Submit a Manuscript to the Journal

International Journal of Computers and Applications

For a Special Issue on

Advances in Security System for Network in Fog and Edge Computing

Manuscript deadline
30 January 2024

Cover image - International Journal of Computers and Applications

Special Issue Editor(s)

Salim El Khediri, Qassim University, Buraydah, Saudi Arabia
[email protected]

Virginia Pilloni, University of Cagliari, Italy
[email protected]

Submit an ArticleVisit JournalArticles

Advances in Security System for Network in Fog and Edge Computing

Computing platforms are driving significant changes in industries and business organizations worldwide. These systems have improved performance, safety, and automated processes in enterprise-level businesses, leading to increased operational efficiency. However, the increased use of the Internet of Things (IoT) in industries has created challenges for the computing environment. IoT devices that collect and analyze real-time manufacturing data often experience delays when connecting to the cloud. To improve overall manufacturing efficiency, it is important to gather and analyze data in real-time. This has led to a need for computing platforms that bring data processing closer to the source, minimizing data travel and reducing latency and bandwidth. Edge and fog computing are methods that can help meet this need. While fog computing uses a centralized system and interacts with embedded computer systems and industrial gateways on a local area network, edge computing directly connects sensors and controllers to embedded computing platforms. Both fog and edge computing, however, face significant challenges in terms of privacy and security, including network security, data computation, authentication, and storage. Improving the security, authentication, privacy, and confidentiality of data transmission is a crucial requirement for any computing platform. Network monitoring tools play a vital role in security analysis and threat detection in edge and fog computing. By using active security monitoring software tools such as Nagios, Splunk, and Argus, and threat analysis software like Snort, Suricata, it is possible to enhance surveillance, physical data security, and establish protocols and procedures to control data transmission. Additionally, intrusion detection techniques in fog computing platforms can help reduce the impact of security and privacy issues arising from IoT applications.

To summarize, network security systems in cloud computing platforms protect data from theft, leakage, and deletion. Improving cloud security involves using techniques such as virtual private networks (VPNs), tokenization, obfuscation, firewalls, and penetration testing. By implementing an appropriate security system, it is possible to provide flexible, reliable, and optimal service for data transfer between IoT devices and edge and fog computing platforms.

This special issue invites research articles that provide optimal solutions for enhancing network security in the fields of cloud and fog systems, leading to better IT infrastructure in industries. Both survey papers and technical contributions are welcome.

Submission Instructions

Please select the SI title from the drop-down menu when submitting your paper. Without selecting the proper title, the paper will not be considered for the SI. Please find the general submission instructions on the journal website.

Instructions for AuthorsSubmit an Article