总访问量
今日访问
在线人数
Internet of Things (IoT) has drawn increasing attention in the smart industry, smart healthcare, smart house, and so on, which plays an important role in making the world simpler, better, and smarter. The IoT devices are connected in the form of wireless communication link to monitor, collect and analysis the huge amounts of sensor data. In this process, it requires substantial computing and storage resources that can be offered through cloud computing. As a distributed computation model over a shared pool, cloud computing provides infrastructure as a service like physical computing resources, data partitioning, storage, etc. In the cloud paradigm, the user just pays for enjoying the corresponding cloud services supported by the cloud service provider (CSP) instead of managing and maintaining the infrastructure, which reduces the local storage overhead and provides the convenient data access service. The novel fog/edge computing paradigm moves cloud-like computing and storage resources to be closer to the network edge around IoT devices. Each fog/edge server can be regarded as a highly virtualized computing system that provides end-users with high-quality services, small latency and real-time application in the face of the explosion of data in IoT.
However, the IoT devices are located at the network edge, and there are a lack of protection mechanisms to resist various cyber-attacks, such as device theft, device manipulation, identity theft, and data eavesdropping. Therefore, there may be a serious impact on data security and privacy preservation when a cloud/fog/edge computing-based IoT system is invaded. It is therefore of tremendous importance to protect the data security and privacy of IoT data with the help and support of cloud/fog/edge computing.
This Special Issue aims to bring together researchers and practitioners to discuss advanced academic and industrial research results related to the data security and privacy preservation in the cloud/fog/edge-enabled Internet of Things. Original research and review articles are welcome. Potential topics include but are not limited to the following:
◆ Data security algorithm for cloud/fog/edge computing-based IoT
◆ Secure data transmission/storage/computing/analysis in cloud/fog/edge computing-based IoT
◆ Privacy-preserving technologies for cloud/fog/edge computing-based IoT
◆ Novel security architecture and algorithms for cloud/fog/edge computing-based IoT
◆ Blockchain-assisted cloud/fog/edge computing-based IoT systems
◆ Secure management technologies for devices in cloud/fog/edge computing-based IoT
◆ Access control in cloud/fog/edge computing-based IoT systems
Submission
This special issue “Data Security and Privacy Preservation in Cloud/Fog/Edge-Enabled Internet of Things” welcomes submissions of high-quality novel research results of data security and privacy preservation in cloud/fog/edge-enabled IoT. All submissions will be anonymously peer reviewed and will be evaluated on the basis of their technical content.
Papers should be submitted online through the manuscript submission system of the Journal of China Universities of Posts and telecommunications. Remember to select “Special Issue on Data Security and Privacy Preservation in Cloud/Fog/Edge-Enabled Internet of Things” as your manuscript type when submitting; otherwise, it might be considered as a regular paper. Information and guidelines on preparation of manuscript are available on the journal website: https://jcupt.bupt.edu.cn.
Important Dates
Submission Deadline - July 30, 2021
Final Decision - September 15, 2021
Final Manuscript Submission - September 30, 2021
Publication Date - December 30, 2021
Team
Zheng Dong, Xi'an University of Posts and Telecommunications
Gao Fei,Bejing University of Posts and Telecommunications
Wang Baocang,Xidian University
Rui Guo,Xi'an University of Posts and Telecommunications