posted by organizer: chiamuyu || 5699 views || tracked by 8 users: [display]

FGCS SI on Secruity 2018 : Special Issue on Trusted Cloud-Edges (CE) Computations

FacebookTwitterLinkedInGoogle

Link: https://www.journals.elsevier.com/future-generation-computer-systems/call-for-papers/special-issue-on-trusted-cloud-edges-ce-computations
 
When N/A
Where N/A
Submission Deadline Nov 30, 2018
Notification Due Mar 31, 2019
Final Version Due Jun 30, 2019
Categories    security   privacy   IOT   edge computing
 

Call For Papers

Future Generation Computer Systems (Elsevier)

Special Issue on Trusted Cloud-Edges (CE) Computations

Current and future service-based software needs to remain focused towards the development and deployment of large and complex intelligent and networked information systems, required for internet-based and intranet-based systems in organizations, as well to move to IoT integration and big data analytics. Today, service-based software covers a very wide range of application domains as well as technologies and research issues. This has recently found realization through the integration of cloud computing and IoT, forming a revolutionary paradigm, cloud-assisted Internet of things (CoT), that enables intelligent and self-configuring (smart) IoT devices to be connected with the cloud through the Internet. However, huge volume of data generated from real-world applications leads to the operation difficulty of CoT paradigm. More specifically, while billions of connected devices will generate exabytes of data every day, moving all the data from comparably resource-constrained IoT devices to the cloud becomes a big challenge. Hence, the centralized CoT model is undergoing a paradigm shift towards a decentralized model termed as edge computing, where local and distributed edge devices such as smartphones, smart gateways, and local PC with weaker capability than the centralized cloud can offer cloud-like service for only a limited group of devices. While the centralized cloud is still inevitable for the heavyweight computation needs, in this emerging Cloud-Edges (CE) paradigm, the cloud, together with local edge devices jointly offer services and intelligence. CE paradigm complements traditional CoT paradigm in terms of high scalability, low delay, location awareness, and instant local client computing capabilities. Nonetheless, due to the multiple and even highly distributed roles in CE paradigm, vital elements in such CE paradigm are the notions of trust, security, privacy and risk management among the cloud, edge devices, and end devices.

This special issue solicits submissions from both academia and industry presenting novel research in the context of trusted Cloud-Edges (CE) computations, presenting theoretical and practical approaches to cloud, big data, IoT and edge computing trust, security, privacy and risk management. This special issue will provide a special focus on the intersection between cloud paradigm, big data analytics, IoT integration and edge computing, bringing together experts from the four communities to discuss on the vital issues of trust, security, privacy and risk management in cloud computing, shedding the light on novel issues and requirements in domains of big data, IoT, and edge computing. Potential contributions could cover new approaches, methodologies, protocols, tools, or verification and validation techniques. We also welcome review papers that analyze

critically the current status of trust, security, privacy and risk management in the cloud, big data, IoT, and edge computing. Papers from practitioners who encounter trust, security, privacy, and risk management problems, and seek understanding are finally welcome. Best papers from the 7th International Symposium on Secure Virtual Infrastructures - Cloud and Trusted Computing (http://www.otmconferences.org/index.php/conferences/ctc-2018) will be also invited to submit to the special issue.

The following themes are of particular interest:
Authentication, auditing and accountability in Cloud-Edges
Edge computing architectures and solution design patterns
Edge computing for IoT Communication and networking protocols for Cloud-Edges
Fine-grained access control mechanism in Cloud-Edges
Privacy-preserving computation in Cloud-Edges
Trust and reputation issues in Cloud-Edges
Security architecture for Cloud-Edges
Key management in Cloud-Edges IoT communication in Cloud-Edges
Data caching for big data in Cloud-Edges Big data analytics in Cloud-Edges
Incentive models or techniques for data processing in Cloud-Edges
Privacy-Enhancing Cryptographic Techniques in Cloud-Edges
Secure Data Analysis and Private Learning Outsourced or Verifiable Computation in Cloud-Edges
Secure Software-Defined Networking and Virtualization for in Cloud-Edges
Security for Crowdsourcing in Cloud-Edges

Submission Guidelines
Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. Submission must be in the form of a PDF file and must be in English. All papers will be thoroughly peer-reviewed by independent reviewers and selected based on originality, scientific quality and relevance to the special issue. The journal editors will make final decisions about the acceptance of the papers.
All submissions must be prepared according to the Guide for Authors available on FGCS homepage and submitted through the Editorial system (EVISE) located at https://www.evise.com/evise/jrnl/FGCS. Authors must select "VSI: Trusted Cloud-Edge Comp”, from the “Choose Article Type” pull-down menu during the submission process at EVISE.


Guest Editors

Claudio A. Ardagna
University of Milan, Italy
claudio.ardagna@unimi.it

Mauro Conti
University of Padova, Italy
conti@math.unipd.it

Ernesto Damiani
Khalifa University, UAE
ernesto.damiani@kustar.ac.ae

Chia-Mu Yu
National Chung Hsing University, Taiwan
chiamuyu@nchu.edu.tw

Timeline
Manuscript Due: November 30, 2018
First Review Notification: March 31, 2019
Revised Manuscript: May 31, 2019
Second Review Notification: June 30, 2019
Second Revised Manuscript: July 31, 2019
Camera Ready Paper Due: August 31, 2019
Publication Date: Third Quarter of 2019

Related Resources

CETA--EI 2025   2025 4th International Conference on Computer Engineering, Technologies and Applications (CETA 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
SEAS 2025   14th International Conference on Software Engineering and Applications
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
ccpi 2025   16th International Workshop on Cloud-Edge Continuum Projects and Initiatives (CCPI)
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
CompAuto--EI 2025   2025 4th International Conference on Computers and Automation (CompAuto 2025)
MATHCS 2024   2nd International Conference on Mathematics, Computer Science & Engineering
SI AIMLDE 2024   SPECIAL ISSUE on Applied Artificial intelligence, Machine Learning, and Data Engineering
COIT 2025   5th International Conference on Computing and Information Technology