Security and Privacy in D2D-aided Fog Computing Environment: Current Progress and Future Challenge

  in Special Issue   Posted on September 28, 2020

Information for the Special Issue

Special Issue Call for Papers:

Fog computing has emerged as a viable solution for many large-scale latency-sensitive applications. Usually, the concept of fog computing is useful for various mission critical applications that require real-time data processing. Despite the concept of fog computing offering several notable features (e.g., low latency, dynamic per user optimization, etc.), many issues still need to be solved before it can be practically deployed as an efficient computing paradigm. Device-to-device (D2D) communication with advanced communication technologies that exploit short range communications have been suggested as a solution for some of these issues by improving the network performance and supporting proximity-based services. For instance, D2D communication-based fog computing environments can be utilized in 5G HetNet infrastructure for establishing seamless communication between a large number of devices with ultra-low latency support. However, security and privacy in D2D communication for fog enabled applications are major concerns that have hampered their adoption and thus, require immediate and significant efforts from the research community.

This special issue is focused on security and privacy issues in fog computing and D2D communication. Here, we welcome high quality research from both academia and industry, with particular emphasis on novel ideas and techniques. Only technical papers describing previously unpublished, original, state-of-the-art research, and not currently under review by a conference or a journal will be considered. We will recommend submission of multimedia with each paper as this significantly increases the visibility, downloads, and citations of articles.

Selection and Evaluation Criteria

  • Relevance to the topics of this special issue
  • Research novelty (e.g., new techniques) and potential impact
  • Readability

Potential topics include, but are not limited to:

  • Authentication for D2D-aided fog computing environment
  • Privacy for D2D-aided fog computing environment
  • Accountability for D2D-aided fog computing environment
  • Hardware security of devices
  • Access control and key-management for D2D-aided fog computing environment
  • Theories, methods and applications in machine learning addressing security issues and solutions for fog computing and D2D communication
  • Trust management for fog computing and D2D communication
  • Test-bed, prototype implementation and fog-based security applications
  • New paradigms facilitating fog computing and D2D communication
  • Data security in D2D-aided fog computing environment

Important Dates

Submission Deadline: 15th November 2020

First Round of Reviews: 31 January 2021

Revised Manuscript: 15th March 2021

Second Round of Reviews: 15th April 2021

Camera-Ready: 7th May 2021

Guest Editors

Dr. Prosanta Gope, University of Sheffield, United Kingdom (Email: p.gope@sheffield.ac.uk)
Website: https://www.sheffield.ac.uk/dcs/people/academic/pgope

Dr. Biplab Sikdar, National University of Singapore, Singapore (Email: bsikdar@nus.edu.sg) 
Website: https://www.eng.nus.edu.sg/ece/staff/biplab-sikdar/

Dr. Wei Yu, Towson University, USA (Email: wyu@towson.edu)
Website: http://wp.towson.edu/wyu/

Submission Guidelines

All the submission are required to be submitted through the Journal of Information Security and Applications online submission system available at:

https://www.evise.com/evise/faces/pages/navigation/NavController.jspx?JRNL_ACR=JISA

All submissions deemed suitable to be sent for peer review will be reviewed by at least three independent reviewers. Once your manuscript is accepted, it will go into production, and will be simultaneously published in the current regular issue and pulled into the online Special Issue. Articles from this Special Issue will appear in different regular issues of the journal, though they will be clearly marked and branded as Special Issue articles.

Inquiries, including questions about appropriate topics, may be sent electronically to

Dr. Prosanta Gope, p.gope@sheffield.ac.uk

Other Special Issues on this journal

2.327

Trends in Cybersecurity

Journal of Information Security and Applications
Mon 09 Nov 2020

Closed Special Issues