Volume 10 - Issue 1
Guest Editorial: Security and Privacy for Contemporary Network Computing Environment
- Joonsang Baek
Institutue of Cybersecurity and Cryptology, University of Wollongong, Australia
- Willy Susilo
Institutue of Cybersecurity and Cryptology, University of Wollongong, Australia
- Jongkil Kim
Institutue of Cybersecurity and Cryptology, University of Wollongong, Australia
Keywords: Journal of Wireless Mobile Networks, Ubiquitous Computing, Dependable Applications, network computing
Abstract
In network computing, computers and devices are not stand-alone but intimately linked together to
perform various tasks and share resources. Network computing has become more and more sophisticated
through technologies such as network virtualization, where hardware networks can be logically
partitioned, and cloud computing, where the network resources are stored, managed and processed in the
servers located remotely. Other mobile network technologies which integrate various devices into our
networking systems have made the network computing environment more versatile. However, the sophistication
and versatility added to the current network computing environment have inevitably caused
many security and privacy issues to arise. In this special issue, five group of authors investigate these
issues and suggest their solutions. We note that the first two papers in this issue [1, 2] are full versions of
the papers presented at the 12th International Conference on Provable Security (ProvSec’18), Jeju Island,
Korea, 25-28 October 2018.
The first paper [1], Towards Modeling Privacy in WiFi Fingerprinting Indoor Localization and its
Application, focuses on privacy models for privacy-preservingWiFi fingerprint based indoor localization
(PPIL) schemes. In order to cover the state-of-the-art practical attacks, this paper proposes the first formal
security model that formulates the security goals of both client-side and server-side privacy beyond the
curious-but-honest setting. In particular, the proposed model considers various malicious behaviors such
as exposing secrets of principles, choosing maliciousWiFi fingerprints in location queries and specifying
the location area of a target client.