Special Issue "Security and Privacy Issues in the Internet of Cloud"

A special issue of Future Internet (ISSN 1999-5903). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: 31 March 2023 | Viewed by 4144

Special Issue Editor

Department of Cultural Technology and Communication, University of the Aegean, 81100 Mytilene, Greece
Interests: privacy requirements engineering; security requirements engineering; business modelling; security and privacy in cloud computing
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Cloud computing services have dominated a great amount of Internet resources for many years since most everyday Internet users take advantage of the various types of services offered through the three service models provided. In recent years, beside private users we have witnessed many enterprises, organizations, and public sector governments adopt cloud-based solutions to improve their daily operations and offer new services to users and third party organizations.

In parallel with this, based on recent reports one the fastest developing domains of cloud computing infrastructure is the Internet of Things (IoT). In 2021, American enterprises alone increased IoT-based solutions by 44% compared to 2020. This combination of Cloud Computing and IoT has led the research community to adopt the term Internet of Cloud (IoC), since it is a new domain that raises plenty of opportunities and challenges but also questions and issues demanding deeper investigation.

This Special Issue will discuss this trending topic and specifically the security and privacy challenges raised in this new area.

Prof. Dr. Christos Kalloniatis
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • security challenges for IoC
  • privacy challenges for IoC
  • IoC and edge computing challenges
  • ethical issues with IoC
  • security and privacy requirements of IoC
  • security solutions and PETs in IoC

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

Article
The Role of Users’ Demographic and Social Attributes for Accepting Biometric Systems: A Greek Case Study
Future Internet 2022, 14(11), 328; https://doi.org/10.3390/fi14110328 - 13 Nov 2022
Viewed by 644
Abstract
Even though both internet-of-cloud services and biometric systems (BSs) are used worldwide, popular and expanded among public and private services, their utilization has not been extended among Greek users, and in particular within Greek HEIs. This paper aims to examine the University of [...] Read more.
Even though both internet-of-cloud services and biometric systems (BSs) are used worldwide, popular and expanded among public and private services, their utilization has not been extended among Greek users, and in particular within Greek HEIs. This paper aims to examine the University of the Aegean (UA) students’ perceptions, especially on BS acceptance, determining the impact of their sociodemographic characteristics toward this. An online instrument was developed based on constructs of technology acceptance models, and previous research focused on BS acceptance, including a great variety of sociodemographic variables. The authors collected 768 complete responses to explore the social and demographic attributes that impact on students’ BS acceptance through exploratory descriptive research. This study found that several UA students’ sociodemographic attributes are linked to their BS acceptance. Specifically, gender, age, study level, year of study, professional profile and fathers’ occupation are useful to determine which students’ groups are in favor of BS, while employment status, annual income and mothers’ occupation are weak toward this. Security and privacy concerns are indicated to influence users’ BS acceptance as well. This study provides a unique approach to better understanding the Greek students’ BS acceptance, with important implications for improved BS marketing in Greece in synergy with the internet-of-cloud services and their potential adoption in HEIs internal settings. It also provides developers with further knowledge for security and privacy non-functional requirements in order to increase users’ acceptance and to address these challenges within the internet of cloud. Full article
(This article belongs to the Special Issue Security and Privacy Issues in the Internet of Cloud)
Show Figures

Figure 1

Article
Privacy Goals for the Data Lifecycle
Future Internet 2022, 14(11), 315; https://doi.org/10.3390/fi14110315 - 31 Oct 2022
Viewed by 684
Abstract
The introduction of Data Protection by Default and Design (DPbDD) brought in as part of the General Data Protection Regulation (GDPR) in 2018, has necessitated that businesses review how best to incorporate privacy into their processes in a transparent manner, so as to [...] Read more.
The introduction of Data Protection by Default and Design (DPbDD) brought in as part of the General Data Protection Regulation (GDPR) in 2018, has necessitated that businesses review how best to incorporate privacy into their processes in a transparent manner, so as to build trust and improve decisions around privacy best practice. To address this issue, this paper presents a 7-stage data lifecycle, supported by nine privacy goals that together, will help practitioners manage data holdings throughout data lifecycle. The resulting data lifecycle (7-DL) was created as part of the Ideal-Cities project, a Horizon-2020 Smart-city initiative, that seeks to facilitate data re-use and/or repurposed. We evaluate 7-DL through peer review and an exemplar worked example that applies the data lifecycle to a real-time life logging fire incident scenario, one of the Ideal-Cities use cases to demonstrate the applicability of the framework. Full article
(This article belongs to the Special Issue Security and Privacy Issues in the Internet of Cloud)
Show Figures

Figure 1

Article
Determining the Role of Social Identity Attributes to the Protection of Users’ Privacy in Social Media
Future Internet 2022, 14(9), 249; https://doi.org/10.3390/fi14090249 - 24 Aug 2022
Cited by 2 | Viewed by 1081
Abstract
Drawing on digital identity theories, social software engineering theory (SSE), and the Privacy Safeguard (PriS) methodology, we examined the way that personal information uploaded on social media (SM) imposes privacy issues. Throughout a review on users’ self-representation on SM, we examined the impact [...] Read more.
Drawing on digital identity theories, social software engineering theory (SSE), and the Privacy Safeguard (PriS) methodology, we examined the way that personal information uploaded on social media (SM) imposes privacy issues. Throughout a review on users’ self-representation on SM, we examined the impact of self-determination and self-disclosure on users’ privacy, and we identified the social attributes (SA) that cause privacy implications. This paper specifies 18 SA that users employ to achieve their optimal level of representation while summarizing possible ways that these attributes provoke users’ identification. In particular, our research has shown that SM users represent their personas by unveiling SA to construct popular, representative, and conversational profiles. As disclosing SA increases privacy implications, we intend to help users build profiles that respect their privacy. Examining users’ SA deepens our understanding of disclosing personal information on SM while leading to a better quantification of identity attributes; furthermore, users’ top five most revealing attributes were summarized. Considering that SSE addresses users’ privacy implications from an early stage of systems designing, our research, identifying the SA, will be helpful in addressing privacy from a socio-technical aspect, aiming at bridging the socio-technical gap by drawing designers’ attention to users’ social aspects. Full article
(This article belongs to the Special Issue Security and Privacy Issues in the Internet of Cloud)
Show Figures

Figure 1

Review

Jump to: Research

Review
Review on Semantic Modeling and Simulation of Cybersecurity and Interoperability on the Internet of Underwater Things
Future Internet 2023, 15(1), 11; https://doi.org/10.3390/fi15010011 - 26 Dec 2022
Viewed by 1193
Abstract
As maritime and military missions become more and more complex and multifactorial over the years, there has been a high interest in the research and development of (autonomous) unmanned underwater vehicles (UUVs). Latest efforts concern the modeling and simulation of UUVs’ collaboration in [...] Read more.
As maritime and military missions become more and more complex and multifactorial over the years, there has been a high interest in the research and development of (autonomous) unmanned underwater vehicles (UUVs). Latest efforts concern the modeling and simulation of UUVs’ collaboration in swarm formations, towards obtaining deeper insights related to the critical issues of cybersecurity and interoperability. The research topics, which are constantly emerging in this domain, are closely related to the communication, interoperability, and secure operation of UUVs, as well as to the volume, velocity, variety, and veracity of data transmitted in low bit-rate due to the medium, i.e., the water. This paper reports on specific research topics in the domain of UUVs, emphasizing interoperability and cybersecurity in swarms of UUVs in a military/search-and-rescue setting. The goal of this work is two-fold: a) to review existing methods and tools of semantic modeling and simulation for cybersecurity and interoperability on the Internet of Underwater Things (IoUT), b) to highlight open issues and challenges, towards developing a novel simulation approach to effectively support critical and life-saving decision-making of commanders of military and search-and-rescue operations. Full article
(This article belongs to the Special Issue Security and Privacy Issues in the Internet of Cloud)
Show Figures

Figure 1

Back to TopTop