Cloud, IoT and Software Defined Networks Security

A special issue of Cryptography (ISSN 2410-387X).

Deadline for manuscript submissions: closed (31 October 2018) | Viewed by 6587

Special Issue Editors


E-Mail Website
Guest Editor
School of Electrical Engineering and Computing, The University of Newcastle, University Dr, Callaghan, NSW 2308, Australia
Interests: intrusion detection; software defined networking security; malware analysis and denial of service attacks; virtualisation and cloud security

E-Mail Website
Guest Editor
Faculty of Engineering and Built Environment, The University of Newcastle, Callaghan, NSW 2308, Australia
Interests: cyber security; cloud security; IoT security; data application security; trusted computing; malware and intrusion detection

Special Issue Information

Dear Colleagues,

Cloud, IoT (Internet of Things), and large-scale data security have become critically important in the current technology space. The dynamic provisioning of resources, large scale data processing and pay per use facility with the cloud computing, possibility to interconnect anything and everything with IoT and the ability to manage end to end communication with SDN (Software-Defined Networking) and NFV (Network function virtualization) opens several opportunities for creative thinking and introducing new services. However this also brings new security challenges. The purpose of this Special Issue on “Cloud, IoT and Software-Defined Networks Security” is to explore the state-of-the-art research and innovative security techniques, solutions and case studies for securing Internet of Things based systems and cloud services and data, with new networking paradigms, such as software defined networks and network function virtualisation techniques.

Some topics of interest include the following areas, though they are not limited to these:

Topics:

  • Cloud Security Architecture
  • Cloud Data Security
  • Trust Management in Cloud
  • Virtualisation Security
  • Forensics Analysis for Cloud
  • Verifiable Outsourced Cloud Computation
  • Security management for SDN- and NFV-based systems
  • Security in Edge Computing Infrastructures
  • Security Management of software-defined datacentres
  • Dynamic resource scaling based on user mobility
  • Policy based management in SDN or NFV systems
  • Security, privacy, and trust in Cloud/IoT/SDN
  • Cloud Security for IoT Applications
  • Security in Smart Homes and Smart Cities
  • Security in IoT-based Healthcare
Dr. Uday Tupakula
Prof. Vijay Varadharajan
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Cryptography is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

16 pages, 4699 KiB  
Article
Security Incident Information Exchange for Cloud Service Provisioning Chains
by Christian Frøystad, Inger Anne Tøndel and Martin Gilje Jaatun
Cryptography 2018, 2(4), 41; https://doi.org/10.3390/cryptography2040041 - 11 Dec 2018
Viewed by 6258
Abstract
Online services are increasingly becoming a composition of different cloud services, making incident-handling difficult, as Cloud Service Providers (CSPs) with end-user customers need information from other providers about incidents that occur at upstream CSPs to inform their users. In this paper, we argue [...] Read more.
Online services are increasingly becoming a composition of different cloud services, making incident-handling difficult, as Cloud Service Providers (CSPs) with end-user customers need information from other providers about incidents that occur at upstream CSPs to inform their users. In this paper, we argue the need for commonly agreed-upon incident information exchanges between providers to improve accountability of CSPs, and present both such a format and a prototype implementing it. The solution can handle simple incident information natively as well as embed standard representation formats for incident-sharing, such as IODEF and STIX. Preliminary interviews show a desire for such a solution. The discussion considers both technical challenges and non-technical aspects related to improving the situation for incident response in cloud-computing scenarios. Our solution holds the potential of making incident-sharing more efficient. Full article
(This article belongs to the Special Issue Cloud, IoT and Software Defined Networks Security)
Show Figures

Figure 1

Back to TopTop