Special Issue

Topic: Cloud Computing Security and Privacy: Challenges and Future Trends
A Special Issue of Journal of Surveillance, Security and Safety
ISSN 2694-1015 (Online)
Submission deadline: 31 Mar 2023
Guest Editor(s)
Special Issue Introduction
Cloud computing has been around for approximately two decades and provides the benefits of business efficiencies, cost-effectiveness, and competitive advantages. Emerging technologies, such as Big Data, Artificial Intelligence, and Machine Learning, are gaining traction, leading to the global growth of the cloud computing market.
However, cloud data security, privacy and trust remain a pressing issue. Cloud data storage increases the risk of data leakage and unauthorized access. The data owner cannot fully trust cloud data management. Cloud data processing and computing may disclose the privacy of the data owner or related entities to unauthorized third parties. To overcome these problems, cryptography protocols have been widely used to protect data security, privacy, and trust in cloud computing, but the existing solutions are still imperfect.
In this Special Issue, we focus on emerging security and privacy challenges associated with the confluence of cybersecurity and privacy in cloud computing.
Topics of interest include, but are not limited to:
● Foundations of cloud-centric threat models
● Cryptographic protocols for cloud security
● Data auditing on cloud data management
● Outsourcing scheme for cloud data
● Cryptographic schemes for secure cloud data storage and deduplication
● Secure cloud resource virtualization mechanisms
● Privacy and integrity mechanisms for outsourcing system
● Secure computation outsourcing in clouds
● Blockchain and cloud system security
● Machine learning security and privacy
● Design and implementation of next-generation cryptography for cloud platform
However, cloud data security, privacy and trust remain a pressing issue. Cloud data storage increases the risk of data leakage and unauthorized access. The data owner cannot fully trust cloud data management. Cloud data processing and computing may disclose the privacy of the data owner or related entities to unauthorized third parties. To overcome these problems, cryptography protocols have been widely used to protect data security, privacy, and trust in cloud computing, but the existing solutions are still imperfect.
In this Special Issue, we focus on emerging security and privacy challenges associated with the confluence of cybersecurity and privacy in cloud computing.
Topics of interest include, but are not limited to:
● Foundations of cloud-centric threat models
● Cryptographic protocols for cloud security
● Data auditing on cloud data management
● Outsourcing scheme for cloud data
● Cryptographic schemes for secure cloud data storage and deduplication
● Secure cloud resource virtualization mechanisms
● Privacy and integrity mechanisms for outsourcing system
● Secure computation outsourcing in clouds
● Blockchain and cloud system security
● Machine learning security and privacy
● Design and implementation of next-generation cryptography for cloud platform
Keywords
Cloud computing, cloud security, cloud system security, cloud data management
Submission Deadline
31 Mar 2023
Submission Information
For Author Instructions, please refer to https://oaepublish.com/jsss/author_instructions
For Online Submission, please login at https://oaemesas.com/login?JournalId=jsss&SpecialIssueId=jsss221110
Submission Deadline: 31 Mar 2023
Contacts: Yoyo Bai, Assistant Editor, assistant-editor@jsssjournal.com
Published Articles
Open Access Original Article

Resist the type of BWH attack: through introducing discount factor and withdrawal threshold into Bitcoin
This article belongs to the Special Issue Cloud Computing Security and Privacy: Challenges and Future Trends
J Surveill Secur Saf 2023;4:35-46.
Available online: 10 May 2023
Open Access Original Article
Adaptive mining difficulty for blockchain to resist selfish mining attack
This article belongs to the Special Issue Cloud Computing Security and Privacy: Challenges and Future Trends
J Surveill Secur Saf 2023;4:14-34.
Available online: 8 May 2023