[Om-announce] Special Issue on Security and Privacy in Edge Computing-Assisted Internet of Things (IoT) in Pervasive and Mobile Computing (Elsevier)
Chia-Mu Yu
chiamuyu at gmail.com
Wed Aug 15 09:32:38 CEST 2018
Pervasive and Mobile Computing (Elsevier)
Special Issue on Security and Privacy in Edge Computing-Assisted Internet
of Things (IoT)
Cloud has been popularly used for handling computation-intensive tasks and
providing intelligence to distributed IoT devices. However, as the number
of Internet-connected devices is dramatically growing, cloud shows its
limit on handling the daunting amount of computation loads on the one hand
and the network bandwidth for moving huge volume of data from end devices
to cloud becomes the bottleneck on the other hand. Edge computing is an
emerging paradigm to optimize cloud-IoT ecosystems for tackling both
network bottleneck and reducing data volume. The basic idea behind the edge
computing lies in that the data processing such as analytics and knowledge
generation are performed in the proximity of data origins. One can see edge
devices as small-scale clouds providing comparatively limited functionality
and capability, as compared to the centralized cloud. The use of edge
devices in the proximity of data origins thus improves network latency.
Moreover, the amount of data that need to be processed by each edge device
will be substantially less than the amount of data that need to be
processed by single cloud.
Despite numerous benefits from edge computing, this paradigm also brings
new security and privacy challenges. While edge devices might be
smartphones, smart gates, or even PC/laptop, together with the numerous
kinds of end IoT devices such as smart watch (e.g., Apple iWatch),
implantable medical devices (e.g., fitbit), voice assistants (e.g., Google
Home), one can imagine various scenarios with sensitive data usage. For
example, the smart watch collects sensitive physiological information.
Meanwhile, distributed edge devices need to cooperate with each other
without the involvement of the data center. These scenarios obviously
result in a high concern of security and privacy, especially on, for
example, access control of edge devices, data abuse/misuse, DoS resistance
on edge devices.
The aim of this special issue is to collect recent research on security and
privacy of edge computing, with particular emphasis on security and privacy
issues on edge/end devices. More specifically, we invite recent advanced
research on privacy enhancing technologies and secure cryptographic
techniques to address security and privacy challenges in the field of edge
computing.
The following themes are of particular interest:
Authentication, auditing and accountability in Edge Computing-Assisted
IoT Edge computing architectures and solution design patterns Edge
computing for IoT Communication and networking protocols for Edge
Computing-Assisted IoT Fine-grained access control mechanism in Edge
Computing-Assisted IoT Privacy-preserving computation in Edge
Computing-Assisted IoT Trust and reputation issues in Edge
Computing-Assisted IoT Security architecture for Edge Computing-Assisted
IoT Key management in Edge Computing-Assisted IoT IoT communication in
Edge Computing-Assisted IoT Incentive models or techniques for data
processing in Edge Computing-Assisted IoT
Privacy-Enhancing Cryptographic Techniques in Edge Computing-Assisted IoT
Security for Crowdsourcing in Edge Computing-Assisted IoT
Guest Editors
Claudio A. Ardagna
University of Milan, Italy
claudio.ardagna at unimi.it
Mauro Conti
University of Padova, Italy
conti at math.unipd.it
Chia-Mu Yu
National Chung Hsing University, Taiwan
chiamuyu at nchu.edu.tw
Timeline
Submission Deadline: 30 Sep 2018
Acceptance Notification: 30 Jan 2019
Expected Publication: 30 Mar 2019
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.openmath.org/pipermail/om-announce/attachments/20180815/39016d6c/attachment-0001.html>
More information about the Om-announce
mailing list