Skip to main content

Security and privacy issues for artificial intelligence in edge-cloud computing

Edge computing has emerged as a popular computing paradigm with the aim to minimize the delay between end-users and the cloud. A wide range of artificial intelligence applications benefit from the low latency offered by edge computing, e.g., driverless cars, smart homing, etc. However, edge computing suffers from capacity limitations and is challenged by computationally expensive artificial intelligent applications. To overcome these limitations, the edge-cloud computing paradigm offers a trade-off between artificial intelligence applications, requirements for computing resources and low latency. Unlike the centralized cloud, in the edge-cloud environment, there is a lack of security technologies and privacy protection mechanisms specifically designed for artificial intelligence applications facilitated by the edge-cloud computing paradigm. In the edge-cloud environment, artificial intelligence applications are subject to a variety of security threats, such as data privacy disclosure, adversarial attacks, confidential attacks, etc. This thematic series shares and discusses recent advances and future trends of security and privacy issues for artificial intelligence in edge-cloud computing.

Guest editors:
Lianyong Qi, Qufu Normal University, China
Jianxin Li, Beihang University, China
Nick Antonopoulos, Edinburgh Napier University, UK
Hao Wang, Norwegian University of Science and Technology, Norway

Page 1 of 2

  1. With the rise of artificial intelligence and the development of social media, people's communication is more convenient and convenient. However, in the Internet environment, the untrue dissemination of news da...

    Authors: Kang Song, Wenqian Shang, Yong Zhang, Tong Yi and Xuan Wang
    Citation: Journal of Cloud Computing 2024 13:68
  2. Trajectory anomalies serve as early indicators of potential issues and frequently provide valuable insights into event occurrence. Existing methods for detecting abnormal trajectories primarily focus on compar...

    Authors: Guohao Tang, Huaying Zhao and Baohua Yu
    Citation: Journal of Cloud Computing 2024 13:53
  3. The detection of different types of concept drift has wide applications in the fields of cloud computing and security information detection. Concept drift detection can indeed assist in promptly identifying in...

    Authors: Jing Chen, Shengyi Yang, Ting Gao, Yue Ying, Tian Li and Peng Li
    Citation: Journal of Cloud Computing 2024 13:40
  4. Cloud computing technology offers flexible and expedient services that carry a variety of profits for both societies as well as individuals. De-duplication techniques were developed to minimize redundant data ...

    Authors: M. Pavithra, M. Prakash and V. Vennila
    Citation: Journal of Cloud Computing 2024 13:8
  5. Research has recently grown on multi-agent systems (MAS) and their coordination and secure cooperative control, for example in the field of edge-cloud computing. MAS offers robustness and flexibility compared ...

    Authors: Xin Wang, Dongsheng Yang, D Raveena Judie Dolly, Shuang Chen, Madini O. Alassafi, Fawaz E. Alsaadi and Jianhui Lyu
    Citation: Journal of Cloud Computing 2024 13:1
  6. Cyber-physical systems (CPSs) are emergent systems that enable effective real-time communication and collaboration (C&C) of physical components such as control systems, sensors, actuators, and the surrounding ...

    Authors: Abdulaziz A. Alsulami, Qasem Abu Al-Haija, Badraddin Alturki, Ali Alqahtani and Raed Alsini
    Citation: Journal of Cloud Computing 2023 12:181
  7. Image feature categorization has emerged as a crucial component in many domains, including computer vision, machine learning, and biometrics, in the dynamic environment of big data and cloud computing. It is e...

    Authors: Huixue Jia, Daomeng Cai, Jie Yang, Weidong Qian, Cong Wang, Xiaoyu Li and Shan Yang
    Citation: Journal of Cloud Computing 2023 12:175
  8. With the development of cloud computing and deep learning, an increasing number of artificial intelligence models have been applied to reality. Such as videos on cell phones can be uploaded to the cloud for st...

    Authors: Hao Yang, Xuewei Wang, Yuling Chen, Hui Dou and Yangwen Zhang
    Citation: Journal of Cloud Computing 2023 12:169
  9. With the widespread adoption of mobile multimedia devices, the deployment of compute-intensive inference tasks on edge and resource-constrained devices, particularly in the context of low-light text detection,...

    Authors: Minglong Xue, Yanyi He, Peiqi Xie, Zhengyang He and Xin Feng
    Citation: Journal of Cloud Computing 2023 12:160
  10. The transformative impact of cloud computing has permeated various industries, reshaping traditional business models and accelerating digital transformations. In the sports industry, the adoption of cloud comp...

    Authors: Lei Xiao, Yang Cao, Yihe Gai, Juntong Liu, Ping Zhong and Mohammad Mahdi Moghimi
    Citation: Journal of Cloud Computing 2023 12:152
  11. The investigation into intelligent acceptance systems for distribution automation terminals has spanned over a decade, furnishing indispensable assistance to the power industry. The integration of cutting-edge...

    Authors: Mingzeng Zhu, Mingzhen Liang, Hefeng Li, Ying Lu and Min Pang
    Citation: Journal of Cloud Computing 2023 12:149
  12. Artificial intelligence (AI) plays a key role in the distribution automation system (DAS). By using artificial intelligence technology, it is possible to intelligently verify and monitor distribution automatio...

    Authors: Hongwei Li, Qiyuan Xu, Qilin Wang and Bin Tang
    Citation: Journal of Cloud Computing 2023 12:146
  13. This paper presents an interesting case study on Legacy Data Integration (LDI for short) for a Regional Cloud Arbitration Court. Due to the inconsistent structure and presentation, legacy arbitration cases can...

    Authors: Jie Song, Haifei Fu, Tianzhe Jiao and Dongqi Wang
    Citation: Journal of Cloud Computing 2023 12:145
  14. Billions of gadgets are already online, making the IoT an essential aspect of daily life. However, the interconnected nature of IoT devices also leaves them open to cyber threats. The quantity and sophisticati...

    Authors: Surjeet Dalal, Umesh Kumar Lilhore, Neetu Faujdar, Sarita Simaiya, Manel Ayadi, Nouf A. Almujally and Amel Ksibi
    Citation: Journal of Cloud Computing 2023 12:137

    The Correction to this article has been published in Journal of Cloud Computing 2023 12:144

  15. Aerial base stations (AeBSs), as crucial components of air-ground integrated networks, are widely employed in cloud computing, disaster relief, and various applications. How to quickly and efficiently deploy m...

    Authors: Lei Liu, Haoran He, Fei Qi, Yikun Zhao, Weiliang Xie, Fanqin Zhou and Lei Feng
    Citation: Journal of Cloud Computing 2023 12:136
  16. In the current era, a tremendous volume of data has been generated by using web technologies. The association between different devices and services have also been explored to wisely and widely use recent tech...

    Authors: Syed Mohamed Thameem Nizamudeen
    Citation: Journal of Cloud Computing 2023 12:134
  17. The growth of cloud computing is hindered by concerns about privacy and security. Despite the widespread use of network intrusion detection systems (NIDS), the issue of false positives remains prevalent. Furth...

    Authors: Abdel-Rahman Al-Ghuwairi, Yousef Sharrab, Dimah Al-Fraihat, Majed AlElaimat, Ayoub Alsarhan and Abdulmohsen Algarni
    Citation: Journal of Cloud Computing 2023 12:127
  18. As the cloud services market grows, cloud management tools that detect network anomalies in a non-intrusive manner are critical to improve users’ experience of cloud services. However, some network anomalies, ...

    Authors: Yunfeng Duan, Chenxu Li, Guotao Bai, Guo Chen, Fanqin Zhou, Jiaxing Chen, Zehua Gao and Chun Zhang
    Citation: Journal of Cloud Computing 2023 12:126
  19. Cloud Computing plays a pivotal role in facilitating the Internet of Things (IoT) and its diverse applications. Users frequently access and store data on remote servers in Cloud Computing environments through ...

    Authors: Xiaolong Li, Tingting Wang, Wei Zhang, Xu Niu, Tingyu Zhang, Tengteng Zhao, Yongji Wang and Yufei Wang
    Citation: Journal of Cloud Computing 2023 12:118
  20. The proportion of multimedia traffic in data networks has grown substantially as a result of advancements in IT. As a result, it's become necessary to address the following challenges in protecting multimedia ...

    Authors: Waleed Alomoush, Osama A. Khashan, Ayat Alrosan, Hani H. Attar, Ammar Almomani, Fuad Alhosban and Sharif Naser Makhadmeh
    Citation: Journal of Cloud Computing 2023 12:96
  21. Graph representation learning has made significant strides in various fields, including sociology and biology, in recent years. However, the majority of research has focused on static graphs, neglecting the te...

    Authors: Zhaowei Liu, Weishuai Che, Shenqiang Wang, Jindong Xu and Haoyu Yin
    Citation: Journal of Cloud Computing 2023 12:89
  22. Cloud computing adoption has been increasing rapidly amid COVID-19 as organisations accelerate the implementation of their digital strategies. Most models adopt traditional dynamic risk assessment, which does ...

    Authors: Dawood Behbehani, Nikos Komninos, Khalid Al-Begain and Muttukrishnan Rajarajan
    Citation: Journal of Cloud Computing 2023 12:79
  23. Personal health record (PHR) is a medical model in which patients can upload their medical records and define the access control by themselves. Since the limited local storage and the development of cloud comp...

    Authors: Yuqin Sun, Lidong Han, Jingguo Bi, Xiao Tan and Qi Xie
    Citation: Journal of Cloud Computing 2023 12:77
  24. The rapid advancement of the Internet has brought a exponential growth in network traffic. At present, devices deployed at edge nodes process huge amount of data, extract key features of network traffic and th...

    Authors: Yan Zhou, Huiling Shi, Yanling Zhao, Wei Ding, Jing Han, Hongyang Sun, Xianheng Zhang, Chang Tang and Wei Zhang
    Citation: Journal of Cloud Computing 2023 12:53
  25. With the awakening of health awareness, people are raising a series of health-related requirements for the buildings they live in, with a view to improving their living conditions. In this context, BIM (Buildi...

    Authors: Min Yang, Chengmin Ge, Xiaoran Zhao and Huaizhen Kou
    Citation: Journal of Cloud Computing 2023 12:31
  26. In the early days of digital transformation, the automation, scalability, and availability of cloud computing made a big difference for business. Nonetheless, significant concerns have been raised regarding th...

    Authors: Ahmed A. Mawgoud, Mohamed Hamed N. Taha, Amr Abu-Talleb and Amira Kotb
    Citation: Journal of Cloud Computing 2022 11:97
  27. Nowadays, smart medical cloud platforms have become a new direction in the industry. However, because the medical system involves personal physiological data, user privacy in data transmission and processing i...

    Authors: Jindong Zhao, Wenshuo Wang, Dan Wang, Xuan Wang and Chunxiao Mu
    Citation: Journal of Cloud Computing 2022 11:96
  28. K-anonymity has been gaining widespread attention as one of the most widely used technologies to protect location privacy. Nevertheless, there are still some threats such as behavior deception and service swin...

    Authors: Manxiang Yang, Baopeng Ye, Yuling Chen, Tao Li, Yixian Yang, Xiaobin Qian and Xiaomei Yu
    Citation: Journal of Cloud Computing 2022 11:2
  29. Blockchain technology has the characteristics of decentralization and tamper resistance, which can store data safely and reduce the cost of trust effectively. However, the existing blockchain system has weak p...

    Authors: Xiaogang Xing, Yuling Chen, Tao Li, Yang Xin and Hongwei Sun
    Citation: Journal of Cloud Computing 2021 10:52
  30. Due to the high risk factors in the electric power industry, the safety of power system can be improved by using the surveillance system to predict and warn the operators’ nonstandard and unsafe actions in rea...

    Authors: Yanfang Yin, Jinjiao Lin, Nongliang Sun, Qigang Zhu, Shuaishuai Zhang, Yanjie Zhang and Ming Liu
    Citation: Journal of Cloud Computing 2021 10:17
  31. Intelligent transportation brings huge benefits to humans’ life and Industrial production in terms of vehicle control and traffic management. Now, the development of edge-cloud computing has once again promote...

    Authors: Bin Xie, Kun Zhang, Yi Zhao, Yunchun Zhang, Ying Cai and Tian Wang
    Citation: Journal of Cloud Computing 2021 10:10
  32. With the rapid development of hospital informatization and Internet medical service in recent years, most hospitals have launched online hospital appointment registration systems to remove patient queues and i...

    Authors: Junshu Wang, Guoming Zhang, Wei Wang, Ka Zhang and Yehua Sheng
    Citation: Journal of Cloud Computing 2021 10:4