Special Issue "Edge and Cloud Computing in IoT"

A special issue of Computers (ISSN 2073-431X).

Deadline for manuscript submissions: 30 August 2021.

Special Issue Editors

Dr. Antonios Litke
E-Mail Website
Guest Editor
Electrical and Computer Engineering, National Technical University of Athens, Athens, Greece
Interests: edge/cloud computing; distributed systems; IoT and applications; blockchains
Dr. Konstantinos Tserpes
E-Mail Website
Guest Editor
Informatics and Telematics, Harokopio University of Athens, Athens, Greece
Interests: service oriented computing and data analytics; cloud federations; cloud-assisted IoT; microservice architectures

Special Issue Information

Dear Colleagues,

Modern approaches on edge computing allow the data produced by Internet of Things (IoT) devices to be processed closer to where they are created, instead of sending them across long routes to data centres or clouds. Performing this computing closer to the edge of the network enables organisations to run near real-time analysis of important data—a need of organisations across many domains, including manufacturing, healthcare, telecommunications, and finance. The disruptive potential of edge computing is fuelled by the unprecedented growth of data, the imminent impact of 5th Generation (5G) networks, the growing importance of latency in modern applications, and the emergence of a distributed computing architecture that favours specialised hardware, like GPUs, and offloads techniques to be covered by cloud infrastructures.

However, the new computing model on the edge needs to address the forthcoming massive usage of edge computing resources in the frame of large IoT deployments in smart cities and industrial applications. Essentially, the main goal in such scenarios is to ensure that the overall offered Quality of Service (QoS) fits the application needs over the edge or edge/cloud deployment. Speed and latency issues have been identified as the primary barrier in this domain, while cost and reliability (meeting the provider Service Level Agreements—SLAs), and trust of edge devices, are important factors for evaluating edge and cloud services in the computing continuum.

We welcome original contributions covering the following topics:

  • IoT/ edge/cloud computing architectures.
  • CPU/GPU and hardware in edge computing.
  • Edge computing for industrial internet and systems.
  • Cloud and fog computing environments.
  • Cloud and edge load balancing and offloading techniques.
  • AI-enabled edge computing.
  • Industrial applications on edge computing and IoT.
  • Edge computing for ad-hoc and sensor networks.
  • Edge and fog scheduling.
  • Managing extensive edge computing based services.
  • Performance modelling and evaluation.
  • QoS/QoE management in the edge/cloud.
  • Security and privacy in the cloud-edge hierarchy.
  • Green edge/cloud computing.
  • SLAs and trust and reputation in edge computing.
  • Scientific workflows on clouds.
  • Mobile clouds and mobile edge computing.
  • Big data/complex event processing in the cloud-edge hierarchy.
  • Cloud continuum–IoT/smart cities integration.
  • Blockchains and DLTs on the edge.

Dr. Antonios Litke
Dr. Konstantinos Tserpes
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Computers is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.


  • Internet of Things
  • edge/cloud computing continuum
  • applications on IoT/edge
  • QoS, security, and trust in edge computing

Published Papers

This special issue is now open for submission, see below for planned papers.

Planned Papers

The below list represents only planned manuscripts. Some of these manuscripts have not been received by the Editorial Office yet. Papers submitted to MDPI journals are subject to peer-review.

Title: Guide for the Implementation of a Response Team to Computer Security Incidents on a University Campus
Authors: William Villegas-Ch; Milton Román-Cañizares; Santiago Sánchez-Viteri
Affiliation: Universidad de Las Américas Universidad Internacional del Ecuador
Abstract: Currently, society is going through a health event with devastating results. In their desire to control the 2019 coronavirus disease pandemic, large organizations have turned the execution of their activities to the use of information technology. These tools, adapted to the use of the Internet, have been presented as an effective solution to the measures implemented by the majority of nations where quarantines are generalized. However, the solution given by information technologies has several disadvantages that must be solved. The most important in this regard with the serious security incidents that exist, where many organizations have been compromised and their data has been exposed. As a solution, this work proposes the design of a guide that allows the implementation of a computer incident response team on a university campus. Universities are optimal environments for the generation of new technologies, they also serve as the ideal test bed for the generation of security policies and new treatments for incidents in an organization. In addition, with the implementation of the computer incident response team in a university, it is proposed to be part of a response group to any security incident at the national level.

Back to TopTop