数据安全质量评估特刊社论

IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS ACM Journal of Data and Information Quality Pub Date : 2023-06-22 DOI:10.1145/3591360
Gautam Srivastava, Jerry Chun‐wei Lin, Zhihan Lv
{"title":"数据安全质量评估特刊社论","authors":"Gautam Srivastava, Jerry Chun‐wei Lin, Zhihan Lv","doi":"10.1145/3591360","DOIUrl":null,"url":null,"abstract":"Due to rapid technical advancements, many devices such as sensors, embedded systems, actuators, and mobile/smart devices receive huge amounts of information through data exchange and interconnectivity. From this increase in the exchange of data, there has also been a direct correlation to sensitive information that also moves through systems continuously. In this context, it is critical to ensure that both private and personal data is not disclosed and that any confidential information can be successfully hidden. Therefore, security and privacy have attracted a great deal of attention in academia and industry in recent decades. Not only is there a reason to protect against data leakage that is sensitive in nature, but it is also imperative to ensure that users of such systems trust the means by which their data is exchanged. Hundreds of security solutions have recently been discussed in the literature. However, the ability to properly manage the quality of security to ensure that developed models and algorithms can secure data is a very important task. To that end, only a limited number of works have addressed this problem directly. Since exchanged data usually is complex, researchers should also develop and investigate security models to perform quality assessments of data security. These tasks will ensure that threats from hackers or malware can be minimized. Security solutions can take on many forms. From cryptographic primitives all the way to machine learning and artificial intelligence, these potential fail-safes need to be properly researched, disseminated and discussed to ensure the next generation of systems will adhere to certain standards in the realm of security and privacy. This special issue saw a total of 21 submissions, from which five papers were published. It was intentional to adhere to a strict acceptance rate and ensure that only the best papers in the scope of the special issue were accepted. The following few paragraphs summarize the contributions that our special issue collection presents. In “A Survey on Edge Intelligence and Lightweight Machine Learning Support for Future Applications and Services,” Hoffpauir et al. provided a comprehensive survey of the emerging edge intelligence applications, lightweight machine learning algorithms, and their support for future applications and services. The survey started by analyzing the rise of cloud computing discussing its weak points, and identifying situations in which edge computing provides advantages over traditional cloud computing architectures. Then it dove into the survey the first section identifying opportunities and domains for edge computing growth, the second identifying algorithms and approaches that can be used to enhance edge intelligence implementations, and the third specifically analyzing situations in which edge intelligence can be enhanced using any of the aforementioned algorithms or approaches. In this third section, lightweight machine learning approaches are detailed. A more in-depth analysis and discussion of future developments follow. The","PeriodicalId":44355,"journal":{"name":"ACM Journal of Data and Information Quality","volume":"25 1","pages":"1 - 3"},"PeriodicalIF":1.5000,"publicationDate":"2023-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Editorial for the Special Issue on Quality Assessment of Data Security\",\"authors\":\"Gautam Srivastava, Jerry Chun‐wei Lin, Zhihan Lv\",\"doi\":\"10.1145/3591360\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Due to rapid technical advancements, many devices such as sensors, embedded systems, actuators, and mobile/smart devices receive huge amounts of information through data exchange and interconnectivity. From this increase in the exchange of data, there has also been a direct correlation to sensitive information that also moves through systems continuously. In this context, it is critical to ensure that both private and personal data is not disclosed and that any confidential information can be successfully hidden. Therefore, security and privacy have attracted a great deal of attention in academia and industry in recent decades. Not only is there a reason to protect against data leakage that is sensitive in nature, but it is also imperative to ensure that users of such systems trust the means by which their data is exchanged. Hundreds of security solutions have recently been discussed in the literature. However, the ability to properly manage the quality of security to ensure that developed models and algorithms can secure data is a very important task. To that end, only a limited number of works have addressed this problem directly. Since exchanged data usually is complex, researchers should also develop and investigate security models to perform quality assessments of data security. These tasks will ensure that threats from hackers or malware can be minimized. Security solutions can take on many forms. From cryptographic primitives all the way to machine learning and artificial intelligence, these potential fail-safes need to be properly researched, disseminated and discussed to ensure the next generation of systems will adhere to certain standards in the realm of security and privacy. This special issue saw a total of 21 submissions, from which five papers were published. It was intentional to adhere to a strict acceptance rate and ensure that only the best papers in the scope of the special issue were accepted. The following few paragraphs summarize the contributions that our special issue collection presents. In “A Survey on Edge Intelligence and Lightweight Machine Learning Support for Future Applications and Services,” Hoffpauir et al. provided a comprehensive survey of the emerging edge intelligence applications, lightweight machine learning algorithms, and their support for future applications and services. The survey started by analyzing the rise of cloud computing discussing its weak points, and identifying situations in which edge computing provides advantages over traditional cloud computing architectures. Then it dove into the survey the first section identifying opportunities and domains for edge computing growth, the second identifying algorithms and approaches that can be used to enhance edge intelligence implementations, and the third specifically analyzing situations in which edge intelligence can be enhanced using any of the aforementioned algorithms or approaches. In this third section, lightweight machine learning approaches are detailed. A more in-depth analysis and discussion of future developments follow. The\",\"PeriodicalId\":44355,\"journal\":{\"name\":\"ACM Journal of Data and Information Quality\",\"volume\":\"25 1\",\"pages\":\"1 - 3\"},\"PeriodicalIF\":1.5000,\"publicationDate\":\"2023-06-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ACM Journal of Data and Information Quality\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3591360\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Journal of Data and Information Quality","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3591360","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

由于技术的快速进步,许多设备如传感器、嵌入式系统、执行器和移动/智能设备通过数据交换和互联接收大量信息。由于数据交换的增加,也与敏感信息直接相关,这些信息也在系统中不断移动。在这种情况下,确保私人和个人数据不被披露以及任何机密信息都可以成功隐藏是至关重要的。因此,近几十年来,安全和隐私问题引起了学术界和工业界的广泛关注。不仅有理由防止敏感的数据泄露,而且还必须确保此类系统的用户信任其数据交换的方式。最近在文献中讨论了数百种安全解决方案。然而,正确管理安全质量以确保开发的模型和算法能够保护数据的能力是一项非常重要的任务。为此,只有少数作品直接解决了这个问题。由于交换的数据通常是复杂的,研究人员还应该开发和调查安全模型,以执行数据安全的质量评估。这些任务将确保来自黑客或恶意软件的威胁可以最小化。安全解决方案可以采取多种形式。从密码学原语到机器学习和人工智能,这些潜在的故障安全措施需要得到适当的研究、传播和讨论,以确保下一代系统将遵守安全和隐私领域的某些标准。本期特刊共收到21份投稿,其中发表了5篇论文。它有意坚持严格的接受率,并确保只接受特刊范围内最好的论文。以下几段总结了我们特刊收集的贡献。在“对未来应用和服务的边缘智能和轻量级机器学习支持的调查”中,Hoffpauir等人对新兴的边缘智能应用、轻量级机器学习算法及其对未来应用和服务的支持进行了全面调查。该调查首先分析了云计算的兴起,讨论了它的弱点,并确定了边缘计算比传统云计算架构提供优势的情况。然后深入调查,第一部分确定边缘计算增长的机会和领域,第二部分确定可用于增强边缘智能实现的算法和方法,第三部分具体分析可以使用任何上述算法或方法增强边缘智能的情况。在第三部分中,详细介绍了轻量级机器学习方法。接下来将对未来的发展进行更深入的分析和讨论。的
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Editorial for the Special Issue on Quality Assessment of Data Security
Due to rapid technical advancements, many devices such as sensors, embedded systems, actuators, and mobile/smart devices receive huge amounts of information through data exchange and interconnectivity. From this increase in the exchange of data, there has also been a direct correlation to sensitive information that also moves through systems continuously. In this context, it is critical to ensure that both private and personal data is not disclosed and that any confidential information can be successfully hidden. Therefore, security and privacy have attracted a great deal of attention in academia and industry in recent decades. Not only is there a reason to protect against data leakage that is sensitive in nature, but it is also imperative to ensure that users of such systems trust the means by which their data is exchanged. Hundreds of security solutions have recently been discussed in the literature. However, the ability to properly manage the quality of security to ensure that developed models and algorithms can secure data is a very important task. To that end, only a limited number of works have addressed this problem directly. Since exchanged data usually is complex, researchers should also develop and investigate security models to perform quality assessments of data security. These tasks will ensure that threats from hackers or malware can be minimized. Security solutions can take on many forms. From cryptographic primitives all the way to machine learning and artificial intelligence, these potential fail-safes need to be properly researched, disseminated and discussed to ensure the next generation of systems will adhere to certain standards in the realm of security and privacy. This special issue saw a total of 21 submissions, from which five papers were published. It was intentional to adhere to a strict acceptance rate and ensure that only the best papers in the scope of the special issue were accepted. The following few paragraphs summarize the contributions that our special issue collection presents. In “A Survey on Edge Intelligence and Lightweight Machine Learning Support for Future Applications and Services,” Hoffpauir et al. provided a comprehensive survey of the emerging edge intelligence applications, lightweight machine learning algorithms, and their support for future applications and services. The survey started by analyzing the rise of cloud computing discussing its weak points, and identifying situations in which edge computing provides advantages over traditional cloud computing architectures. Then it dove into the survey the first section identifying opportunities and domains for edge computing growth, the second identifying algorithms and approaches that can be used to enhance edge intelligence implementations, and the third specifically analyzing situations in which edge intelligence can be enhanced using any of the aforementioned algorithms or approaches. In this third section, lightweight machine learning approaches are detailed. A more in-depth analysis and discussion of future developments follow. The
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
ACM Journal of Data and Information Quality
ACM Journal of Data and Information Quality COMPUTER SCIENCE, INFORMATION SYSTEMS-
CiteScore
4.10
自引率
4.80%
发文量
0
期刊最新文献
Text2EL+: Expert Guided Event Log Enrichment using Unstructured Text A Catalog of Consumer IoT Device Characteristics for Data Quality Estimation AI explainibility and acceptance; a case study for underwater mine hunting Data quality assessment through a preference model Editorial: Special Issue on Quality Aspects of Data Preparation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1