• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
FacebookTwitterLinkedInInstagramYoutube
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Digital Library
  • /Journals
  • /Ec
  • Home
  • / ...
  • /Journals
  • /Ec

[CLOSED] Call for Papers: Special Section on Advances in Emerging Privacy-Preserving Computing

Machine learning and cloud computing have dramatically increased the utility of data. These technologies facilitate our life and provide smart and intelligent services. Notably, machine learning algorithms need to learn from massive training data to improve accuracy. Hence, data is the core component of machine learning and plays an important role. Cloud computing is a new computing model that provides on-demand services, such as data storage, computing power, and infrastructure. Data owners are allowed to outsource their data to cloud servers, but will lose direct control of their data. The rising trend in data breach shows that privacy and security have been major issues in machine learning and cloud computing.

Computation over unencrypted sensitive data may compromise the confidentiality of data and suffer various security attacks, such as identity theft and fraud. To regulate data collecting and releasing, the European Union (EU) announced the strict privacy protection policy called General Data Protection Regulation (GDPR), which was put into effect in 2018 and applied to enhance individuals’ control and rights over their personal data. Traditional cryptographic methods (such as DES, AES, and hash) can be applied to protect data confidentiality, but do not support computation over encrypted data. Therefore, these methods are not suitable for machine learning and cloud computing.

To address the requirements for computation in machine learning and cloud computing, new computation techniques must be developed. Privacy-preserving computation techniques were proposed to provide protection on sensitive data and support secure computation over encrypted data. Since data remains encrypted or opaqued during computation, it is immune to being collected and abused. Some methods have been proposed to implement privacy-preserving computation, such as homomorphic encryption and secure multi-party computation, but these methods are computationally costly. Therefore, it is urgent to develop new privacy-preserving computation techniques to protect data confidentiality and support efficient computation over encrypted data.

Relevant topics of interest to this special section include (but are not limited to):

  • Foundations and applications of privacy-preserving computing: secure multi-party computation, zero-knowledge, oblivious transfer, security models, etc.
  • Real-world applied differential privacy, such as e-health, image sharing, and location-based services
  • Homomorphic encryption (HE): novel applications of HE, implementations in hardware and software of HE, etc.
  • Functional encryption (FE): novel applications of FE, efficient constructions for concrete functions, implementations in hardware and software of FE, etc.
  • Privacy-preserving computing and machine learning in real-world computing applications
  • Design and implementation of trusted platform modules (TPMs): TPM-based anonymous authentication, signature, encryption, identity management, etc.
  • Applied trusted execution environments (TEEs): TEE-based privacy techniques, vulnerability and countermeasures of TEE, distributed TEE, decentralized TEE, etc.

Purely theoretical and algorithm development papers are not in scope of this special section, and every submission must have a clear connection to realistic computing applications, implementations, or simulations, as well as comparisons. Communication protocols, theoretical cryptography algorithms, and contributions outside the scope of the journal will not be considered.

Schedule

Deadline for submissions: June 15, 2022

First decision (accept/reject/revise, tentative): August 24, 2022

Submission of revised papers: November 16, 2022

Notification of final decision (tentative): December 28, 2022

Journal publication (tentative): first half of 2023

Submission Guidelines

For author information and guidelines on submission criteria, please visit the TETC Author Information page. Please submit papers through the ScholarOne system, and be sure to select the special-section name. Manuscripts should not be published or currently submitted for publication elsewhere. Please submit only full papers intended for review, not abstracts, to the ScholarOne portal.

Questions?

Please contact the guest editors at tetc22aeppc@gmail.com.

Guest editors:

Jinguang Han, Southeast University, China (IEEE Senior Member)

Willy Susilo, University of Wollongong, Australia (IEEE Fellow)

Corresponding TETC editor:

Patrick Schaumont, Worcester Polytechnic Institute, USA (IEEE Senior Member)

LATEST NEWS
From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities
From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Autonomous Observability: AI Agents That Debug AI
Autonomous Observability: AI Agents That Debug AI
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Read Next

From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities

IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT

Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)

Autonomous Observability: AI Agents That Debug AI

Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference

Copilot Ergonomics: UI Patterns that Reduce Cognitive Load

The Myth of AI Neutrality in Search Algorithms

Gen AI and LLMs: Rebuilding Trust in a Synthetic Information Age

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter