Special Issue

Topic: Cloud Computing Security and Privacy: Challenges and Future Trends

A Special Issue of Journal of Surveillance, Security and Safety

ISSN 2694-1015 (Online)

Submission deadline: 31 Mar 2024

Guest Editor(s)

Prof. Mingwu Zhang
School of Computers, Hubei University of Technology, Wuhan, Hubei, China.
Prof. Hua Shen
School of Computers, Hubei University of Technology, Wuhan, Hubei, China.
Dr. Yudi Zhang
School of Computing and Information Technology, University of Wollongong, Wollongong, Australia.

Special Issue Introduction

Cloud computing has been around for approximately two decades and provides the benefits of business efficiencies, cost-effectiveness, and competitive advantages. Emerging technologies, such as Big Data, Artificial Intelligence, and Machine Learning, are gaining traction, leading to the global growth of the cloud computing market.

However, cloud data security, privacy and trust remain a pressing issue. Cloud data storage increases the risk of data leakage and unauthorized access. The data owner cannot fully trust cloud data management. Cloud data processing and computing may disclose the privacy of the data owner or related entities to unauthorized third parties. To overcome these problems, cryptography protocols have been widely used to protect data security, privacy, and trust in cloud computing, but the existing solutions are still imperfect.

In this Special Issue, we focus on emerging security and privacy challenges associated with the confluence of cybersecurity and privacy in cloud computing.

Topics of interest include, but are not limited to:
● Foundations of cloud-centric threat models
● Cryptographic protocols for cloud security
● Data auditing on cloud data management
● Outsourcing scheme for cloud data
● Cryptographic schemes for secure cloud data storage and deduplication
● Secure cloud resource virtualization mechanisms
● Privacy and integrity mechanisms for outsourcing system
● Secure computation outsourcing in clouds
● Blockchain and cloud system security
● Machine learning security and privacy
● Design and implementation of next-generation cryptography for cloud platform

Keywords

Cloud computing, cloud security, cloud system security, cloud data management

Submission Deadline

31 Mar 2024

Submission Information

For Author Instructions, please refer to https://www.oaepublish.com/jsss/author_instructions
For Online Submission, please login at https://oaemesas.com/login?JournalId=jsss&SpecialIssueId=jsss221110
Submission Deadline: 31 Mar 2024
Contacts: Yoyo Bai, Assistant Editor, assistant-editor@jsssjournal.com

Published Articles

EFAW: a new mining attack model combining FAW attacks with the Eclipse attack
Open Access Original Article 20 Dec 2023
Views: Downloads:
Download PDF
Resist the type of BWH attack: through introducing discount factor and withdrawal threshold into Bitcoin
Open Access Original Article 10 May 2023
Views: Downloads:
Download PDF
Adaptive mining difficulty for blockchain to resist selfish mining attack
Open Access Original Article 8 May 2023
Views: Downloads:
Download PDF
Journal of Surveillance, Security and Safety
ISSN 2694-1015 (Online)
Follow Us

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/