Skip to main content

Edge computing security and privacy

With the development of Internet of Things, more and more powerful devices are mediating our daily life. Gartner predicts that there will be 20.4 billion IoT devices by 2020. This will also result in massive data generated by billions of sensors and devices. Meanwhile the increasing demand for advanced services and applications, such as virtual reality, augmented reality and infrastructure for smart cities, has created huge challenges on cloud computing. Edge computing has been proposed as a new computing paradigm where resources like computation and storage are placed closer to the data source. It enables a new class of latency and bandwidth sensitive applications as data can be processed at the nearest edge. Without sending data to the cloud, edge computing therefore enhances  security and privacy. This thematic series aims to collect the most relevant ongoing research efforts in edge computing security and privacy.

Edited by:

Yin Li, Zhejiang University, China
Guangjie Han, Hohai University, Changzhou, China 
Wenbing Zhao, Cleveland State University, Ohio, USA 
Xinheng Wang, University of West London, London, UK 

  1. Through virtualization and resource integration, cloud computing has expanded its service area and offers a better user experience than the traditional platforms, along with its business operation model bringi...

    Authors: Wenjuan Li, Jiyi Wu, Jian Cao, Nan Chen, Qifei Zhang and Rajkumar Buyya
    Citation: Journal of Cloud Computing 2021 10:35
  2. In the past few years, significant progress has been made on spatio-temporal cyber-physical systems in achieving spatio-temporal properties on several long-standing tasks. With the broader specification of spa...

    Authors: Tengfei Li, Jing Liu, Haiying Sun, Xiang Chen, Lipeng Zhang and Junfeng Sun
    Citation: Journal of Cloud Computing 2020 9:65
  3. The rapid development of vehicular ad hoc networks (VANETs) has brought significant improvement to traffic safety and efficiency. However, owing to limitations associated with VANETs’ own unchanging model and ...

    Authors: Hong Zhong, Yingxue Geng, Jie Cui, Yan Xu and Lu Liu
    Citation: Journal of Cloud Computing 2020 9:54
  4. As edge computing paradigm achieves great popularity in recent years, there remain some technical challenges that must be addressed to guarantee smart device security in Internet of Things (IoT) environment. G...

    Authors: Jiankun Sun, Xiong Luo, Honghao Gao, Weiping Wang, Yang Gao and Xi Yang
    Citation: Journal of Cloud Computing 2020 9:53
  5. Because of their portability, electric motorcycles are usually pushed into elevators by residents and charged in the home, which has serious safety risks. Traditional manual-based methods to manage this behavi...

    Authors: Zongwei Zhu, Jing Cao, Tiancheng Hao, Wenjie Zhai, Bin Sun, Gangyong Jia and Ming Li
    Citation: Journal of Cloud Computing 2020 9:41
  6. The two-phase commit (2PC) protocol is a key technique for achieving distributed transactions in storage systems such as relational databases and distributed databases. 2PC is a strongly consistent and central...

    Authors: Pan Fan, Jing Liu, Wei Yin, Hui Wang, Xiaohong Chen and Haiying Sun
    Citation: Journal of Cloud Computing 2020 9:40
  7. Video streaming is critical in IoT systems, enabling a variety of applications such as traffic monitoring and health caring. Traditional adaptive bitrate streaming (ABR) algorithms mainly focus on improving In...

    Authors: Zeng Zeng, Hang Che, Weiwei Miao, Jin Huang, Hao Tang, Mingxuan Zhang and Shaqian Zhang
    Citation: Journal of Cloud Computing 2020 9:38
  8. Inter-city highway plays an important role in modern urban life and generates sensory data with spatio-temporal characteristics. Its current situation and future trends are valuable for vehicles guidance and t...

    Authors: Weilong Ding, Yanqing Xia, Zhe Wang, Zhenyu Chen and Xingyu Gao
    Citation: Journal of Cloud Computing 2020 9:25