Big Data-Driven Responsible Edge Intelligence: Privacy, Security, Robustness, and Potential

A special issue of Mathematics (ISSN 2227-7390). This special issue belongs to the section "Mathematics and Computer Science".

Deadline for manuscript submissions: 15 April 2025 | Viewed by 753

Special Issue Editors

Data61, Commonwealth Scientific and Industrial Research Organization, Melbourne 3008, Australia
Interests: personalized privacy protection; federated learning; cybersecurity; blockchain, etc.
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing 210094, China
Interests: information security and its applications

Special Issue Information

Dear Colleagues,

With the continuing increasing volume of data, the field of big data has been confirmed as one of the most advanced areas of research, attracting growing attention from both academia and industry. It also serves as one of the key driving forces of the information era. Meanwhile, combined with machine learning, artificial intelligence, edge computing, etc., edge intelligence has become a promising technology that provides smart services to end users at the edge of networks.

In addition, edge computing architectures have a rising requirement for being more and more autonomous. In this case, the intelligent edge servers may need to communicate with each other without the coordination of a trusted cloud center. To enable trust within this trustless scenario, blockchains have been found to be one of the most powerful tools. Consequently, big data-driven decentralized edge intelligence is a necessity to improve existing architectures.

However, the data are vast in volume and diverse in class, while being transmitted among intelligent edge servers and devices all the time. This poses further privacy challenges for data collection, data transmission, and data processing. What is worse, leading attacks such as poisoning attacks, backdoor attacks, and membership inference attacks continue to take new forms and features, making them more difficult to defeat. Therefore, in this Special Issue, we welcome the submission of research on relevant topics including, but not limited to:

  • Responsible edge intelligent frameworks with big data processing abilities;
  • Privacy protection of big data at the edge of networks;
  • Trade-off between privacy and data utility when a blockchain is deployed as the underlying architecture, considering its transparency;
  • Privacy-preserving edge intelligence;
  • Privacy-preserving swarm intelligence models built upon big data;
  • Security issues for big data-driven decentralized edge intelligence, especially the leading attacks such as poisoning attacks, backdoor attacks, and membership inference attacks;
  • Performance improvement of edge intelligence leveraging big data;
  • Other potential of responsible edge intelligence. 

Dr. Youyang Qu
Dr. Jianghua Liu
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Mathematics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • edge computing
  • big data
  • machine learning
  • artificial intelligence
  • security issues
  • data transmission

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

21 pages, 4505 KiB  
Article
Big Data Privacy Protection and Security Provisions of the Healthcare SecPri-BGMPOP Method in a Cloud Environment
by Moorthi Kuttiyappan, Jothi Prabha Appadurai, Balasubramanian Prabhu Kavin, Jeeva Selvaraj, Hong-Seng Gan and Wen-Cheng Lai
Mathematics 2024, 12(13), 1969; https://doi.org/10.3390/math12131969 - 25 Jun 2024
Viewed by 414
Abstract
One of the industries with the fastest rate of growth is healthcare, and this industry’s enormous amount of data requires extensive cloud storage. The cloud may offer some protection, but there is no assurance that data owners can rely on it for refuge [...] Read more.
One of the industries with the fastest rate of growth is healthcare, and this industry’s enormous amount of data requires extensive cloud storage. The cloud may offer some protection, but there is no assurance that data owners can rely on it for refuge and privacy amenities. Therefore, it is essential to offer security and privacy protection. However, maintaining privacy and security in an untrusted green cloud environment is difficult, so the data owner should have complete data control. A new work, SecPri-BGMPOP (Security and Privacy of BoostGraph Convolutional Network-Pinpointing-Optimization Performance), is suggested that can offer a solution that involves several different steps in order to handle the numerous problems relating to security and protecting privacy. The Boost Graph Convolutional Network Clustering (BGCNC) algorithm, which reduces computational complexity in terms of time and memory measurements, was first applied to the input dataset to begin the clustering process. Second, it was enlarged by employing a piece of the magnifying bit string to generate a safe key; pinpointing-based encryption avoids amplifying leakage even if a rival or attacker decrypts the key or asymmetric encryption. Finally, to determine the accuracy of the method, an optimal key was created using a meta-heuristic algorithmic framework called Hybrid Fragment Horde Bland Lobo Optimisation (HFHBLO). Our proposed method is currently kept in a cloud environment, allowing analytics users to utilise it without risking their privacy or security. Full article
Show Figures

Figure 1

Back to TopTop