Internet of Things (IoT) and Cloud/Edge Computing

A special issue of Information (ISSN 2078-2489). This special issue belongs to the section "Internet of Things (IoT)".

Deadline for manuscript submissions: 31 October 2025 | Viewed by 481

Special Issue Editor


E-Mail Website
Guest Editor
Information Systems Department, St. Cloud State University, St. Cloud, MN 56301, USA
Interests: cloud computing; cloud security; Internet of Medical Things (IoMT); Internet-of-things (IoT); software engineering; social engineering; security and privacy and security metrics

Special Issue Information

Dear Colleagues,

The rapid growth of the Internet of Things and cloud/edge computing has dramatically changed the way that information is created, processed, and utilized in many fields. This Special Issue is dedicated to exploring the synergy between IoT and cloud/edge computing for changing data management, security, and real-time processing. Big-data-generated IoT devices guarantee high scalability, low latency, and better decision-making with cloud/edge infrastructures.

We invite original research, reviews, and case studies addressing innovative solutions and challenges within this domain. Of interest are topics related to data processing frameworks, information security and privacy, resource management, edge intelligence, energy efficiency, and real-time analytics in IoT–cloud/edge systems.

Theoretical development, concrete implementations, and hybrid models—balancing cloud and edge computing in IoT environments—are also sought. This Special Issue aims to develop a thorough understanding of how IoT and cloud computing reshape contemporary information systems, offering academic insights into practical benefits and emerging trends, and future research directions.

Dr. Abdullah Abuhussein
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Internet of Things (IoT)
  • cloud computing (CC)
  • edge computing (EC)
  • real-time data processing
  • IoT security and privacy
  • resource management
  • edge intelligence
  • pervasive computing

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

28 pages, 3315 KiB  
Article
Cloud Security Assessment: A Taxonomy-Based and Stakeholder-Driven Approach
by Abdullah Abuhussein, Faisal Alsubaei, Vivek Shandilya, Fredrick Sheldon and Sajjan Shiva
Information 2025, 16(4), 291; https://doi.org/10.3390/info16040291 - 4 Apr 2025
Viewed by 238
Abstract
Cloud adoption necessitates relinquishing data control to cloud service providers (CSPs), involving diverse stakeholders with varying security and privacy (S&P) needs and responsibilities. Building upon previously published work, this paper addresses the persistent challenge of a lack of standardized, transparent methods for consumers [...] Read more.
Cloud adoption necessitates relinquishing data control to cloud service providers (CSPs), involving diverse stakeholders with varying security and privacy (S&P) needs and responsibilities. Building upon previously published work, this paper addresses the persistent challenge of a lack of standardized, transparent methods for consumers to select and quantify appropriate S&P measures. This work introduces a stakeholder-centric methodology to identify and address S&P challenges, enabling stakeholders to assess their cloud service protection capabilities. The primary contribution lies in the development of new classifications and updated considerations, along with tailored S&P features designed to accommodate specific service models, deployment models, and stakeholder roles. This novel approach shifts from data or infrastructure perspectives to comprehensively account for S&P issues arising from stakeholder interactions and conflicts. A prototype framework, utilizing a rule-based taxonomy and the Goal–Question–Metric (GQM) method, recommends essential S&P attributes. Multi-criteria decision-making (MCDM) is employed to measure protection levels and facilitate benchmarking. The evaluation of the implemented prototype demonstrates the framework’s effectiveness in recommending and consistently measuring security features. This work aims to reduce consumer apprehension regarding cloud migration, improve transparency between consumers and CSPs, and foster competitive transparency among CSPs. Full article
(This article belongs to the Special Issue Internet of Things (IoT) and Cloud/Edge Computing)
Show Figures

Figure 1

Back to TopTop