query in Fog-Based Mobile Sensor-Cloud Systems

Jie Min | Junbin Liang | ... | Hongling Chen
  • Special Issue
  • - Volume 2021
  • - Article ID 5581274
  • - Research Article

A Detection Approach for Vulnerability Exploiter Based on the Features of the Exploiter

Jinchang Hu | Jinfu Chen | ... | Jian Yang
  • Special Issue
  • - Volume 2021
  • - Article ID 5580939
  • - Research Article

Blockchain-Based Efficient Device Authentication Protocol for Medical Cyber-Physical Systems

Fulong Chen | Yuqing Tang | ... | Chuanxin Zhao
  • Special Issue
  • - Volume 2021
  • - Article ID 5510586
  • - Research Article

ECLB: Edge-Computing-Based Lightweight Blockchain Framework for Mobile Systems

Qingqing Xie | Fan Dong | Xia Feng
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.