Special lssues
Table of Content

Information Security Practice and Experience: Advances and Challenges

Submission Deadline: 15 May 2023 (closed)

Guest Editors

Prof. Hu Xiong, University of Electronic Science and Technology of China, China
Prof. Kuo-Hui Yeh, National Dong Hwa University, Taiwan
Dr. Chunhua Su, the University of Aizu, Japan
Dr. Weizhi Meng, Technical University of Denmark, Denmark
Prof. Han-Chieh Chao, National Dong Hwa University, Taiwan

Summary

Advanced information and communication technologies, such as the Internet of Things (IoT), cyber-physical systems, edge computing, big data analytics, cognitive computing, machine learning and artificial intelligence, have enabled innovative engineering approaches to establish novel applications and services accomplishing needs of smart human life. Example application areas are such as healthcare, energy management, transportation, environmental protection, industrial systems monitoring and controlling, entertainment and smart communities which are expected to bring advances to improve our ways of living. However, it is quite challenging to model and realize the system design, transmission protocols, resource allocation, and management of system delay when integrating these heterogeneous information and communication technologies. Meanwhile, since many applications have connected IoT devices with corporate IT and vendor systems in data centers and the cloud, the pivoting risk of the hyperconnectivity of systems has been increased in terms of various security and privacy breaches.

 

Therefore, this special issue aims to compile recent research efforts dedicated to the study of information security practice and experience in the above advanced information and communication technologies to keep the applications safer and a better place of livelihood. This special issue solicits original and high quality works on recent advances empowering better security and privacy protection for advanced information and communication technologies. In addition, the excellent papers of ISPEC 2022 (The 17th International Conference on Information Security Practice and Experience, https://ispec2022.ndhu.edu.tw/) will be selected and considered for inclusion in this special issue. Note that each selected paper must be substantially extended, with at least 40% difference from its conference version. All submitted papers, including the extended manuscript from ISPEC 2022, will undergo the journal's standard peer-review process. 

 

Topics of interest include but are not limited to:

● Authentication, authorization and accountability

● Applied cryptography

● Blockchain

● Cyber security for smart transportation

● Database security 

● Digital forensics

● Intrusion detection 

● Web security

● Malware analysis and detection 

● Mobile security 

● Network security and privacy 

● Privacy enhanced technology

● Secure data sharing in cloud

● Security and privacy in edge computing 

● Security and privacy in IoT

● Security and privacy in ubiquitous computing

● Security for critical infrastructures

● Smart grid security

● Trust management



Published Papers


  • Open Access

    ARTICLE

    An Efficient and Provably Secure SM2 Key-Insulated Signature Scheme for Industrial Internet of Things

    Senshan Ouyang, Xiang Liu, Lei Liu, Shangchao Wang, Baichuan Shao, Yang Zhao
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 903-915, 2024, DOI:10.32604/cmes.2023.028895
    (This article belongs to this Special Issue: Information Security Practice and Experience: Advances and Challenges)
    Abstract With the continuous expansion of the Industrial Internet of Things (IIoT), more and more organisations are placing large amounts of data in the cloud to reduce overheads. However, the channel between cloud servers and smart equipment is not trustworthy, so the issue of data authenticity needs to be addressed. The SM2 digital signature algorithm can provide an authentication mechanism for data to solve such problems. Unfortunately, it still suffers from the problem of key exposure. In order to address this concern, this study first introduces a key-insulated scheme, SM2-KI-SIGN, based on the SM2 algorithm. This scheme boasts strong key insulation… More >

  • Open Access

    ARTICLE

    Quantum-Resistant Multi-Feature Attribute-Based Proxy Re-Encryption Scheme for Cloud Services

    Jinqiu Hou, Changgen Peng, Weijie Tan, Hongfa Ding
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 917-938, 2024, DOI:10.32604/cmes.2023.027276
    (This article belongs to this Special Issue: Information Security Practice and Experience: Advances and Challenges)
    Abstract Cloud-based services have powerful storage functions and can provide accurate computation. However, the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight. Although the attribute-based proxy re-encryption (ABPRE) schemes based on number theory can solve this problem, it is still difficult to resist quantum attacks and have limited expression capabilities. To address these issues, we present a novel linear secret sharing schemes (LSSS) matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research. Additionally, to detect the activities of illegal proxies, homomorphic signature (HS) technology is… More >

  • Open Access

    ARTICLE

    A Secure Device Management Scheme with Audio-Based Location Distinction in IoT

    Haifeng Lin, Xiangfeng Liu, Chen Chen, Zhibo Liu, Dexin Zhao, Yiwen Zhang, Weizhuang Li, Mingsheng Cao
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 939-956, 2024, DOI:10.32604/cmes.2023.028656
    (This article belongs to this Special Issue: Information Security Practice and Experience: Advances and Challenges)
    Abstract Identifying a device and detecting a change in its position is critical for secure devices management in the Internet of Things (IoT). In this paper, a device management system is proposed to track the devices by using audio-based location distinction techniques. In the proposed scheme, traditional cryptographic techniques, such as symmetric encryption algorithm, RSA-based signcryption scheme, and audio-based secure transmission, are utilized to provide authentication, non-repudiation, and confidentiality in the information interaction of the management system. Moreover, an audio-based location distinction method is designed to detect the position change of the devices. Specifically, the audio frequency response (AFR) of several… More >

  • Open Access

    ARTICLE

    Enhancing the Trustworthiness of 6G Based on Trusted Multi-Cloud Infrastructure: A Practice of Cryptography Approach

    Mingxing Zhou, Peng Xiao, Qixu Wang, Shuhua Ruan, Xingshu Chen, Menglong Yang
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 957-979, 2024, DOI:10.32604/cmes.2023.028612
    (This article belongs to this Special Issue: Information Security Practice and Experience: Advances and Challenges)
    Abstract Due to the need for massive device connectivity, low communication latency, and various customizations in 6G architecture, a distributed cloud deployment approach will be more relevant to the space-air-ground-sea integrated network scenario. However, the openness and heterogeneity of the 6G network cause the problems of network security. To improve the trustworthiness of 6G networks, we propose a trusted computing-based approach for establishing trust relationships in multi-cloud scenarios. The proposed method shows the relationship of trust based on dual-level verification. It separates the trustworthy states of multiple complex cloud units in 6G architecture into the state within and between cloud units.… More >

  • Open Access

    ARTICLE

    Heterogeneous Fault-Tolerant Aggregate Signcryption with Equality Test for Vehicular Sensor Networks

    Yang Zhao, Jingmin An, Hao Li, Saru Kumari
    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 555-575, 2023, DOI:10.32604/cmes.2023.026808
    (This article belongs to this Special Issue: Information Security Practice and Experience: Advances and Challenges)
    Abstract The vehicular sensor network (VSN) is an important part of intelligent transportation, which is used for real-time detection and operation control of vehicles and real-time transmission of data and information. In the environment of VSN, massive private data generated by vehicles are transmitted in open channels and used by other vehicle users, so it is crucial to maintain high transmission efficiency and high confidentiality of data. To deal with this problem, in this paper, we propose a heterogeneous fault-tolerant aggregate signcryption scheme with an equality test (HFTAS-ET). The scheme combines fault-tolerant and aggregate signcryption, which not only makes up for… More >

    Graphic Abstract

    Heterogeneous Fault-Tolerant Aggregate Signcryption with Equality Test for Vehicular Sensor Networks

  • Open Access

    ARTICLE

    Logformer: Cascaded Transformer for System Log Anomaly Detection

    Feilu Hang, Wei Guo, Hexiong Chen, Linjiang Xie, Chenghao Zhou, Yao Liu
    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 517-529, 2023, DOI:10.32604/cmes.2023.025774
    (This article belongs to this Special Issue: Information Security Practice and Experience: Advances and Challenges)
    Abstract Modern large-scale enterprise systems produce large volumes of logs that record detailed system runtime status and key events at key points. These logs are valuable for analyzing performance issues and understanding the status of the system. Anomaly detection plays an important role in service management and system maintenance, and guarantees the reliability and security of online systems. Logs are universal semi-structured data, which causes difficulties for traditional manual detection and pattern-matching algorithms. While some deep learning algorithms utilize neural networks to detect anomalies, these approaches have an over-reliance on manually designed features, resulting in the effectiveness of anomaly detection depending… More >

Share Link