Theme and Scope With the development of computer and internet technology, the field of cyber security is of growing importance due to the increasing reliance on computer systems and the Internet, wireless networks such as Bluetooth and Wi-Fi, the growth of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things. At present, the research of cyber security has been gradually expanded from the entity authentication, secure data transmission, secure data sharing and so on. To address security threats to network infrastructure devices and sensitive data, many different solutions capable of providing a suitable degree of security have been proposed. However, such solutions have not been properly designed to address important aspects such as computational costs, scalability, energy efficiency and resource usage. In addition, cloud computing has been highly deployed in cyberspace. Not only efficiently playing the role of storing data, but also ensuring the secure data sharing. How to protect the data in the cloud is an urgent problem to be solved. We solicit original contributions on novel threats, defenses and security, information, tools, and applications in cloud-based cyberspace. We also seek contributions motivated by taking real-world security and deployment problems and theoretical works that have clear intention for practical applications in cyberspace. To meet the requirements of data security in the complex and changeable cyber space, the innovation of data processing technology and data security protection schemes should be efficient and safe. This special issue seeks to bring researchers, scholars and participators in cyber security and cloud information security area to address challenges and present effective solutions over cyberspace. Topics include but are not limited to: Secure data transmission frameworks for cyberspace Security, privacy, and fault tolerance in cyberspace and cloud computing Intelligent cyberspace technologies Methods and systems for data analytics in cyberspace and cloud computing Data security issues and solutions in cloud-based cyberspace Secure data transmission on information sharing Lightweight security tools for devices in cyberspace Energy efficient models of large scale security applications Efficient information sharing and data protection in cyberspace
Instructions for Manuscripts Submitted articles must not have been previously published or currently submitted for journal publication elsewhere. Submissions must be directly sent via email to Leading Guest Editor Xiaofeng Chen: xfchen@xidian.edu.cn. All submitted papers must conform to the layout and format guidelines of JIT.
Important Dates Manuscript submission Due: 10th, May, 2018 Notification of Acceptance/Rejection/Revision: 10th, July, 2018 Final Manuscript Due: 31st, August, 2018 Tentative Publication Date: First Quarter in 2020
Guest Editors Prof. Xiaofeng Chen (Leading GE) State Key Laboratory of Integrated Service Networks, Xidian University, China E-mail: xfchen@xidian.edu.cn
Prof. Xinyi Huang School of Mathematics and Computer Science, Fujian Normal University, China E-mail: xyhuang81@gmail.com
Prof. Chin-Feng Lai Department of Engineering Science, National Cheng Kung University, Taiwan E-mail: cinfon@ieee.org
Prof. Jian Shen School of Computer and Software, Nanjing University of Information Science & Technology, China E-mail: s_shenjian@126.com |