Hot Keywords
Crime prevention and control DNS Big data analytics Organisational learning Resilience properties NFC Cryptographic protocols

Topic: Data Integrity Auditing in 5G and Beyond Defined Edge Computing

A special issue of Journal of Surveillance, Security and Safety

ISSN 2694-1015 (Online)

Submission deadline: 15 Nov 2021

Guest Editor(s)

  • Prof. Jian Shen
    College of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, Jiangsu, China.

    Website | E-mail

Special Issue Introduction

Call for Papers

Special Issue on Data Integrity Auditing in 5G and Beyond Defined Edge Computing

Theme and Scope

Traditional data integrity auditing refers to the check of the data integrity in the cloud by utilizing multiple kinds of cloud computing technologies. However, with the development of 5G and beyond technologies, cloud computing is becoming inefficient in addressing the problems of high latency, resource allocation, and bandwidth limitation. The security, privacy, integrity of cloud data and the users’ dynamic and real-time operations will inevitably be affected. As an overarching feature towards 5G-and-beyond to support all scenarios efficiently, edge computing, which enables data storage and processing at the edge of the network, has emerged as a promising technology in recent years. However, the unique features of edge computing, such as content perception, real-time computing and parallel processing, bring new security and privacy issues while facilitating data integrity auditing. Specifically, in edge computing, there are massive real-time dynamic data generated by edge devices in a real network, providing the opportunities to perform data association, integration analysis and privacy mining for attackers. In addition, the existing privacy-preserving schemes, which protect edge devices and service providers from data leakage, can introduce huge computation and communication overhead. Due to limited resources, end devices are unable to store a large quantity of data or execute a high complexity security algorithm. Consequently, data integrity auditing in 5G and beyond defined edge computing still faces new challenges.

This special issue seeks to bring researchers, scholars and participators in communication and networking technology to address challenges and present effective solutions over data integrity auditing in 5G and beyond defined edge computing. Topics include but are not limited to:

1. New architectures, frameworks, and models for data integrity auditing
2. Secure communication between edge devices
3. Recovery and backup of data during a system outage in edge computing
4. New secure and privacy-preserving issues in data integrity auditing
5. Lightweight communication technology for edge computing
6. Distributed searchable encryption algorithm in data integrity auditing
7. Data, location, identity privacy protection in edge computing
8. Dynamic auditing mechanisms for edge computing

Submission Deadline

15 Nov 2021

Submission Information

Articles of special issue are free of charge for article processing.
For Author Instructions, please refer to
For Online Submission, please login at
Submission Deadline: 15 Nov 2021
Contacts: Stella Gao, Assistant Editor,

Published Articles

This special issue is now open for submission.
© 2016-2021 OAE Publishing Inc., except certain content provided by third parties