Special Issues
Table of Content

Cloud Computing Security and Privacy: Advanced Technologies and Practical Applications

Submission Deadline: 31 July 2026 View: 238 Submit to Special Issue

Guest Editors

Dr. Sheraz Aslam

Email: sheraz.aslam@cut.ac.cy

Affiliation: Department of Electrical Engineering, Computer Engineering, and Informatics, Cyprus University of Technology, Limassol, 3036, Cyprus
Department of Computer Science, American University of Cyprus, 6019 Larnaca, Cyprus

Homepage:

Research Interests: data analytics, big data, cloud computing, AI-driven IoT & smart systems, differential privacy, data privacy & anonymization, privacy-preserving synthetic data, secure & privacy-aware smart infrastructures, energy-efficient AI computing

图片1.png


Dr. Rashid Kamal

Email: r.kamal@ulster.ac.uk

Affiliation: School of Computing, Ulster University, 2-24 York Street, Belfast, BT15 1AP, UK

Homepage:

Research Interests: machine learning and big data analysis, behavioural modelling and opportunistic sensing, data privacy, emotion classification and context-aware systems, algorithms and optimization, mobile application development

图片2.png


Prof. Dr. Chris Nugent

Email: cd.nugent@ulster.ac.uk

Affiliation: School of Computing, Ulster University, 2-24 York Street, Belfast, BT15 1AP, UK

Homepage:

Research Interests: pervasive computing, artificial intelligence for smart environments, activity recognition and behaviour modelling, digital healthcare and connected health, IoT and cybersecurity innovation

图片3.png


Dr. Waseem Raza

Email: waseem@ou.edu

Affiliation: School of Electrical and Computer Engineering, University of Oklahoma, Norman, 73019, United States

Homepage:

Research Interests: resilient machine learning methods, AI/ML methods for 5G and beyond wireless networks. generative and agentic AI methods in wireless and IoT applications, and AI driven smart healthcare using wearable and IoT devices

图片4.png


Summary

Cloud computing underpins enterprise innovation and critical sectors such as smart grids, maritime logistics, and healthcare. Yet its adoption raises pressing security and privacy risks—data breaches, unauthorized access, compliance gaps—further complicated by edge–cloud integration and AI-enabled services. Traditional perimeter defenses no longer suffice, cross-border privacy rules add complexity, and scalable, interoperable privacy-preserving technologies remain limited.
This special issue seeks contributions that deliver practical advances in cloud security and privacy.

We welcome original research articles, review papers, and case studies. Submissions may cover (but are not limited to) the following topics:
- Cloud Security Architectures & Models
- Zero-trust design for multi-cloud and hybrid cloud deployments
- Post-quantum cryptography for long-term cloud data protection
- Security frameworks for containerized and serverless environments
- Privacy-Enhancing Technologies
- Homomorphic encryption and secure multi-party computation for cloud analytics
- Data governance and compliance strategies for global privacy regulations
- Intelligent Threat Detection & Response
- AI/ML-driven real-time detection of cloud attacks (e.g., anomalous access, ransomware, insider threats)
- Forensics and incident response for cloud security breaches
- Adaptive defense against DDoS and advanced persistent threats
- Edge–Cloud Collaborative Security
- Secure data transmission in IoT-enabled smart grids and maritime logistics
- Edge-assisted authentication and intrusion detection
- Privacy-preserving computation in edge-cloud integrated systems
- Domain-Specific Cloud Security Applications


Keywords

cloud computing security, cloud privacy, privacy-enhancing technologies, AI/ML for threat detection, zero-trust architectures, multi-cloud/hybrid cloud security, edge–cloud security, post-quantum cryptography, federated learning, cloud security forensics

Share Link