Data Security and Privacy in Cloud and IoT

A special issue of Information (ISSN 2078-2489). This special issue belongs to the section "Information Security and Privacy".

Deadline for manuscript submissions: closed (31 August 2023) | Viewed by 1596

Special Issue Editor

Department of Computing Sciences, The College at Brockport, State University of New York, Brockport, NY 14420, USA
Interests: network and data security; artificial intelligence; big data; cloud computing

Special Issue Information

Dear Colleagues,

Data security and privacy are important issues in computing systems. Particularly today, with the advances in computing technologies, determining how to defend digital information against malicious and accidental threats and protect data security and privacy in the context of the cloud, intelligence, and the Internet of Things (IoT) is a topic worthy of more research. Cloud computing provides virtual storage and access over Internet infrastructures, posing tremendous concerns about user data security and privacy. The IoT grows rapidly with the support of hardware, software, architecture, Internet, and artificial intelligence and enables numerous devices, sensors, and actuators to interconnect and exchange data. During the processes of interconnection and intercommunication, more attention to data security and privacy has been brought to researchers for improving the existing infrastructures, protocols, mechanisms, and technologies.   

The goal of this Special Issue is to collect a wide variety of research or literature papers written by experts to provide insights into the state-of-the-art technology, architecture, mechanism, protocol, application, and practice developed for data security and privacy, especially those based on the platforms of the cloud and the IoT. Our mission is to advance the existing body of knowledge by sharing contemporary, cutting-edge research in data security and privacy. Moreover, we aim to provide a platform for valuable work and research to address new, innovative, and state-of-the-art data security and privacy applications.

The topics of interest include but are not limited to:

  • Security attack in the cloud/IoT
  • Threat models and attack methodologies
  • Security and privacy reviews in the cloud/IoT
  • Security and protection architectures
  • Data analysis security and privacy
  • Authentication models
  • Access control methods
  • Cryptography protocols and algorithms
  • Trustworthy models
  • AI-empowered security
  • Explainable AI
  • Energy efficient solutions in the cloud/IoT
  • Security applications and management
  • Risk management for security and privacy
  • Zero-trust models

Dr. Ning Yu
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • data security
  • data privacy
  • security attack
  • privacy protection
  • cloud computing
  • internet of things
  • authentication
  • authorization
  • access control
  • cryptography
  • encryption and decryption
  • artificial intelligence
  • deep learning
  • machine learning
  • zero trust
  • AI-empowered security
  • security threat
  • trustworthy AI

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

19 pages, 8333 KiB  
Article
A New Migration and Reproduction Intelligence Algorithm: Case Study in Cloud-Based Microgrid
by Renwu Yan, Yunzhang Liu and Ning Yu
Information 2023, 14(10), 562; https://doi.org/10.3390/info14100562 - 12 Oct 2023
Viewed by 956
Abstract
Inspired by the migration and reproduction of species in nature to explore suitable habitats, this paper proposed a new swarm intelligence algorithm called the Migration and Reproduction Algorithm (MARA). This new algorithm discusses how to transform the behavior of an organism looking for [...] Read more.
Inspired by the migration and reproduction of species in nature to explore suitable habitats, this paper proposed a new swarm intelligence algorithm called the Migration and Reproduction Algorithm (MARA). This new algorithm discusses how to transform the behavior of an organism looking for a suitable habitat into a mathematical model, which can solve optimization problems. MARA has some common features with other optimization methods such as particle swarm optimization (PSO) and the fireworks algorithm (FWA), which means MARA can also solve the optimization problems that PSO and FWA are used to, namely, high-dimensional optimization problems. MARA also has some unique features among biology-based optimization methods. In this paper, we articulated the structure of MARA by correlating it with natural biogeography; then, we demonstrated the performance of MARA on sets of 12 benchmark functions. In the end, we applied it to optimize a practical problem of power dispatching in a multi-microgrid system that proved it has certain value in practical applications. Full article
(This article belongs to the Special Issue Data Security and Privacy in Cloud and IoT)
Show Figures

Figure 1

Back to TopTop