Blockchain-Enabled Trustworthy Systems

Submission Deadline: 01 April 2020

IEEE Access invites manuscript submissions in the area of Blockchain-Enabled Trustworthy Systems.

We are enjoying the benefits brought about by the accelerated development of computing systems and Internet. However, we are also suffering from a number of security and privacy vulnerabilities caused by the increasing system complexity, heterogeneity, dynamicity and decentralized nature. These security and privacy vulnerabilities may prevent the wide adoption of Information and communications technology (ICT) technologies. Therefore, trust management has become a crucial aspect in developing trustworthy systems with the preservation of security and privacy.

From the Oxford dictionary, the term blockchain is defined as “A system in which a record of transactions made in bitcoin or another cryptocurrency are maintained across several computers that are linked in a peer-to-peer network.” The recent advances in blockchain technologies bring opportunities to fully realize trustworthy systems. In particular, blockchain technologies can enable anonymous and trustful transactions in decentralized and trustless environments. As a result, blockchain-enabled trust management can help to reduce system risks, mitigate financial fraud and cut down operational cost of computing systems. Blockchain-enabled trustworthy systems can apply to diverse areas, such as financial services, social management, internet of things and supply chain management. Therefore, blockchains can potentially enable trustworthy systems, though there are a number of research issues to be solved before the formal adoption of blockchains to trustworthy systems.

This Special Section of IEEE Access will solicit high-quality, original contributions.  The topics of interest include, but are not limited to:

  • Theories and algorithms for blockchain-enabled trust management
  • Scalability and fault tolerance mechanisms for trustworthy systems
  • Platform development for blockchain-enabled trustworthy systems
  • Smart contracts for blockchain-enabled trust management and trustworthy systems
  • Security, privacy, safety, and risk management for trustworthy systems
  • Blockchain-based trustworthy applications
  • Security, privacy and trust for blockchain
  • Blockchain for trusted social management
  • Blockchain for big data in trustworthy systems
  • Blockchain for trusted service computing
  • Blockchain for trusted industrial systems
  • Blockchain for trusted cloud computing
  • Blockchain for trusted Internet of Things
  • Algorithms, architecture, framework, design patterns and techniques for trustworthy systems
  • Metrics and measurement for trustworthy systems
  • Quality assurance, maintenance and reverse engineering for trustworthy systems
  • Verification, validation, testing, and analysis for trustworthy systems
  • Communication, networking, optimization, and performance for trustworthy systems
  • Empirical studies, benchmarking, and industrial best practices for trustworthy systems
  • Service-based trustworthy systems
  • Other emerging ideas and solutions for blockchain and trustworthy systems.

We also highly recommend the submission of multimedia with each article as it significantly increases the visibility, downloads, and citations of articles.

 

Associate Editor: Hong-Ning Dai, Macau University of Science and Technology, Macau

Guest Editors:

    1. Sabita Maharjan, Simula Metropolitan Center for Digital Engineering, Norway
    2. Zibin Zheng, Sun Yat-sen University, China
    3. Patrick C. K. Hung, Ontario Tech University, Canada
    4. Quanqing Xu, Ant Financial Services Group and Blockchain lab, DAMO Academy, China
    5. Wen Sun, Northwestern Polytechnical University, China

 

Relevant IEEE Access Special Sections:

  1. Research Challenges and Opportunities in Security and Privacy of Blockchain Technologies
  2. Internet-of-Things (IoT) Big Data Trust Management
  3. Security and Trusted Computing for Industrial Internet of Things


IEEE Access Editor-in-Chief:
  Prof. Derek Abbott, University of Adelaide

Article submission: Contact Associate Editor and submit manuscript to:
http://ieee.atyponrex.com/journal/ieee-access

For inquiries regarding this Special Section, please contact:  hndai@ieee.org.

On the Automated Management of Security Incidents in Smart Spaces

 

The proliferation of smart spaces, such as smart buildings, is increasing opportunities for offenders to exploit the interplay between cyber and physical components, in order to trigger security incidents. Organizations are obliged to report security incidents to comply with recent data protection regulations. Organizations can also use incident reports to improve security of the smart spaces where they operate. Incident reporting is often documented in structured natural language. However, reports often do not capture relevant information about cyber and physical vulnerabilities present in a smart space that are exploited during an incident. Moreover, sharing information about security incidents can be difficult, or even impossible, since a report may contain sensitive information about an organization. In previous work, we provided a meta-model to represent security incidents in smart spaces. We also developed an automated approach to share incident knowledge across different organizations. In this paper we focus on incident reporting. We provide a System Editor to represent smart buildings where incidents can occur. Our editor allows us to represent cyber and physical components within a smart building and their interplay. We also propose an Incident Editor to represent the activities of an incident, including -for each activity- the target and the resources exploited, the location where the activity occurred, and the activity initiator. Building on our previous work, incidents represented using our editor can be shared across various organizations, and instantiated in different smart spaces to assess how they can re-occur. We also propose an Incident Filter component that allows viewing and prioritizing the most relevant incident instantiations, for example, involving a minimum number of activities. We assess the feasibility of our approach in assisting incident reporting using an example of a security incident that occurred in a research center.

View this article on IEEE Xplore

Security and Privacy in Emerging Decentralized Communication Environments

Submission Deadline: 30 September 2019

IEEE Access invites manuscript submissions in the area of Security and Privacy in Emerging Decentralized Communication Environments.

Modern, decentralized digital communication environments are changing with the availability of new technologies, and the development of new, real-world applications, which lead to novel challenges in security, such as: 5G/6G mobile applications, smart Internet of Things (IoT) devices, big data applications, and cloud systems. Mobile – cloud architecture is emerging as 5G /6G mobile IoT devices are generating large volumes of data, which need cloud infrastructure to process. Many IoT systems and cloud systems are decentralized and Blockchain is emerging in decentralized networks. The increasing interdependence of IT solutions accepted by society has led to a sharp increase in data. As a result, chances of data leakage or privacy infringement also increase, along with the need for new solutions for digital security and privacy protection.

This Special Section in IEEE Access aims to report highlighted security and privacy research in modern, decentralized digital communication environments. The Special Section invites experts and scholars in the fields of digital security, so that readers can keep abreast of the latest developments in the industry, and master the latest security technologies. The Special Section will support industry researchers working with emerging decentralized communication environments to solve real-world security problems. This Special Section will focus on relevant emerging digital security and privacy protection solutions.

The topics of interest include, but are not limited to:

  • Security and privacy in 5G /6G mobile / wireless networks
  • Security and privacy in the smart mobile Internet of Things
  • Security and privacy in Blockchain based decentralized networks
  • Security and privacy in 5G vehicular network
  • Security and privacy in 5G device to device communications
  • Security and privacy for big data in cloud applications

We also highly recommend the submission of multimedia with each article as it significantly increases the visibility, downloads, and citations of articles.

 

Associate Editor:   Xiaochun Cheng, Middlesex University, UK

Guest Editors:

  1.   Zheli Liu, Nankai University, China
  2.   James Xiaojiang Du, Temple University, USA
  3.   Shui Yu,   University of Technology Sydney, Australia
  4.  Leonardo Mostarda, Università di Camerino, Italy

 

Relevant IEEE Access Special Sections:

  1. Advances in Prognostics and System Health Management
  2. Smart Caching, Communications, Computing and Cybersecurity for Information-Centric Internet of Things
  3. D2D Communications: Security Issues and Resource Allocation


IEEE Access Editor-in-Chief:
  Prof. Derek Abbott, University of Adelaide

Paper submission: Contact Associate Editor and submit manuscript to:
http://ieee.atyponrex.com/journal/ieee-access

For inquiries regarding this Special Section, please contact: X.Cheng@mdx.ac.uk.