applsci-logo

Journal Browser

Journal Browser

Cybersecurity in Cloud Computing

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: closed (30 April 2022) | Viewed by 10065

Special Issue Editors


E-Mail Website
Guest Editor
Information Technologies Institute (ITI)/Centre of Research and Technology Hellas, Thessaloniki, Greece
Interests: computer architecture and embedded systems; algorithm complexity; parallel and distributed applications in homogeneous and heterogeneous environments; GPGPU and high-performance computing; cloud computing; big data
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Information Technologies Institute, Centre for Research and Technology Hellas, Thessaloniki, Greece
Interests: Internet of Things; security of data; health care; blockchains; diseases; learning (artificial intelligence); data privacy; patient monitoring; cryptography; decision support systems; mobile robots; neural nets; authorisation; computer network security
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Applied Informatics, University of Macedonia, Thessaloniki, Greece
Interests: access control; cyber threats intelligence; blockchain technologies & decentralized applications; cyber crime investigation and prediction; cyber security learning and training
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

It is our pleasure to announce the opening of a new Special Issue in the Applied Sciences Journal.

The main topics of the Issue will regard cybersecurity threats, challenges and solutions in cloud computing and associated domains, including blockchain-based decentralized cloud computing, smart cities and factories, e-Health solutions and IoT applications. According to Eurostat, 36 % of EU enterprises used cloud computing in 2020 with an increase of 12% compared to 2018. McKinsey’s survey estimated that by 2021, about 35% of all enterprise workloads will be on the public cloud, while 40% of companies will use two or more infrastructure-as-a-service (IaaS) and software-as-a-service (SaaS) providers. Despite the increased demand for cloud computing systems and services over the past decade, a demand that was additionally accelerated due to the COVID-19 pandemic, the public or private adoption of the cloud remains limited. One of the major issues that hinders its widespread use are security issues in terms of data confidentiality, data integrity and privacy, infrastructure protection, network and applications security, virtualization challenges as well as services’ availability. Addressing security and privacy concerns is also fundamental in related data-centric domains that feature distributed and heterogeneous components, including IoT ecosystems, smart cities, smart factories and Industry 4.0 as well as smart grids. Among the different cybersecurity applications in such environments, it is also worth mentioning the use of blockchain to strengthen security and offer non-repudiation.

The following are some of the topics proposed for this Special Issue (a non-exhaustive list):

  • Security challenges in cloud environments;
  • Use of blockchain to address security and privacy issues;
  • Methods, algorithms and applications for vulnerability remediation and risk mitigation;
  • Security and privacy challenges in IoT applications and low-power embedded systems;
  • Secure mechanisms for the storage, sharing and accessing of sensitive data in the healthcare industry, including novel COVID-19 applications;
  • Cybersecurity attacks on smart cities, smart grids, smart factories and Industry 4.0.

We look forward to receiving your contributions and reading your valuable research.

Dr. Charalampos S. Kouzinopoulos
Dr. Konstantinos Votis
Prof. Ioannis Mavridis
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cybersecurity
  • sensitive data
  • threat intelligence
  • cloud computing
  • data security
  • risk management

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

26 pages, 1475 KiB  
Article
A Cloud Microservices Architecture for Data Integrity Verifiability Based on Blockchain
by Juan Carlos López-Pimentel, Luis Alberto Morales-Rosales and Ignacio Algredo-Badillo
Appl. Sci. 2022, 12(5), 2754; https://doi.org/10.3390/app12052754 - 7 Mar 2022
Cited by 4 | Viewed by 3376
Abstract
The current digital age, mainly characterized by an economy based upon information technology, demands a data integrity service, even more so because organizations and companies are migrating their services over the cloud. This is not a simple task; it is cumbersome since traditional [...] Read more.
The current digital age, mainly characterized by an economy based upon information technology, demands a data integrity service, even more so because organizations and companies are migrating their services over the cloud. This is not a simple task; it is cumbersome since traditional schemes in databases could be subject to modifications. However, it can be solved using blockchain technology. This paper provides a data integrity verifiability architecture for cloud systems based on blockchain. The architecture provides a mechanism to store events (as logs) within a blockchain platform from any cloud system. Users can then consult data integrity through a microservice, acting as an intermediate server that carries out a set of verification steps within the blockchain, which confirms the integrity of a previously stored log. Our architecture takes advantage of the blockchain strength concerning integrity, providing a traceability track of the stored logs. A prototype system and a case study were implemented based on the proposed architecture. Our experimental results show that the proposed decentralized architecture can be adapted to cloud existing systems that were born without blockchain technology and require a modular and scalable audit characteristic. Full article
(This article belongs to the Special Issue Cybersecurity in Cloud Computing)
Show Figures

Figure 1

23 pages, 27145 KiB  
Article
Building and Evaluating an Annotated Corpus for Automated Recognition of Chat-Based Social Engineering Attacks
by Nikolaos Tsinganos and Ioannis Mavridis
Appl. Sci. 2021, 11(22), 10871; https://doi.org/10.3390/app112210871 - 17 Nov 2021
Cited by 10 | Viewed by 2817
Abstract
Chat-based Social Engineering (CSE) is widely recognized as a key factor to successful cyber-attacks, especially in small and medium-sized enterprise (SME) environments. Despite the interest in preventing CSE attacks, few studies have considered the specific features of the language used by the attackers. [...] Read more.
Chat-based Social Engineering (CSE) is widely recognized as a key factor to successful cyber-attacks, especially in small and medium-sized enterprise (SME) environments. Despite the interest in preventing CSE attacks, few studies have considered the specific features of the language used by the attackers. This work contributes to the area of early-stage automated CSE attack recognition by proposing an approach for building and annotating a specific-purpose corpus and presenting its application in the CSE domain. The resulting CSE corpus is then evaluated by training a bi-directional long short-term memory (bi-LSTM) neural network for the purpose of named entity recognition (NER). The results of this study emphasize the importance of adding a plethora of metadata to a dataset to provide critical in-context features and produce a corpus that broadens our understanding of the tactics used by social engineers. The outcomes can be applied to dedicated cyber-defence mechanisms utilized to protect SME employees using Electronic Medium Communication (EMC) software. Full article
(This article belongs to the Special Issue Cybersecurity in Cloud Computing)
Show Figures

Figure 1

20 pages, 3318 KiB  
Article
A Secure Key Aggregate Searchable Encryption with Multi Delegation in Cloud Data Sharing Service
by JoonYoung Lee, MyeongHyun Kim, JiHyeon Oh, YoungHo Park, KiSung Park and Sungkee Noh
Appl. Sci. 2021, 11(19), 8841; https://doi.org/10.3390/app11198841 - 23 Sep 2021
Cited by 8 | Viewed by 2397
Abstract
As the amount of data generated in various distributed environments is rapidly increasing, cloud servers and computing technologies are attracting considerable attention. However, the cloud server has privacy issues, including personal information and requires the help of a Trusted Third Party (TTP) for [...] Read more.
As the amount of data generated in various distributed environments is rapidly increasing, cloud servers and computing technologies are attracting considerable attention. However, the cloud server has privacy issues, including personal information and requires the help of a Trusted Third Party (TTP) for data sharing. However, because the amount of data generated and value increases, the data owner who produces data must become the subject of data sharing. In this study, we use key aggregate searchable encryption (KASE) technology, which enables keyword search, to efficiently share data without using TTP. The traditional KASE scheme approach only discusses delegation of authority from the data owner to another user. However, if the delegated entity cannot perform time-critical tasks because the shared data are unavailable, the delegate must further delegate the rights given to other users. Consequently, this paper proposes a new KASE scheme that enables multi-delegation without TTP and includes an authentication technique between the user and the server. After that, we perform informal and formal analysis using BAN logic and AVISPA for security evaluation, and compare the security and performance aspects with existing schemes. Full article
(This article belongs to the Special Issue Cybersecurity in Cloud Computing)
Show Figures

Figure 1

Back to TopTop