Cloud Security in the Age of IoT

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: closed (1 September 2022) | Viewed by 5903

Special Issue Editors


E-Mail Website
Guest Editor
Department of Electrical Engineering and Information Technology, University of Naples Federico II, 80131 Naples, Italy
Interests: cloud security; IoT security; security service level agreements; security evaluation and security assessment; moving target defense
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Information Engineering, Infrastructure and Sustainable Energy, University Mediterranea of Reggio Calabria, 89124 Reggio Calabria, Italy
Interests: IoT; critical requirements; model-driven; system modeling; formal assessment; simulation
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The Internet of Things (IoT) paradigm, together with cloud and edge/fog computing, is today at the basis of many activities we carry out in everyday life. All these technologies, which are rapidly spreading in the current IT landscape, allow for the management and processing of different types of data, often personal and sensitive, and involve devices ranging from objects we deal with every day (e.g., smartphones, fridges, washing machines) to modern industrial equipment (e.g., smart monitoring systems, video surveillance). The massive employment of these devices introduced new issues related to resiliency, efficiency, and infrastructure and data protection. In order to cope with existing security requirements, novel solutions and approaches must be devised for the development, management, and protection of these emerging distributed computing systems. This Special Issue will be a forum to share both ideas and approaches to improve cloud security as well as concrete experiences specifically addressing security in IoT. In this context, we are envisaging works covering one or more of the following topics:

  • IoT secure applications taking advantage of cloud computing;
  • Emerging problems and recent trends in the field of IoT, fog, and edge computing;
  • Distributed architectures in support of IoT security;
  • Confidentiality, integrity and privacy for public, private, and hybrid clouds;
  • Trust in IoT applications;
  • Models and technologies for security management, configuration, and accounting;
  • Security issues including secure communications and strategies to detect and mitigate attacks;
  • Model-based analysis and security assessment;
  • Simulation

Dr. Alessandra De Benedictis
Dr. Roberto Nardone
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Edge/fog/cloud distributed computing for IoT
  • IoT data privacy
  • Cloud Security
  • Formal assessment
  • Model-based

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

17 pages, 3305 KiB  
Article
Certificateless Remote Data Integrity Auditing with Access Control of Sensitive Information in Cloud Storage
by Genqing Bian, Fan Zhang, Rong Li and Bilin Shao
Electronics 2022, 11(19), 3116; https://doi.org/10.3390/electronics11193116 - 29 Sep 2022
Viewed by 1321
Abstract
With the spread of cloud storage technology, checking the integrity of data stored in the cloud effectively is increasingly becoming a concern. Following the introduction of the first remote data integrity audit schemes, different audit schemes with various characteristics have been proposed. However, [...] Read more.
With the spread of cloud storage technology, checking the integrity of data stored in the cloud effectively is increasingly becoming a concern. Following the introduction of the first remote data integrity audit schemes, different audit schemes with various characteristics have been proposed. However, most of the existing solutions have problems such as additional storage overhead and additional certificate burden. This paper proposes a certificateless remote data integrity auditing scheme which takes into account the storage burden and data privacy issues while ensuring the correctness of the data audit results. In addition, the certificateless design concept enables the scheme proposed in this paper to avoid a series of burdens brought by certificates. The scheme designed in this paper provides a data access control function whereby only users who hold a valid token generated by the data owner can access the target data from the cloud. Finally, this paper provides a detailed security proof to ensure the rationality of the results. A theoretical analysis and subsequent experimental verification show that the proposed scheme is both effective and feasible. Full article
(This article belongs to the Special Issue Cloud Security in the Age of IoT)
Show Figures

Figure 1

14 pages, 2875 KiB  
Article
Developing a Cyber Incident Exercises Model to Educate Security Teams
by Basil Alothman, Aldanah Alhajraf, Reem Alajmi, Rawan Al Farraj, Nourah Alshareef and Murad Khan
Electronics 2022, 11(10), 1575; https://doi.org/10.3390/electronics11101575 - 14 May 2022
Cited by 2 | Viewed by 3394
Abstract
Since cyber attacks are increasing and evolving rapidly, the need to enhance cyber-security defense is crucial. A cyber incident exercise model is a learning technique to provide knowledge about cyber security to enhance a security team’s incident response. In this research work, we [...] Read more.
Since cyber attacks are increasing and evolving rapidly, the need to enhance cyber-security defense is crucial. A cyber incident exercise model is a learning technique to provide knowledge about cyber security to enhance a security team’s incident response. In this research work, we proposed a cyber incident model to handle real-time security attacks in various scenarios. The proposed model consisted of three teams: (1) the black team, (2) the red team, and (3) the blue team. The black team was a group of instructors responsible for setting up the environment. They had to educate the red and blue teams about cyber security and train them on facing cyber attacks. Once the training period was completed, the members were divided into two teams to conduct a cyber-security competition in a cyber game scenario. Each of the two teams performed a different task. The red team was the offensive team that was responsible for launching cyber-security attacks. The blue team was the defensive team that was responsible for countering attacks and minimizing the damage caused by attackers; they had to conduct both cyber-security configuration and incident handling. During the scenario, the black team was responsible for guiding and monitoring both the red and the blue teams, ensuring the rules were applied throughout the competition. At the end of the competition, the members of each team changed with each other to make sure every team member was using the knowledge they gained from the training period and every participant was evaluated impartially. Finally, we showed the security team’s offensive and defensive skills via the red team and the blue team, respectively. Full article
(This article belongs to the Special Issue Cloud Security in the Age of IoT)
Show Figures

Figure 1

Back to TopTop