Special Issue "Security and Privacy Challenges in Emerging Fog Computing"
A special issue of Sensors (ISSN 1424-8220).
Deadline for manuscript submissions: closed (31 May 2017)
Dr. Rongxing Lu
Fog computing, which extends cloud computing to the edge of the network to provide computation, networking, and storage services between end devices (e.g., smart sensors, meters) and data centers, has drawn a great deal of attention in recent years. In a fog computing environment, much of the processing will take place locally in smart devices rather than having to be transmitted. For instance, if ITS (Intelligent Transportation System) is equipped with fog computing solutions, a great deal of real-time traffic-related information can be efficiently and locally processed by roadside units for better road traffic management. However, the extension from cloud to fog is not a trivial task, as there exist many fundamental differences stemming from the reason that fog computing is developed. The fog computing system design and implementation are challenging, including the model analysis, architecture/algorithm/protocol design, workload balance/allocation, energy consumption/delay control, computing/communication/control co-optimization, prototype test, system integration, application implementation, and many others. In addition, since fog devices are deployed at the network edge and much lower cost than cloud servers, they are more easily compromised and low-trustworthy. Therefore, the awareness of security and privacy challenges also raise in fog computing which deserves in-depth exploration.
This Special Issue intends to collect current developments and the future directions in security and privacy issues of emerging fog computing. We invite authors to submit their original papers. Potential topics include, but are not limited to:
- Authentication, auditing and accountability in fog computing
- Fine-grained access control mechanism in fog computing
- Privacy-preserving computation in fog computing
- Trust and reputation issues in fog computing
- Security architecture for fog-cloud computing
- Key management in fog computing
- Intrusion detection in fog computing
- Secure outsourcing computation of fog devices
- Cyber-physical security of fog device
- Security model in fog applications
Dr. Rongxing Lu
Manuscript Submission Information
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.
Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access monthly journal published by MDPI.
Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.
- Security and privacy
- Key management
- Trust and reputation
- Intrusion detection
- Fog computing
- Authentication, auditing and accountability
- Privacy-preserving Computation