Skip to main content

Security and privacy issues for artificial intelligence in edge-cloud computing

Edge computing has emerged as a popular computing paradigm with the aim to minimize the delay between end-users and the cloud. A wide range of artificial intelligence applications benefit from the low latency offered by edge computing, e.g., driverless cars, smart homing, etc. However, edge computing suffers from capacity limitations and is challenged by computationally expensive artificial intelligent applications. To overcome these limitations, the edge-cloud computing paradigm offers a trade-off between artificial intelligence applications, requirements for computing resources and low latency. Unlike the centralized cloud, in the edge-cloud environment, there is a lack of security technologies and privacy protection mechanisms specifically designed for artificial intelligence applications facilitated by the edge-cloud computing paradigm. In the edge-cloud environment, artificial intelligence applications are subject to a variety of security threats, such as data privacy disclosure, adversarial attacks, confidential attacks, etc. This thematic series shares and discusses recent advances and future trends of security and privacy issues for artificial intelligence in edge-cloud computing.

Guest editors:
Lianyong Qi, Qufu Normal University, China
Jianxin Li, Beihang University, China
Nick Antonopoulos, Edinburgh Napier University, UK
Hao Wang, Norwegian University of Science and Technology, Norway

  1. The growth of cloud computing is hindered by concerns about privacy and security. Despite the widespread use of network intrusion detection systems (NIDS), the issue of false positives remains prevalent. Furth...

    Authors: Abdel-Rahman Al-Ghuwairi, Yousef Sharrab, Dimah Al-Fraihat, Majed AlElaimat, Ayoub Alsarhan and Abdulmohsen Algarni
    Citation: Journal of Cloud Computing 2023 12:127
  2. As the cloud services market grows, cloud management tools that detect network anomalies in a non-intrusive manner are critical to improve users’ experience of cloud services. However, some network anomalies, ...

    Authors: Yunfeng Duan, Chenxu Li, Guotao Bai, Guo Chen, Fanqin Zhou, Jiaxing Chen, Zehua Gao and Chun Zhang
    Citation: Journal of Cloud Computing 2023 12:126
  3. Cloud Computing plays a pivotal role in facilitating the Internet of Things (IoT) and its diverse applications. Users frequently access and store data on remote servers in Cloud Computing environments through ...

    Authors: Xiaolong Li, Tingting Wang, Wei Zhang, Xu Niu, Tingyu Zhang, Tengteng Zhao, Yongji Wang and Yufei Wang
    Citation: Journal of Cloud Computing 2023 12:118
  4. The proportion of multimedia traffic in data networks has grown substantially as a result of advancements in IT. As a result, it's become necessary to address the following challenges in protecting multimedia ...

    Authors: Waleed Alomoush, Osama A. Khashan, Ayat Alrosan, Hani H. Attar, Ammar Almomani, Fuad Alhosban and Sharif Naser Makhadmeh
    Citation: Journal of Cloud Computing 2023 12:96
  5. Graph representation learning has made significant strides in various fields, including sociology and biology, in recent years. However, the majority of research has focused on static graphs, neglecting the te...

    Authors: Zhaowei Liu, Weishuai Che, Shenqiang Wang, Jindong Xu and Haoyu Yin
    Citation: Journal of Cloud Computing 2023 12:89
  6. Cloud computing adoption has been increasing rapidly amid COVID-19 as organisations accelerate the implementation of their digital strategies. Most models adopt traditional dynamic risk assessment, which does ...

    Authors: Dawood Behbehani, Nikos Komninos, Khalid Al-Begain and Muttukrishnan Rajarajan
    Citation: Journal of Cloud Computing 2023 12:79
  7. Personal health record (PHR) is a medical model in which patients can upload their medical records and define the access control by themselves. Since the limited local storage and the development of cloud comp...

    Authors: Yuqin Sun, Lidong Han, Jingguo Bi, Xiao Tan and Qi Xie
    Citation: Journal of Cloud Computing 2023 12:77
  8. The rapid advancement of the Internet has brought a exponential growth in network traffic. At present, devices deployed at edge nodes process huge amount of data, extract key features of network traffic and th...

    Authors: Yan Zhou, Huiling Shi, Yanling Zhao, Wei Ding, Jing Han, Hongyang Sun, Xianheng Zhang, Chang Tang and Wei Zhang
    Citation: Journal of Cloud Computing 2023 12:53
  9. With the awakening of health awareness, people are raising a series of health-related requirements for the buildings they live in, with a view to improving their living conditions. In this context, BIM (Buildi...

    Authors: Min Yang, Chengmin Ge, Xiaoran Zhao and Huaizhen Kou
    Citation: Journal of Cloud Computing 2023 12:31
  10. In the early days of digital transformation, the automation, scalability, and availability of cloud computing made a big difference for business. Nonetheless, significant concerns have been raised regarding th...

    Authors: Ahmed A. Mawgoud, Mohamed Hamed N. Taha, Amr Abu-Talleb and Amira Kotb
    Citation: Journal of Cloud Computing 2022 11:97
  11. Nowadays, smart medical cloud platforms have become a new direction in the industry. However, because the medical system involves personal physiological data, user privacy in data transmission and processing i...

    Authors: Jindong Zhao, Wenshuo Wang, Dan Wang, Xuan Wang and Chunxiao Mu
    Citation: Journal of Cloud Computing 2022 11:96
  12. K-anonymity has been gaining widespread attention as one of the most widely used technologies to protect location privacy. Nevertheless, there are still some threats such as behavior deception and service swin...

    Authors: Manxiang Yang, Baopeng Ye, Yuling Chen, Tao Li, Yixian Yang, Xiaobin Qian and Xiaomei Yu
    Citation: Journal of Cloud Computing 2022 11:2
  13. Blockchain technology has the characteristics of decentralization and tamper resistance, which can store data safely and reduce the cost of trust effectively. However, the existing blockchain system has weak p...

    Authors: Xiaogang Xing, Yuling Chen, Tao Li, Yang Xin and Hongwei Sun
    Citation: Journal of Cloud Computing 2021 10:52
  14. Due to the high risk factors in the electric power industry, the safety of power system can be improved by using the surveillance system to predict and warn the operators’ nonstandard and unsafe actions in rea...

    Authors: Yanfang Yin, Jinjiao Lin, Nongliang Sun, Qigang Zhu, Shuaishuai Zhang, Yanjie Zhang and Ming Liu
    Citation: Journal of Cloud Computing 2021 10:17
  15. Intelligent transportation brings huge benefits to humans’ life and Industrial production in terms of vehicle control and traffic management. Now, the development of edge-cloud computing has once again promote...

    Authors: Bin Xie, Kun Zhang, Yi Zhao, Yunchun Zhang, Ying Cai and Tian Wang
    Citation: Journal of Cloud Computing 2021 10:10
  16. With the rapid development of hospital informatization and Internet medical service in recent years, most hospitals have launched online hospital appointment registration systems to remove patient queues and i...

    Authors: Junshu Wang, Guoming Zhang, Wei Wang, Ka Zhang and Yehua Sheng
    Citation: Journal of Cloud Computing 2021 10:4
  17. Data redundancy is a significant issue that wastes plenty of storage space in the cloud-fog storage integrated environments. Most of the current techniques, which mainly center around the static scenes, for ex...

    Authors: Shynu P. G., Nadesh R. K., Varun G. Menon, Venu P., Mahdi Abbasi and Mohammad R. Khosravi
    Citation: Journal of Cloud Computing 2020 9:61
  18. Edge computing equipment is a new tool that has been widely used to monitor the operation state of industrial equipment and to diagnose and analyze faults. Therefore, the fault diagnosis algorithm used in the ...

    Authors: Xiaoping Zhao, Kaiyang Lv, Zhongyang Zhang, Yonghong Zhang and Yifei Wang
    Citation: Journal of Cloud Computing 2020 9:58
  19. The video request service of users in 5G network will explode, and adaptive bit rate technology can provide users with reliable video response. Placing video resources on edge servers close to users can overco...

    Authors: Zhi Liu, Bo Qiao and Kui Fang
    Citation: Journal of Cloud Computing 2020 9:56
  20. This paper proposes a collaborative scheduling strategy for computing resources of the Internet of vehicles considering location privacy protection in the mobile edge computing environment. Firstly, a multi ar...

    Authors: Meiyu Pang, Li Wang and Ningsheng Fang
    Citation: Journal of Cloud Computing 2020 9:52
  21. Blockchain-based cloud application (BCP) is an emerging cloud application architecture. By moving trust-critical functions onto blockchain, BCP offers unprecedented function transparency and data integrity. Et...

    Authors: Chao Liu, Jianbo Gao, Yue Li, Huihui Wang and Zhong Chen
    Citation: Journal of Cloud Computing 2020 9:35
  22. Accurate precipitation estimation is significant since it matters to everyone on social and economic activities and is of great importance to monitor and forecast disasters. The traditional method utilizes an ...

    Authors: Wei Tian, Lei Yi, Wei Liu, Wei Huang, Guangyi Ma and Yonghong Zhang
    Citation: Journal of Cloud Computing 2020 9:22
  23. Power grid dispatching is among the forefront issues in the power industry for it can highly influence the efficiency of electricity-related industries. At present, power grid dispatching is usually managed ma...

    Authors: Xianrui Yang, Yuming Liu, Jiehong Wang, Zhao Yao, Yanping Zhou and Shucun Fu
    Citation: Journal of Cloud Computing 2020 9:20