posted by user: tell || 1645 views || tracked by 5 users: [display]

FGCS-SPIFC 2016 : Special Issue on Security and Privacy Issues in Fog Computing -- Future Generation Computer Systems

FacebookTwitterLinkedInGoogle

Link: http://www.journals.elsevier.com/future-generation-computer-systems/call-for-papers/special-issue-on-security-and-privacy-issues-in-fog-computin/
 
When N/A
Where N/A
Submission Deadline May 31, 2016
Notification Due Oct 1, 2016
Final Version Due Dec 15, 2016
Categories    security   privacy
 

Call For Papers

Special Issue on Security and Privacy Issues in Fog Computing

Fog computing, a paradigm that extends cloud computing and services to the edge of the network, meets enhanced requirements by locating data, computation power, and networking capabilities closer to end nodes. Fog computing is distinguished by its accessibility to end users, particularly its support for mobility. Fog nodes are geographically distributed, and are deployed near wireless access points in areas with a significant usage. Fog devices may take the form of stand-alone servers or network devices with on-board computing capabilities. Services are hosted at the network edge or even within end-user devices, such as set-top boxes or access points. This reduces service latency, improves quality of service and provides a superior experience for the user. Fog computing supports emerging Internet of Things (IoT) applications that demand real-time or predictable latency, such as industrial automation, transportation, and networks of sensors and actuators. Due to the capability to support a wide geographical distribution, fog computing is well positioned for real-time big data analytics. Fog supports densely distributed data collection points, adding a fourth axis to the often-mentioned big data dimensions (volume, variety, and velocity).

Issues of security and privacy are in fog computing, but this remains an understudied particularly in the design and implementation of fog computing. Security solutions exist for cloud computing, but due to the underlying differences between cloud computing and fog computing, such solutions may not suit fog computing devices that are at the edges of networks. In such environments, fog computing devices face threats that do not arise in a well-managed cloud environment.

This special issue aims to bring together researchers to publish state-of-art research findings in security and privacy preserving technologies for fog computing, focusing on both theoretical and applied techniques.

Topics

The aim of the proposed Special Issue is to promote research and reflect the most recent advances of security and privacy issues of fog computing, with emphasis on the following aspects, but certainly not limited to:

Ÿ Authentication in Fog
Ÿ Auditing and accountability in Fog
Ÿ Access control mechanism in Fog
Ÿ Security model in Fog applications
Ÿ Key management in Fog
Ÿ Privacy preservation
Ÿ Location privacy
Ÿ Privacy enhanced technologies for Fog applications
Ÿ Data confidentiality in Fog devices
Ÿ Security in Internet of Thing (IoT)
Ÿ Secure outsourcing computation of Fog device
Ÿ Cyber-physical security of Fog devices

Paper Solicitation

This issue is an open special issue where everyone is encouraged to submit papers. We will solicit papers through conference and open call-for-papers.

1. Selected Papers from The 21st Australasian Conference on Information Security and Privacy (ACISP)

ACISP was established in 1996 in Wollongong. Now in its 21st year, the conference is a key forum for international researchers and industry experts to discuss the latest trends, breakthroughs and challenges in information security and privacy.

We plan to select the papers relevant to mobile cloud computing from the accepted papers based on the reviews (comments and scores) and the presentations during the conferences. Each selected paper must be substantially extended, with at least 50% difference from its conference version.

2. Open Call-For-Papers

We also plan to publicize an open call-for-papers (CFP) by listing the CFP in major academic announcement mailing lists/websites and by sending the CFP to researchers in the areas around the world. We estimate there will be a number of submissions via the open call-for-papers. Then we plan to select another a few papers from the submissions.

Each paper (including the selected papers from the conference) will go through a rigorous peer-review process by at least three international researchers. It is anticipated that we will accept 8 to 10 papers in this special issue. The acceptance rate will be fairly low, as our focus is on quality submissions.

Guest Editors

Rongxing Lu, Nanyang Technological University, Singapore ( rxlu@ntu.edu.sg )

Liqun Chen, HP Labs, UK ( liqun.chen@hp.com )

Xun Yi, RMIT, Australia ( xun.yi@rmit.edu.au )

Kim-Kwang Raymond Choo, University of South Australia, Australia (Raymond.Choo@unisa.edu.au )

Important Dates

Submission Due: May 31, 2016
1st Round Notification: October 1, 2016
Revision: December 15, 2016
Publication (expected): Early 2017

Submission guidelines:

Authors should prepare their manuscript according to the Guide for Authors available from the online submission page of the FGCS at http://ees.elsevier.com/fgcs/. Authors must select "SI: Fog_Comp" when they reach the "Article Type" step in the submission process. All papers will be peer-reviewed following the FGCS reviewing procedures.

Related Resources

Future_Internet-SI 2016   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
IEEE TDSC Journal SI 2016   IEEE TDSC Special Issue on Data-Driven Dependability and Security
FGCS SI - CI for OSN 2016   Special issue on Recent research in Computational Intelligence paradigms into Security and Privacy for Online Social Networks (OSNs)
ICISSP 2017   3rd International Conference on Information Systems Security and Privacy
SS-FN-IEEE Access Journal 2017   IEEE Access Special Section on Future Networks: Architectures, Protocols, and Applications
TDSC-PSCE 2017   Special Issue on Paradigm Shifts in Cryptographic Engineering -- IEEE Transactions on Dependable and Secure Computing
IJMSA 2016   International Journal of Modelling, Simulation and Applications
IJISS 2016   International Journal of Information Security Science (IJISS)
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
SMGSSP 2017   Smart Micro-Grid Systems Security and Privacy