posted by user: BigData2015 || 1480 views || tracked by 2 users: [display]

IEEE BigDataSecurity 2015 : The IEEE International Symposium on Big Data Security on Cloud


When Aug 24, 2015 - Aug 26, 2015
Where New York City
Submission Deadline Mar 1, 2015
Notification Due May 1, 2015
Final Version Due Jun 15, 2015

Call For Papers


BigDataSecurity 2015
The IEEE International Symposium on Big Data Security on Cloud
August 24-26, 2015, New York, USA

Important Dates
Paper submission due: March 1, 2015
Acceptance notification: May 1, 2015
Camera-ready due: June 15, 2015
Author registration: July 20, 2015
Conference: Aug. 24-26, 2015

Scope and Topics of Interest
The emerging paradigm of cloud computing provides a new way to address the constraints of limited energy, capabilities, and resources. Researchers and practitioners have embraced cloud computing as a new approach that has the potential for a profound impact in our daily life and world economy.
About 40% data globally would be related to cloud computing by 2020, as estimated by IDC. The large volume of data has big complexity and variety. To avoid system fragility and defend against vulnerabilities exploration from cyber attacker, various security techniques and tools have been developed for Big Data on cloud. There are two important aspects of Big Data Security, especially in cloud computing environment. One is how to protect big data, the other is how to using big data analytic technique to enhance security of the whole system.
The objective of BigDataSecurity 2015 is to provide a forum for scientists, engineers, and researchers to discuss and exchange their new ideas, novel results, work in progress and experience on all aspects of Big Data Security on cloud. Topics of particular interest include, but are not limited to:
-Big data model in New Paradigms
-Big data security
-Big data privacy
-Big data storage, integration, service, mining
-Big data security applications, such as healthcare, transportation, environment, education, business, library, media, finance, etc.
-Cyber hacking, next generation fire wall
-Cyber monitoring, incident response
-Database security, data center security
-Social engineering, insider threats, advance spear phishing
-Cyber threat intelligence
-Security and fault tolerance for embedded or ubiquitous systems
-Tele-health security
-Sensor network security
-Security policy and legal considerations
-Cloud and networking security
-Cloud computing and networking models
-Virtualization for big data on cloud
-MapReduce with cloud for big data processing
-Heterogeneous architecture for cloud computing
-Dynamic resource sharing algorithm for cloud computing
-Load balance for cloud computing
-Mobile cloud computing
-Green cloud computing
-Embedded networks and sensor network optimizations
-Cyber Security in emergent technologies, infrastructures and applications

Submissions should include abstract, 5-10 keywords, and the e-mail address of the corresponding author and be in PDF format. Each submission must not exceed 6 pages in the IEEE 8.5’’ x 11’’ two-column format with 10-12 point font (Template: DOC or LaTeX), including tables and figures. Each accepted paper needs at least one author to register in the conference. Each submission should be regarded as an undertaking that, should the submission be accepted, at least one of the authors must attend the conference to present the work in order that the accepted paper can be put into digital library. The final version of an accepted paper will be limited to 10 pages in IEEE proceeding format. Please submit papers in PDF format through the BigDataSecurity web site. Manuscript should be prepared following the IEEE Computer Society Press Proceedings. Author Guidelines that can be found at:
The accepted papers have to be presented orally at the conference and will be published by IEEE Computer Society Press (indexed by EI) and included in IEEE Digital Library. Selected best papers will be recommended to the special issues of well-regarded SCI journals..


General Chair
Albert Zomaya, University of Sydney, Australia
Meikang Qiu, Pace University, USA
Program Chair
Bhavani Thuraisingham, University of Texas at Dallas, USA
Yongxin Zhu, Shanghai Jiaotong University, China
Publication Chair
Bin Wang, Wright State University, USA
Publicity Chair
Jingtong Hu, Oklahoma State University, USA
Local Chair
Peng Zhang, SUNY Stony Brook, USA
Web Chair
Keke Gai, Pace University, USA
Steering Committee
Albert Zomaya, University of Sydney, Australia
Bhavani Thuraisingham, University of Texas at Dallas, USA
Meikang Qiu, Pace University, USA
Yongxin Zhu, Shanghai Jiaotong University, China

Related Resources

DSAA 2017   The 4th IEEE International Conference on Data Science and Advanced Analytics 2017
ICDM 2017   IEEE International Conference on Data Mining 2017
ICCT-IEEE 2017   17th IEEE International Conference on Communication Technology(ICCT 2017)
IEEE ITOEC 2017   2017 IEEE 3rd Information Technology and Mechatronics Engineering Conference
SI: Security-BD-SmartCity 2017   Special Issue on Security and Privacy in Big Data-enabled Smart Cities: Opportunities and Challenges
SI - IoT and Big Data 2017   IoT and Big Data: An Extraordinary Synergy
ICCBDC - ACM 2017   International Conference on Cloud and Big Data Computing (ICCBDC 2017)--Ei Compendex and Scopus
IEEE Cluster 2017   International Conference on Cluster Computing
WACV 2017   IEEE Winter Conference on Applications of Computer Vision
DASC 2017   The 15th IEEE International Conference on Dependable, Autonomic and Secure Computing