Editorial: Security and Privacy in Computing and Communications

  • PDF / 290,858 Bytes
  • 5 Pages / 595.276 x 790.866 pts Page_size
  • 68 Downloads / 217 Views

DOWNLOAD

REPORT


Editorial: Security and Privacy in Computing and Communications Zheli Liu 1 & Jin Li 2 & Ilsun You 3 & Siu-Ming Yiu 4

# Springer Science+Business Media, LLC, part of Springer Nature 2020

Editorial: The computing models and communication environments are changed tremendously because of the rapid development for real-world application. With the advances in information systems and technologies, we are witnessing the advent of novel challenges on security and privacy in computing and communications for mobile devices, cloud and Internet application, IoT service and application, big data application, etc. The new requirements for security and privacy have been brought by the new technologies and applications. Traditional security and privacy cannot be completely suitable for the new environment. There exist some limitations to the real-world application by the traditional methods. The researchers have tried to explore new methods to solve the security and privacy problems in computing and communication by the usage of machine learning and optimization strategies. The special issue solicits contributions of novel methods to provide security and privacy in computing and communications for real-world application. This special issue features thirty selected papers with high quality. The first article, “A Revocable Group Signatures Scheme to Provide Privacy-Preserving Authentications”, authored by Xiaohan Yue, introduced a security model that contains the definition of backward security, and propose a revocable group signatures scheme that is more efficient and scalable compared to previous ones, especially for Sign and Verify algorithms, which are performed much more frequently than others. In addition, considering the heavy workload of the group manager, they divide the whole group into groups

* Zheli Liu [email protected] 1

Nankai University, 94 Weijin Rd, Nankai District, Tianjin 300071, China

2

Guangzhou University, Guangzhou, China

3

Department of Information Security Engineering, Soonchunhyang University, 22 Suncheonhyang-ro, Sinchang-myeon, Asan-si, Chungcheongnam-do, South Korea

4

The University of Hong Kong, Pok Fu Lam, Hong Kong

by employing a decentralized model to make their scheme more scalable, and thus more practical in real-life applications. The second article titled “Privacy-Preserving Top-k Location-based Services Retrieval in Mobile Internet” provided a secure and efficient service retrieval scheme in cloud computing. Specifically, a novel encrypted index structure is designed by taking both service texts and locations into consideration. Moreover, a depth-first search algorithm is created for the index and it can efficiently return query results. Theoretical analysis and simulation results illustrate security and efficiency of their scheme. In the next article with the title “Throughput Analysis of Smart Buildings-oriented Wireless Networks under Jamming Attacks”, the authors investigated the throughput of IEEE 802.11 enabled IoT, where a ring model is put forward to capture the distributi