Journal Browser

Journal Browser

Cryptographic Applications in Cloud Computing and Internet of Things

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: closed (30 October 2021) | Viewed by 750

Special Issue Editor

E-Mail Website
Guest Editor
Department of Mathematics and Computer Science (DMI), University of Catania, 95125 Catania, Italy
Interests: software engineering; artificial intelligence; distributed systems; energy production
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

In the last few months, the paradigm of Cloud Computing has silently proved itself very valuable. It has managed to adapt to higher levels of demands by seamlessly employing more computational power, as most of the world population has resorted to Internet services more than ever before.

Currently, we are on the verge of some very important changes, as the massive deployment of 5G around the world will support mobile and embedded devices (IoT) as they communicate to each other and to servers an unprecedented amount of data. Such a wealth of information could give rise to newer and more refined applications that monitor and analyse, for example, weather changes, road traffic, pollution in urban areas, critical infrastructures, etc. Cloud Computing, Big Data, and IoT will constitute essential parts of the solution for such applications.

At the same time, data gathered by IoT devices will have to be handled in a way that ensures privacy and tamper-resistance. Cryptography could be applied as soon as data are gathered on the vicinity of the source, and the involved client and server sides will have to deal with cryptographic keys, hashes, and newer functionalities. Meaning, a legitimate request could only be allowed to read parts of the encrypted data; some data summarisation function may be necessary to perform on encrypted data. Moreover, data encryption, validation of encrypted data, as well as summarisation functions on encrypted data will have to be analysed in terms of algorithmic complexity in order to be considered viable solutions when applied to Big Data.

Contributions on new approaches, case studies, methodologies, tools, or validation techniques are welcome for this Special Issue. We also welcome review papers that analyse the current state of the art developments in security, privacy, and data management in the Cloud, Big Data, and IoT. Moreover, contributions that analyse distributed applications from the point of view of security, scalability, performance, are welcome.

Prof. Dr. Emiliano Tramontana
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.


  • Access Control, Authorisation, and Authentication
  • Algorithms and Computations on Encrypted Data
  • Anonymisation techniques
  • Big data security and privacy
  • Blockchain
  • Cooperative systems
  • Cryptographic Algorithms and Protocols
  • Cyber Attack, Crime and Cyber War
  • Data Intensive Applications
  • Emergency and Security Systems
  • Encryption Systems for IoT Data
  • IoT Applications and Case Studies
  • Large Scale Cloud Applications
  • Threats and countermeasures

Published Papers

There is no accepted submissions to this special issue at this moment.
Back to TopTop