posted by user: wchang_sju || 10595 views || tracked by 4 users: [display]

SPiFEC 2020 : Security & Privacy Issues in Fog/Edge Computing (Call for Book Chapters)

FacebookTwitterLinkedInGoogle

 
When Oct 19, 2019 - Dec 19, 2019
Where Book
Abstract Registration Due Nov 15, 2019
Submission Deadline Mar 15, 2020
Notification Due Jun 1, 2020
Final Version Due Jul 1, 2020
Categories    computer science   security   privacy   fog/edge computing
 

Call For Papers

Call for Book Chapters

Book Title: Security & Privacy Issues in Fog/Edge Computing

Publisher: Springer

Editors:
Jie Wu, Temple University, Philadelphia, USA
Wei Chang, Saint Joseph's University, Philadelphia, USA

Introduction:
Recent rapid advances in Mobile Cellular Networks, Cloud Computing, and Big Data have introduced Fog/Edge Computing as an interesting topic to the research community, one that has received much attention from practitioners, scholars, and the general public. The Fog/Edge Computing can be described as an extension of the Cloud Computing to the edge of an enterprise's network to cope with the tremendous data volumes for having a low-latency or even real-time service. Considering that we are in the era of big data, many applications, such as the Internet of Things, Mobile Social Networks, and Smart City, keep generating data and interacting with the remote data centers all the time, which creates unique requirements and new challenges on the computation, storage, and communication. Thanks to the idea of the Fog/Edge Computing, certain tasks can be mitigated from the heavy-weighted data center to local devices, which not only reduces the workload of the data center but also accelerates the average serving speed. Due to the benefits of using Fog/Edge Computing, many emergent applications are now available for individuals, business enterprises, and governments. However, with the emergence of these new applications, various security and privacy issues are also exposed. Many new security and privacy techniques have been developed and are adopted in the Fog/Edge Computing.
The main goal of this book is to collect the recent development of security, privacy, and applications in the Fog/Edge Computing. This book will be of
particular value to academics, researchers, practitioners, government officials, business organizations (e.g., executives, marketing professionals, resource managers, etc.), and even customers -- working, participating, or those interested in fields related to Fog Computing and Cloud Computing. The content of the book will be especially useful for students in areas like Internet of Things, Clouds, Distributed Systems, Computer Networks, Data Mining, and administrative sciences and management, but also applies to students of education, economy, or law, who would benefit from the information, cases, and examples therein.

Recommended Topics:
This book accepts contributions from various topics in the field of Edge/Fog Computing. The tentative list of topics is as follows:
1. Information and data management in fog/edge computing
2. Access control mechanisms in fog/edge computing
3. Key management in fog/edge computing
4. Identification management and fraud management in fog/edge computing
5. Intrusion Detection in fog/edge computing
6. Secure deployment strategy of fog/edge infrastructure
7. Digital forensics and Anti-forensics techniques
8. Vulnerabilities in heterogeneous fog/edge systems
9. Cyber-physics security fog/edge devices
10.Social engineering in fog/edge computing
11.Fault tolerance for fog/edge computing
12.Reliability/scalability-based scheduling and prediction
13.Trust and reputation for fog/edge computing
14.Pricing, billing, and incentives for fog/edge computing
15.Security/privacy-related evaluation approaches for fog/edge computing
16.Privacy-preserving techniques for fog/edge services
17.Privacy protection for fog/edge users
18.Security/privacy-related fog/edge monitoring infrastructures
19.New security/privacy models, architecture, and frameworks for fog/edge computing
20.Security/privacy in fog/edge communications: 3G/4G/5G, Wi-Fi, Ad-hoc, and Wi-MAX
21.Security and privacy for IoT-related fog/edge computing paradigm
22.Security and privacy for SDN-related fog/edge computing paradigm
23.Emerging Attacks: next generation of cyber hacking for fog/edge computing

Submission Procedure:
Academics, researchers, practitioners, and government officials are invited to submit a chapter proposal for this edited book entitled "Security & Privacy Issues in Fog/Edge Computing" to be published in Springer. All submissions must be original and should not be under review by another publication. All submitted chapters will be peer-reviewed. The book chapters should contain 20-25 pages of content as per the Springer format.

How to Submit:
Submission of proposal(s)/chapter(s) via e-mail only:
fogcomputingbook@gmail.com

Important Dates:
Proposal Submission: November 15th, 2019
Notification of Acceptance: December 15th, 2019
Full Chapter Submission: March 15th, 2020
Review results to authors: June 1st, 2020
Final chapter submission: July 1st, 2020

Inquiries:
wchang AT sju DOT edu
jiewu AT temple DOT edu

Related Resources

SEAS 2025   14th International Conference on Software Engineering and Applications
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
CSITEC 2025   11th International Conference on Computer Science, Information Technology
Intelligent Computing-Based Time Series 2025   Intelligent Computing: Special Issue: Intelligent Computing-Based Time Series Analysis for Cybersecurity
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
SPIE-Ei/Scopus-CMLDS 2025   2025 2nd International Conference on Computing, Machine Learning and Data Science (CMLDS 2025) -EI Compendex & Scopus
BIOSIG 2025   International Conference of the Biometrics Special Interest Group
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex