Special Issues
Table of Content

Information Security and Trust Issues in the Digital World

Submission Deadline: 30 June 2024 (closed) View: 460

Guest Editors

Dr. Yongjun Ren, Nanjing University of Information Science and Technology, China
Dr. Weizhi Meng, Technical University of Denmark, Denmark
Dr. Chunhua Su, University of Aizu, Japan

Summary

As a significant process in today's society, datafication is changing in shape with the advancement of society and technology, ranging from data storage and chat software to Internet of Vehicles, Internet of things, and artificial intelligence. Simultaneously, major security and privacy issues have arisen. In the digital world, it is necessary to verify the identity of people without compromising their privacy, thus necessitating the establishment of identity authentication systems and privacy protection measures. Terminal devices in Internet of Vehicles and Internet of things, involve the collection of personal data, requiring dependable technologies to ensure the secure operation and interaction of these devices. With the AI technology represented by chatGPT, it is difficult to guarantee that the data generated during interactions of individuals or companies with chatGPT will not be exposed or utilized by the people behind chatGPT.

 

This special issue aims to bring together the latest research on information security protection methods, techniques and applications for the digital society, and to show how researchers are addressing the complex problems arising from these ideas. We also welcome the authors to introduce other recent advances addressing the above issues.

 

Potential topics include but are not limited to:

• Security and privacy preserving technologies in the digital world

• Symmetric and asymmetric encryption in the digital world

• Digital signatures in the digital world

• Trust issues in the digital world

• Trusted digital identity construction and authentication scheme in the digital world

• Secure and trusted key Agreement/exchangement Protocol in the digital world

• Trusted access control in the digital world

• Trusted execution environment related technologies in the digital world

• Federated learning and blockchain for security and privacy in the digital world

• Artificial intelligence and security in the digital world

• Security and privacy preserving issues in the Internet of vehicles

• Security and privacy preserving issues in the Internet of things


Keywords

• Privacy preserving
• Blockchain
• Encryption
• Digital Signature
• Authentication Protocol
• Key Agreement/exchangement Protocol
• Zero-knowledge proof
• Access Control
• Federated learning

Published Papers


  • Open Access

    ARTICLE

    SensFL: Privacy-Preserving Vertical Federated Learning with Sensitive Regularization

    Chongzhen Zhang, Zhichen Liu, Xiangrui Xu, Fuqiang Hu, Jiao Dai, Baigen Cai, Wei Wang
    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.1, pp. 385-404, 2025, DOI:10.32604/cmes.2024.055596
    (This article belongs to the Special Issue: Information Security and Trust Issues in the Digital World)
    Abstract In the realm of Intelligent Railway Transportation Systems, effective multi-party collaboration is crucial due to concerns over privacy and data silos. Vertical Federated Learning (VFL) has emerged as a promising approach to facilitate such collaboration, allowing diverse entities to collectively enhance machine learning models without the need to share sensitive training data. However, existing works have highlighted VFL’s susceptibility to privacy inference attacks, where an honest but curious server could potentially reconstruct a client’s raw data from embeddings uploaded by the client. This vulnerability poses a significant threat to VFL-based intelligent railway transportation systems. In… More >

  • Open Access

    ARTICLE

    Image Steganography by Pixel-Value Differencing Using General Quantization Ranges

    Da-Chun Wu, Zong-Nan Shih
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 353-383, 2024, DOI:10.32604/cmes.2024.050813
    (This article belongs to the Special Issue: Information Security and Trust Issues in the Digital World)
    Abstract A new steganographic method by pixel-value differencing (PVD) using general quantization ranges of pixel pairs’ difference values is proposed. The objective of this method is to provide a data embedding technique with a range table with range widths not limited to powers of 2, extending PVD-based methods to enhance their flexibility and data-embedding rates without changing their capabilities to resist security attacks. Specifically, the conventional PVD technique partitions a grayscale image into 1 × 2 non-overlapping blocks. The entire range [0, 255] of all possible absolute values of the pixel pairs’ grayscale differences in the… More >

  • Open Access

    ARTICLE

    A Linked List Encryption Scheme for Image Steganography without Embedding

    Pengbiao Zhao, Qi Zhong, Jingxue Chen, Xiaopei Wang, Zhen Qin, Erqiang Zhou
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 331-352, 2024, DOI:10.32604/cmes.2024.050148
    (This article belongs to the Special Issue: Information Security and Trust Issues in the Digital World)
    Abstract Information steganography has received more and more attention from scholars nowadays, especially in the area of image steganography, which uses image content to transmit information and makes the existence of secret information undetectable. To enhance concealment and security, the Steganography without Embedding (SWE) method has proven effective in avoiding image distortion resulting from cover modification. In this paper, a novel encrypted communication scheme for image SWE is proposed. It reconstructs the image into a multi-linked list structure consisting of numerous nodes, where each pixel is transformed into a single node with data and pointer domains.… More >

  • Open Access

    ARTICLE

    A Novel High-Efficiency Transaction Verification Scheme for Blockchain Systems

    Jingyu Zhang, Pian Zhou, Jin Wang, Osama Alfarraj, Saurabh Singh, Min Zhu
    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1613-1633, 2024, DOI:10.32604/cmes.2023.044418
    (This article belongs to the Special Issue: Information Security and Trust Issues in the Digital World)
    Abstract Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system. This technology has been widely used and has developed rapidly in big data systems across various fields. An increasing number of users are participating in application systems that use blockchain as their underlying architecture. As the number of transactions and the capital involved in blockchain grow, ensuring information security becomes imperative. Addressing the verification of transactional information security and privacy has emerged as a critical challenge. Blockchain-based verification methods can effectively eliminate the need… More >

  • Open Access

    ARTICLE

    Evaluating the Efficacy of Latent Variables in Mitigating Data Poisoning Attacks in the Context of Bayesian Networks: An Empirical Study

    Shahad Alzahrani, Hatim Alsuwat, Emad Alsuwat
    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1635-1654, 2024, DOI:10.32604/cmes.2023.044718
    (This article belongs to the Special Issue: Information Security and Trust Issues in the Digital World)
    Abstract Bayesian networks are a powerful class of graphical decision models used to represent causal relationships among variables. However, the reliability and integrity of learned Bayesian network models are highly dependent on the quality of incoming data streams. One of the primary challenges with Bayesian networks is their vulnerability to adversarial data poisoning attacks, wherein malicious data is injected into the training dataset to negatively influence the Bayesian network models and impair their performance. In this research paper, we propose an efficient framework for detecting data poisoning attacks against Bayesian network structure learning algorithms. Our framework… More >

  • Open Access

    ARTICLE

    Privacy Enhanced Mobile User Authentication Method Using Motion Sensors

    Chunlin Xiong, Zhengqiu Weng, Jia Liu, Liang Gu, Fayez Alqahtani, Amr Gafar, Pradip Kumar Sharma
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 3013-3032, 2024, DOI:10.32604/cmes.2023.031088
    (This article belongs to the Special Issue: Information Security and Trust Issues in the Digital World)
    Abstract With the development of hardware devices and the upgrading of smartphones, a large number of users save privacy-related information in mobile devices, mainly smartphones, which puts forward higher demands on the protection of mobile users’ privacy information. At present, mobile user authentication methods based on human-computer interaction have been extensively studied due to their advantages of high precision and non-perception, but there are still shortcomings such as low data collection efficiency, untrustworthy participating nodes, and lack of practicability. To this end, this paper proposes a privacy-enhanced mobile user authentication method with motion sensors, which mainly… More >

Share Link