Guest Editor(s)
-
- Prof. Jian Shen
- College of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, Jiangsu, China.
Website | E-mail
Special Issue Introduction
Call for Papers
Special Issue on Data Integrity Auditing in 5G and Beyond Defined Edge Computing
Theme and Scope
Traditional data integrity auditing refers to the check of the data integrity in the cloud by utilizing multiple kinds of cloud computing technologies. However, with the development of 5G and beyond technologies, cloud computing is becoming inefficient in addressing the problems of high latency, resource allocation, and bandwidth limitation. The security, privacy, integrity of cloud data and the users’ dynamic and real-time operations will inevitably be affected. As an overarching feature towards 5G-and-beyond to support all scenarios efficiently, edge computing, which enables data storage and processing at the edge of the network, has emerged as a promising technology in recent years. However, the unique features of edge computing, such as content perception, real-time computing and parallel processing, bring new security and privacy issues while facilitating data integrity auditing. Specifically, in edge computing, there are massive real-time dynamic data generated by edge devices in a real network, providing the opportunities to perform data association, integration analysis and privacy mining for attackers. In addition, the existing privacy-preserving schemes, which protect edge devices and service providers from data leakage, can introduce huge computation and communication overhead. Due to limited resources, end devices are unable to store a large quantity of data or execute a high complexity security algorithm. Consequently, data integrity auditing in 5G and beyond defined edge computing still faces new challenges.
This special issue seeks to bring researchers, scholars and participators in communication and networking technology to address challenges and present effective solutions over data integrity auditing in 5G and beyond defined edge computing. Topics include but are not limited to:
1. New architectures, frameworks, and models for data integrity auditing
2. Secure communication between edge devices
3. Recovery and backup of data during a system outage in edge computing
4. New secure and privacy-preserving issues in data integrity auditing
5. Lightweight communication technology for edge computing
6. Distributed searchable encryption algorithm in data integrity auditing
7. Data, location, identity privacy protection in edge computing
8. Dynamic auditing mechanisms for edge computing
Submission Deadline
30 Jun 2021