Special Issue on:
Privacy and Security in 5G and beyond the Internet of Things
Security and privacy have become the central concern in most telecommunication sectors in this digital era, as risks can lead to significant consequences. Different cloud-computing technologies became crucial with the development of various technologies, such as 5G networks and beyond the Internet of Things. Cloud computing enables intensive information processing and warehousing solutions. This makes it fit with the features of IoT networks. However, leveraging such technology develops particular new security and privacy challenges, which could be a significant obstacle against performing some primary tasks. Two diverse new cloud technologies that inherit some of the conventional cloud-computing paradigms are edge computing and fog computing. It is intended to unravel some of the complications of cloud computing and leverage the computing potentialities within the community network to execute computation processes instead of performing them in the clouds.
Since cloud-computing technology has been adopted within varying degrees of different industries, it faces other cybersecurity challenges throughout the primary processes. Several challenges, such as misconfigurations, unauthorized access, insecure interfaces, external sharing of data, data loss/leakage, data confidentiality, legal and regulatory compliance, among many others, have been affecting business infrastructures critically. Further, from an auditing context, multiple-point to multiple-point checks will require monitoring a substantial volume of changes altogether with the significant amount of change to these structures. Automated scaling and dynamic updating of the elements will increase more security issues. This volatile situation will set a considerable risk of data losses and expose service providers to a much more significant threat to revenue security. Hence, with the advances of edge and fog computing, organizations must achieve near real-time compliance-driven security monitoring, threat and attack prevention, detection and mitigation solutions. Therefore, the integration of technologies has undeniably widened the attack surface of these systems, jeopardizing the reliability, practicability and accessibility of the complete system architecture. In addition, these technological devices are more vulnerable to several attacks than others, including device theft, information eavesdropping, device manipulation, among many others, causing severe impacts in fog-edge computing systems. Hence, developing advanced strategies, such as user-access control and surveillance to improve physical security at the edge computing, controlling fog and edge operation and customization from key IT functions and monitoring the overall edge activity, specifically activity concerning operation, can prevent privacy and security issues.
In this context, this special issue intends to explore privacy and security in 5G and beyond the Internet of Things: data sharing, threats, liability, audit and compliance concerns for cloud-supported 5G, fog and edge computing. We invite researchers, practitioners and scholars from various technology disciplines to present novel and innovative solutions for this special issue.
Suggested topics include, but are not limited to, the following:
Important dates:
Papers’ Submission Deadline |
July 15, 2023 |
First Decision Notification (Revise/Reject) |
September 1, 2023 |
Revised Papers’ Submission Deadline |
October 1, 2023 |
Final Decision Notification |
November 1, 2023 |
Special Issue Publication |
December 1, 2023 |
Special Issue Guest Editors |
|
Special Issue Guest Editors:
All other information is available on JJCIT website: jjcit.org