Topic Editors

School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China
Department of Computer Science, College of Engineering, Virginia Commonwealth University, Richmond, VA, USA
Faculty of Science and Technology, Charles Darwin University, Darwin 0812, Australia

Recent Advances in Security, Privacy, and Trust

Abstract submission deadline
31 October 2025
Manuscript submission deadline
31 December 2025
Viewed by
5040

Topic Information

Dear Colleagues,

The proliferation of information, communication, and computer technologies has brought us into the realm of the cyber–physical–social system (CPSS). The CPSS comprises the cyber space, physical space and social space, and their integration into such systems as the cyber–physical system (CPS), Internet of Things (IoT), social computing system, and even the system integrating all three spaces. Recently, the CPSS has brought enormous opportunities that have significantly influenced applications. However, there are increasing security, privacy, and trust concerns, such as the exposure of user privacy and business information in the CPSS. Although theories and technologies regarding security, privacy, and trust have been widely studied and applied in recent years, existing methods are still insecure, impractical or inefficient. To address these challenges, this topic solicits articles reflecting the latest research outcomes and developments in security, privacy, and trust.

The topics of interest include, but not limited to, the following:

  • Privacy-enhancing technologies
  • Privacy-preserving/secure/trust data analysis and processing
  • Network security, privacy, and trust
  • Differentially private data analysis
  • Sustainable security, privacy, and trust
  • Economics of security, privacy, and trust
  • Blockchain and its applications
  • IoT/CPS/CPSS security, privacy, and trust
  • Security, privacy, and trust in edge/fog/cloud computing
  • AI/Machine learning security
  • Federated learning
  • System security
  • Hardware security
  • Web security, privacy, and trust
  • Big data, artificial intelligence for security, privacy, and trust
  • Digital twin security, privacy, and trust
  • Cryptographic techniques, cryptographic protocols

Dr. Jun Feng
Dr. Changqing Luo
Prof. Dr. Mamoun Alazab
Topic Editors

Keywords

  • security
  • privacy
  • trust
  • cyberspace security
  • cryptography

Participating Journals

Journal Name Impact Factor CiteScore Launched Year First Decision (median) APC
Electronics
electronics
2.9 4.7 2012 15.6 Days CHF 2400 Submit
Journal of Cybersecurity and Privacy
jcp
- - 2021 23.5 Days CHF 1000 Submit
Mathematics
mathematics
2.4 3.5 2013 16.9 Days CHF 2600 Submit
Sustainability
sustainability
3.9 5.8 2009 18.8 Days CHF 2400 Submit
Remote Sensing
remotesensing
5.0 7.9 2009 23 Days CHF 2700 Submit
ISPRS International Journal of Geo-Information
ijgi
3.4 6.2 2012 35.5 Days CHF 1700 Submit

Preprints.org is a multidiscipline platform providing preprint service that is dedicated to sharing your research from the start and empowering your research journey.

MDPI Topics is cooperating with Preprints.org and has built a direct connection between MDPI journals and Preprints.org. Authors are encouraged to enjoy the benefits by posting a preprint at Preprints.org prior to publication:

  1. Immediately share your ideas ahead of publication and establish your research priority;
  2. Protect your idea from being stolen with this time-stamped preprint article;
  3. Enhance the exposure and impact of your research;
  4. Receive feedback from your peers in advance;
  5. Have it indexed in Web of Science (Preprint Citation Index), Google Scholar, Crossref, SHARE, PrePubMed, Scilit and Europe PMC.

Published Papers (4 papers)

Order results
Result details
Journals
Select all
Export citation of selected articles as:
24 pages, 680 KiB  
Article
A Privacy Protection Scheme of Certificateless Aggregate Ring Signcryption Based on SM2 Algorithm in Smart Grid
by Hongna Song, Zhentao Liu, Teng Wang, Ling Zhao, Haonan Guo and Shuanggen Liu
Mathematics 2024, 12(9), 1314; https://doi.org/10.3390/math12091314 - 25 Apr 2024
Viewed by 268
Abstract
With the rapid increase in smart grid users and the increasing cost of user data transmission, proposing an encryption method that does not increase the construction cost while increasing the user ceiling has become the focus of many scholars. At the same time, [...] Read more.
With the rapid increase in smart grid users and the increasing cost of user data transmission, proposing an encryption method that does not increase the construction cost while increasing the user ceiling has become the focus of many scholars. At the same time, the increase in users will also lead to more security problems, and it is also necessary to solve the privacy protection for users during information transmission. In order to solve the above problems, this paper proposes an aggregated ring encryption scheme based on the SM2 algorithm with special features, referred to as SM2-CLARSC, based on the certificateless ring signcryption mechanism and combining with the aggregate signcryption. SM2-CLARSC is designed to satisfy the basic needs of the smart grid, and it can be resistant to replay attacks, forward security and backward security, etc. It has better security and higher efficiency than existing solutions. Comparing SM2-CLARSC with existing typical solutions through simulation, the result proves that this solution has more comprehensive functions, higher security, and significant computational efficiency improvement. Full article
(This article belongs to the Topic Recent Advances in Security, Privacy, and Trust)
Show Figures

Figure 1

17 pages, 774 KiB  
Article
Trust Management Scheme of IoV Based on Dynamic Sharding Blockchain
by Hongmu Han, Sheng Chen, Zhigang Xu, Xinhua Dong and Jing Zeng
Electronics 2024, 13(6), 1016; https://doi.org/10.3390/electronics13061016 - 07 Mar 2024
Viewed by 599
Abstract
With the rapid development of communication technologies, the demand for security and automation of driving has promoted the development of the Internet of Vehicles (IoV). The IoV aims to provide users with a safer, more comfortable, and more efficient driving experience. However, the [...] Read more.
With the rapid development of communication technologies, the demand for security and automation of driving has promoted the development of the Internet of Vehicles (IoV). The IoV aims to provide users with a safer, more comfortable, and more efficient driving experience. However, the current IoV also faces a series of potential security risks and privacy breaches, which has further propelled research on trust management for vehicular networks. The introduction of the blockchain has resolved the issue of data security in IoV trust management. However, the blockchain is limited by its own performance and scalability, making it unsuitable for large-scale networks. In order to enhance the transaction-processing efficiency of blockchain-based trust management solutions and address their scalability limitations, this paper presents a graph partition-based blockchain-sharding protocol. Simulation results on real-world datasets demonstrate that the proposed scheme exhibits better scalability compared to existing blockchain-based approaches and can accommodate larger-scale device access. Full article
(This article belongs to the Topic Recent Advances in Security, Privacy, and Trust)
Show Figures

Figure 1

13 pages, 4658 KiB  
Article
A Sampling-Based Method for Detecting Data Poisoning Attacks in Recommendation Systems
by Mohan Li, Yuxin Lian, Jinpeng Zhu, Jingyi Lin, Jiawen Wan and Yanbin Sun
Mathematics 2024, 12(2), 247; https://doi.org/10.3390/math12020247 - 12 Jan 2024
Viewed by 845
Abstract
The recommendation algorithm based on collaborative filtering is vulnerable to data poisoning attacks, wherein attackers can manipulate system output by injecting a large volume of fake rating data. To address this issue, it is essential to investigate methods for detecting systematically injected poisoning [...] Read more.
The recommendation algorithm based on collaborative filtering is vulnerable to data poisoning attacks, wherein attackers can manipulate system output by injecting a large volume of fake rating data. To address this issue, it is essential to investigate methods for detecting systematically injected poisoning data within the rating matrix. Since attackers often inject a significant quantity of poisoning data in a short period to achieve their desired impact, these data may exhibit spatial proximity. In other words, poisoning data may be concentrated in adjacent rows of the rating matrix. This paper capitalizes on the proximity characteristics of poisoning data in the rating matrix and introduces a sampling-based method for detecting data poisoning attacks. First, we designed a rating matrix sampling method specifically for detecting poisoning data. By sampling differences obtained from the original rating matrix, it is possible to infer the presence of poisoning attacks and effectively discard poisoning data. Second, we developed a method for pinpointing malicious data based on the distance of rating vectors. Through distance calculations, we can accurately identify the positions of malicious data. After that, we validated the method on three real-world datasets. The results demonstrate the effectiveness of our method in identifying malicious data within the rating matrix. Full article
(This article belongs to the Topic Recent Advances in Security, Privacy, and Trust)
Show Figures

Figure 1

18 pages, 2119 KiB  
Article
A Certificateless Online/Offline Aggregate Signcryption Scheme against Collusion Attacks Based on Fog Computing
by Wanju Zhang, Shuanggen Liu, Yaowei Liu, Junjie Cao, Bingqi Fu and Yun Du
Electronics 2023, 12(23), 4747; https://doi.org/10.3390/electronics12234747 - 23 Nov 2023
Viewed by 677
Abstract
The certificateless online/offline aggregate signcryption scheme combines the characteristics of the certificateless aggregate signcryption scheme and the online/offline encryption scheme, which can increase efficiency while simultaneously reducing consumption. Some schemes can meet the requirements of confidentiality and real-time transmission of the data in [...] Read more.
The certificateless online/offline aggregate signcryption scheme combines the characteristics of the certificateless aggregate signcryption scheme and the online/offline encryption scheme, which can increase efficiency while simultaneously reducing consumption. Some schemes can meet the requirements of confidentiality and real-time transmission of the data in ad hoc networks (VANETS). However, they are unable to withstand collusion attempts. A brand-new certificateless aggregate signcryption approach is suggested to overcome this problem. First, combining fog computing with online/offline encryption (OOE) technology can increase efficiency while simultaneously reducing consumption. Second, we may achieve effective information authentication and vehicle identification using aggregation and vehicle pseudonym systems. Third, the anti-collusion component is suggested as a viable defense against collusion assaults since certain methods are unable to withstand such attacks. Additionally, it is demonstrated that the technique has unforgeability and secrecy, and can fend off collusion attacks using the random oracle model. The findings demonstrate that our system can not only ensure the confidentiality and the real-time transmission of data but also resist collusion attacks without raising computational costs. Full article
(This article belongs to the Topic Recent Advances in Security, Privacy, and Trust)
(This article belongs to the Section Electrical and Autonomous Vehicles)
Show Figures

Graphical abstract

Back to TopTop