Special lssues
Table of Content

Information Security and Trust Issues in the Digital World

Submission Deadline: 30 June 2024 Submit to Special Issue

Guest Editors

Dr. Yongjun Ren, Nanjing University of Information Science and Technology, China
Dr. Weizhi Meng, Technical University of Denmark, Denmark
Dr. Chunhua Su, University of Aizu, Japan

Summary

As a significant process in today's society, datafication is changing in shape with the advancement of society and technology, ranging from data storage and chat software to Internet of Vehicles, Internet of things, and artificial intelligence. Simultaneously, major security and privacy issues have arisen. In the digital world, it is necessary to verify the identity of people without compromising their privacy, thus necessitating the establishment of identity authentication systems and privacy protection measures. Terminal devices in Internet of Vehicles and Internet of things, involve the collection of personal data, requiring dependable technologies to ensure the secure operation and interaction of these devices. With the AI technology represented by chatGPT, it is difficult to guarantee that the data generated during interactions of individuals or companies with chatGPT will not be exposed or utilized by the people behind chatGPT.

 

This special issue aims to bring together the latest research on information security protection methods, techniques and applications for the digital society, and to show how researchers are addressing the complex problems arising from these ideas. We also welcome the authors to introduce other recent advances addressing the above issues.

 

Potential topics include but are not limited to:

• Security and privacy preserving technologies in the digital world

• Symmetric and asymmetric encryption in the digital world

• Digital signatures in the digital world

• Trust issues in the digital world

• Trusted digital identity construction and authentication scheme in the digital world

• Secure and trusted key Agreement/exchangement Protocol in the digital world

• Trusted access control in the digital world

• Trusted execution environment related technologies in the digital world

• Federated learning and blockchain for security and privacy in the digital world

• Artificial intelligence and security in the digital world

• Security and privacy preserving issues in the Internet of vehicles

• Security and privacy preserving issues in the Internet of things


Keywords

• Privacy preserving
• Blockchain
• Encryption
• Digital Signature
• Authentication Protocol
• Key Agreement/exchangement Protocol
• Zero-knowledge proof
• Access Control
• Federated learning

Published Papers


  • Open Access

    ARTICLE

    A Novel High-Efficiency Transaction Verification Scheme for Blockchain Systems

    Jingyu Zhang, Pian Zhou, Jin Wang, Osama Alfarraj, Saurabh Singh, Min Zhu
    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1613-1633, 2024, DOI:10.32604/cmes.2023.044418
    (This article belongs to the Special Issue: Information Security and Trust Issues in the Digital World)
    Abstract Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system. This technology has been widely used and has developed rapidly in big data systems across various fields. An increasing number of users are participating in application systems that use blockchain as their underlying architecture. As the number of transactions and the capital involved in blockchain grow, ensuring information security becomes imperative. Addressing the verification of transactional information security and privacy has emerged as a critical challenge. Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations. However,… More >

  • Open Access

    ARTICLE

    Evaluating the Efficacy of Latent Variables in Mitigating Data Poisoning Attacks in the Context of Bayesian Networks: An Empirical Study

    Shahad Alzahrani, Hatim Alsuwat, Emad Alsuwat
    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1635-1654, 2024, DOI:10.32604/cmes.2023.044718
    (This article belongs to the Special Issue: Information Security and Trust Issues in the Digital World)
    Abstract Bayesian networks are a powerful class of graphical decision models used to represent causal relationships among variables. However, the reliability and integrity of learned Bayesian network models are highly dependent on the quality of incoming data streams. One of the primary challenges with Bayesian networks is their vulnerability to adversarial data poisoning attacks, wherein malicious data is injected into the training dataset to negatively influence the Bayesian network models and impair their performance. In this research paper, we propose an efficient framework for detecting data poisoning attacks against Bayesian network structure learning algorithms. Our framework utilizes latent variables to quantify… More >

  • Open Access

    ARTICLE

    Privacy Enhanced Mobile User Authentication Method Using Motion Sensors

    Chunlin Xiong, Zhengqiu Weng, Jia Liu, Liang Gu, Fayez Alqahtani, Amr Gafar, Pradip Kumar Sharma
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 3013-3032, 2024, DOI:10.32604/cmes.2023.031088
    (This article belongs to the Special Issue: Information Security and Trust Issues in the Digital World)
    Abstract With the development of hardware devices and the upgrading of smartphones, a large number of users save privacy-related information in mobile devices, mainly smartphones, which puts forward higher demands on the protection of mobile users’ privacy information. At present, mobile user authentication methods based on human-computer interaction have been extensively studied due to their advantages of high precision and non-perception, but there are still shortcomings such as low data collection efficiency, untrustworthy participating nodes, and lack of practicability. To this end, this paper proposes a privacy-enhanced mobile user authentication method with motion sensors, which mainly includes: (1) Construct a smart… More >

Share Link