posted by user: BigData2015 || 1407 views || tracked by 2 users: [display]

IEEE BigDataSecurity 2015 : The IEEE International Symposium on Big Data Security on Cloud


When Aug 24, 2015 - Aug 26, 2015
Where New York City
Submission Deadline Mar 1, 2015
Notification Due May 1, 2015
Final Version Due Jun 15, 2015

Call For Papers


BigDataSecurity 2015
The IEEE International Symposium on Big Data Security on Cloud
August 24-26, 2015, New York, USA

Important Dates
Paper submission due: March 1, 2015
Acceptance notification: May 1, 2015
Camera-ready due: June 15, 2015
Author registration: July 20, 2015
Conference: Aug. 24-26, 2015

Scope and Topics of Interest
The emerging paradigm of cloud computing provides a new way to address the constraints of limited energy, capabilities, and resources. Researchers and practitioners have embraced cloud computing as a new approach that has the potential for a profound impact in our daily life and world economy.
About 40% data globally would be related to cloud computing by 2020, as estimated by IDC. The large volume of data has big complexity and variety. To avoid system fragility and defend against vulnerabilities exploration from cyber attacker, various security techniques and tools have been developed for Big Data on cloud. There are two important aspects of Big Data Security, especially in cloud computing environment. One is how to protect big data, the other is how to using big data analytic technique to enhance security of the whole system.
The objective of BigDataSecurity 2015 is to provide a forum for scientists, engineers, and researchers to discuss and exchange their new ideas, novel results, work in progress and experience on all aspects of Big Data Security on cloud. Topics of particular interest include, but are not limited to:
-Big data model in New Paradigms
-Big data security
-Big data privacy
-Big data storage, integration, service, mining
-Big data security applications, such as healthcare, transportation, environment, education, business, library, media, finance, etc.
-Cyber hacking, next generation fire wall
-Cyber monitoring, incident response
-Database security, data center security
-Social engineering, insider threats, advance spear phishing
-Cyber threat intelligence
-Security and fault tolerance for embedded or ubiquitous systems
-Tele-health security
-Sensor network security
-Security policy and legal considerations
-Cloud and networking security
-Cloud computing and networking models
-Virtualization for big data on cloud
-MapReduce with cloud for big data processing
-Heterogeneous architecture for cloud computing
-Dynamic resource sharing algorithm for cloud computing
-Load balance for cloud computing
-Mobile cloud computing
-Green cloud computing
-Embedded networks and sensor network optimizations
-Cyber Security in emergent technologies, infrastructures and applications

Submissions should include abstract, 5-10 keywords, and the e-mail address of the corresponding author and be in PDF format. Each submission must not exceed 6 pages in the IEEE 8.5’’ x 11’’ two-column format with 10-12 point font (Template: DOC or LaTeX), including tables and figures. Each accepted paper needs at least one author to register in the conference. Each submission should be regarded as an undertaking that, should the submission be accepted, at least one of the authors must attend the conference to present the work in order that the accepted paper can be put into digital library. The final version of an accepted paper will be limited to 10 pages in IEEE proceeding format. Please submit papers in PDF format through the BigDataSecurity web site. Manuscript should be prepared following the IEEE Computer Society Press Proceedings. Author Guidelines that can be found at:
The accepted papers have to be presented orally at the conference and will be published by IEEE Computer Society Press (indexed by EI) and included in IEEE Digital Library. Selected best papers will be recommended to the special issues of well-regarded SCI journals..


General Chair
Albert Zomaya, University of Sydney, Australia
Meikang Qiu, Pace University, USA
Program Chair
Bhavani Thuraisingham, University of Texas at Dallas, USA
Yongxin Zhu, Shanghai Jiaotong University, China
Publication Chair
Bin Wang, Wright State University, USA
Publicity Chair
Jingtong Hu, Oklahoma State University, USA
Local Chair
Peng Zhang, SUNY Stony Brook, USA
Web Chair
Keke Gai, Pace University, USA
Steering Committee
Albert Zomaya, University of Sydney, Australia
Bhavani Thuraisingham, University of Texas at Dallas, USA
Meikang Qiu, Pace University, USA
Yongxin Zhu, Shanghai Jiaotong University, China

Related Resources

DSAA 2017   The 4th IEEE International Conference on Data Science and Advanced Analytics 2017
IROS 2017   IEEE/RSJ International Conference on Intelligent Robots and Systems
BigDataSecurity 2017   The 3rd IEEE International Conference on Big Data Security on Cloud
ICCT-IEEE 2017   17th IEEE International Conference on Communication Technology(ICCT 2017)
SI: Digital Forensics 2017   Call for Papers for Special Issue on Digital Forensics for IEEE S&P magazine
IEEE ITOEC 2017   2017 IEEE 3rd Information Technology and Mechatronics Engineering Conference
IWPE 2017   3rd IEEE International Workshop on Privacy Engineering
WACV 2017   IEEE Winter Conference on Applications of Computer Vision
MLDM 2017   Machine Learning and Data Mining in Pattern Recognition
ICDCS 2017   International Conference on Distributed Computing Systems