Security and Privacy for Edge Computing: Current Progress and Future Challenge

in Special Issue   Posted on August 13, 2017 

Information for the Special Issue

Submission Deadline: Sun 31 Dec 2017
Journal Impact Factor : 2.849
Journal Name : Computers and Security
Journal Publisher:
Website for the Special Issue:
Journal & Submission Website:

Special Issue Call for Papers:

Edge computing is a revolutionary method to optimize cloud computing systems for tackling network bottlenecks. Its characteristic lies in that the data processing such as analytics and knowledge generation are performed at the periphery of the network, as close to the originating source as possible. Network latency can thus be improved. The communication bandwidth requirement between sensors and the data center can also be greatly reduced.

Along with the benefits brought, there are numerous challenges we should take into account, especially with respect to data security and privacy. Various scenarios are highly correlated with sensitive data usage. For example, the sensor may need to collect sensitive information from data producer for some smart services. Meanwhile, peers in the edge computing network need to cooperate with each other for some sensitive jobs without the involvement of the data center. These scenarios result in a high concern from data producers in terms of potential information leakage and misuse, which may compromise their privacy.

Meanwhile, edge computing utilizes a wide range of technologies including wireless sensor networks, mobile data acquisition, mobile signature analysis, peer-to-peer ad hoc networking, local cloud/fog computing, grid/mesh computing, dew computing, mobile edge computing, distributed data storage and retrieval, autonomic self-healing networks, augmented reality, and so on. It is not only of the great necessity but also technically challenging in applying advanced security mechanisms and/or cryptographic techniques to secure edge computing, may it be at the network architecture level, system design level, or implementation at each involved entities.

The aim of this special issue is to present advances in security and privacy enhancing technologies, and provably secure cryptographic techniques, to address such challenges in this rapidly emerging field of edge computing. Topics of interest include (but are not limited to) the following subject categories:

Privacy-Enhancing Cryptographic Techniques
Authentication, auditing and accountability in Edge Computing
Access Control Mechanisms
Secure Data Analysis and Private Learning
Outsourced or Verifiable Computation
Security Model for Edge Computing
Security Architecture for Edge Computing
Secure Federation and Orchestration of Edge Devices
Secure Software-Defined Networking and Virtualization for Edge computing
Key Management for Edge Computing
Security in Content Delivery
Security in Crowdsourcing
Security in Grid Computing
Security in the Internet of Things
Security in Location Services
Security in Pervasive Systems
Sensor Network Security
Trust Management and Reputation Issues
Intrusion Detection in Edge Computing
Cyber-Physical Security of Edge Devices
Usable Security
Wireless and Mobile Security
Secure Mobile Application Development
Mobile (Cloud) User Authentication and Authorization
Multi-factor (Mobile) System
Security and Privacy in Mobile Edge Computing

Instructions for Authors: The manuscript must not be under consideration for publication elsewhere. Conference papers may only be submitted if the paper was completely re-written or substantially extended (30%). For additional questions please contact the guest editors.

Note: If a submitted paper is recommended by the guest editors for “major revision”, the paper will be put through the reviewing process when revised, but not guaranteed to be included in the special issue for which it was submitted.

Suggested Timetable:

Submission Deadline: December 31st 2017
Result of First round of Reviews: February 28th 2018
Submission of Revised Manuscripts: March 31st 2018
Results of Second Round of Reviews: May 15th 2018
Camera-Ready Due: June 15th 2018
Tentative publication date: Late, 2018

Guest Editors:

1. Sherman S.M. Chow
Department of Information Engineering
The Chinese University of Hong Kong, Hong Kong
[email protected]
Editor of TIFS, IJIS, JISA, PoPETs, and SpringerBriefs on CSSN
Lead guest-editor of Pervasive and Mobile Computing (Security & Privacy in Mobile Clouds)
Program Co-Chair of CANS 2017, AsiaCCS-SCC 15, ISC 14, and ProvSec 14

2. Zhe Liu
College of Computer Science and Technology
Nanjing University of Aeronautics and Astronautics, China
[email protected]

3. David Naccache
École normale supérieure
[email protected]

Other Special Issues on this journal

Closed Special Issues