Editorial: Special issue on security and privacy in network computing

Computer networks have revolutionized traditional computing architectures and created a wide range of network computing paradigms, including blockchain [1], distributed computing [11], cloud computing [9], Web services [2], Internet of Things [4, 10], crowdsourcing [9], etc. Such a class of paradigms is able to integrate heterogeneous resources provided from different parties, largely extends the computation capacity and empowers a variety of novel use cases and applications. However, the diversity of network technologies and the complex protocols used among computing parties might contain security loopholes, which could be abused by benign users or malicious attackers unintentionally or on purpose, thus compromising the integrity, confidentiality and availability of the computation [7]. Security incidents happened in practical systems repeatedly revealed such threats, creating financial loss and social upsets. On the other hand, the diversity and the unique characteristics of network computing paradigms make a silver bullet for the general solution difficult to seek. Therefore, securing network computing is urgent and challenging, calling for non-trivial collective efforts from multiple parties, including https://doi.org/10.1007/s11280-019-00704-x

[1]  Georgios Kambourakis,et al.  Special issue on Security, Privacy and Trust in network-based Big Data , 2015, Inf. Sci..

[2]  Lina Yao,et al.  Collaborative text categorization via exploiting sparse coefficients , 2018, World Wide Web.

[3]  Quan Wang,et al.  A PUF-based unified identity verification framework for secure IoT hardware via device authentication , 2019, World Wide Web.

[4]  Elisa Bertino,et al.  Protecting outsourced data in cloud computing through access management , 2016, Concurr. Comput. Pract. Exp..

[5]  Hua Wang,et al.  Security and Privacy-Preserving Challenges of e-Health Solutions in Cloud Computing , 2019, IEEE Access.

[6]  Yulong Shen,et al.  An incentive mechanism with bid privacy protection on multi-bid crowdsourced spectrum sensing , 2019, World Wide Web.

[7]  Hua Wang,et al.  Editorial: Special Issue on Security and Privacy of IoT , 2017, World Wide Web.

[8]  Ji Zhang,et al.  Outlier detection from large distributed databases , 2013, World Wide Web.

[9]  Jian Pei,et al.  Publishing anonymous survey rating data , 2011, Data Mining and Knowledge Discovery.

[10]  Tao Wang,et al.  A SDR-based verification platform for 802.11 PHY layer security authentication , 2019, World Wide Web.

[11]  Tao Zhang,et al.  MicroThings: A Generic IoT Architecture for Flexible Data Aggregation and Scalable Service Cooperation , 2017, IEEE Communications Magazine.

[12]  Yanchun Zhang,et al.  Privacy-aware access control with trust management in web service , 2011, World Wide Web.

[13]  Hua Wang,et al.  Privacy-Preserving Task Recommendation Services for Crowdsourcing , 2021, IEEE Transactions on Services Computing.

[14]  Yanchun Zhang,et al.  Sentence level topic models for associated topics extraction , 2018, World Wide Web.

[15]  Zhenqiang Wu,et al.  Privacy-preserving conjunctive keyword search on encrypted data with enhanced fine-grained access control , 2019, World Wide Web.

[16]  Yanchun Zhang,et al.  A flexible payment scheme and its role-based access control , 2005, IEEE Transactions on Knowledge and Data Engineering.