About this Research Topic
The development of 5G/B5G communications has deeply influenced the era of computing, storage and communications. The emerging applications are expected to carry confidential personal data, such as private data offloading in edge computing, real-time monitoring of vital physiological signals in remote-Health systems, e-Payment/Voting in smart city. While the data carried in emerging applications is becoming more personal, privacy leakage pervades all applications that require a user to release data in order to receive utility.
In contrast to traditional security designs that aim to prevent confidential information from being eavesdropped upon by adversaries, the philosophy of privacy-preserving techniques is to mask data itself or part of it, or conceal the communication participants during communication towards legitimate but curious receivers. The former line of research seeks to control information leakage and strike a compromise between privacy and utility. The latter focuses on guaranteeing the communication quality towards legitimate parties, while concealing the users’ identities during communication, known as anonymous communication.
In light of the strong interest in providing users with high privacy in the emerging applications, the goal of this Research Topic is to solicit original research papers, bringing together academic researchers and industrialists to report recent research advances in privacy-preserving techniques. This Research Topic welcomes research that discusses the advances, and envisions new research directions in the relevant fields.
Themes of interest in this Research Topic include but not limited to the following:
• Information-theoretic foundation of privacy-preserving communications
• Modelling and statistical characteristics analysis for privacy-preserving communications
• Algorithms, protocols and systematic design for privacy-preserving communications
• Differential Privacy in distributed caching, information retrieval, computing, and other big data applications
• Random privacy mapping for emerging application
• Physical layer anonymous communication and anonymous precoding technique
• Signal traceback attack and its countermeasures
• Anonymous authentication, anonymous data encryption, and anonymous routing design
• The interplay between privacy and other metrics, such as security, delay, reliability, user fairness
• Machine learning aided privacy-preserving techniques
• Integration of privacy-preserving communication with state-of-the-art wireless technologies (e.g., millimeter wave communications, integrated sensing and communications, short-packet transmission, intelligent reflecting surface, fog/edge computing, Internet-of-Things)
Important Note: All contributions to this Research Topic must be within the scope of the section and journal to which they are submitted, as defined in their mission statements. Frontiers reserves the right to guide an out-of-scope manuscript to a more suitable section or journal at any stage of peer review.