Abstract

Nowadays, big data and Internet of things (IoT) are prime factors of concern for secure distributed system application. Their uses vary from simple home applications to the complex defense systems utilizing cloud environment. Until recently, it was inconceivable that the technology would exist to allow us to access information services, that is, make calls, watch videos, and surf the Internet, simultaneously. But it is now thought that >70% of the population will live in cities by 2050; this will likely result in the challenge of sustainability and energy usage for service deliverers.
Next-generation solutions in the field of secure distributed systems include a summation of the networked information system, transceiver devices, decision-making, and physical infrastructure under a single integrated platform. These solutions are currently being applied to real-time distributed applications, such as traffic congestion, crime prevention, economic development, greenhouse emission control, and e-governance. The major challenge for next-generation secure information systems lies in the power of sensors, smart phones, cloud computing, high-speed networks, and data analytics. This special collection consists of five papers focusing on IoT and cloud security solutions.
In the first paper, Li et al. propose an improved strategy to incorporate the security using verifier signature scheme for distributed systems including IoT and cloud applications. In the next paper, Zhu et al. focus on selective forwarding attacks, proposing an improved solution for forwarding, black hole, on–off, and energy attacks. Furthermore, in the third paper, Jiawei et al. present an innovative routing scheme for software-defined networks to reduce the overhead by addressing the flow balance. In the fourth paper, Janoky et al. highlight the significance of web token specifically for JSON to provide a scalable solution for cloud- and IoT-based applications. Finally, in the fifth paper, Chen et al. illustrate a trustworthy model for cloud users to incorporate security in distributed applications.
These papers address the objectives of this special issue and will be beneficial for the researcher working in the field of IoT and cloud solutions.
Footnotes
Acknowledgements
The authors would like to thanks the authors, reviewers, and team of International Journal of Distribute Sensor Networks, SAGE Publications for their contribution, suggestions, and timely support in the publication of this special collection.
Author’s note
Vinod Kumar Verma is the corresponding author of this paper.
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Funding
The author(s) received no financial support for the research, authorship, and/or publication of this article.
