| |||||||||||||||
IoT Cloud Platforms 2017 : Special session on: IoT Cloud Platforms - Trustworthiness, Analytics, and Applications | |||||||||||||||
Link: https://computing.derby.ac.uk/c/special-session-on-iot-cloud-platforms/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
AIMS AND SCOPE:
Internet of Things (IoT) are systems of billions of smart devices interconnected over a network and in many cases are cloud-managed. IoT is gaining wide attention from both academia and industry and can offer transformative solutions to serious difficulties faced by elderly populations, climate change, surveillance, healthcare, resource management, and many other mission critical applications. A typical lifecycle of an IoT application starts from data generation at the smart devices, data-streaming to the cloud for storage and analysis, and ending by feedback and data visualization. Many challenges can be addressed in each of the phases of the IoT management life cycle. Example of such challenges are: the heterogeneous nature of IoT device-formation and interrelated surroundings, the remote untrustworthy operational environment, vast amount of real-time information-rich data fusion, streaming, and analytics, context-aware intelligence, and pervasive privacy-sensitive sensing and actuating capabilities. The workshop session aims to bring together academic researchers and industry practitioners working towards solutions to address the aforementioned challenges. It is expected that the exchanged ideas on recent research and future directions opens the way for collaborative investigations towards new discoveries and extensive enhancement of the presented cutting edge technologies. Therefore, we accept research, industrial, and vision papers. Topics of interest include, but are not limited to: - Cloud infrastructure to support IoT - IoT data management in the cloud - Real time big data analysis - Managing streamed IoT data - IoT secure access control - IoT trustworthy data analytics - Privacy preserved operation and applications - Secure sensors, actuator technologies - IoT network and communication security - Confidentiality assurance mechanisms for IoT - Exploiting accelerators (e.g. FPGAs and GPUs), coprocessors, and new hardware for efficient analysis of data - Efficient data storage in the cloud - Trust management for IoT cooperative devices - Privacy and anonymization techniques in IoT - Secure cloud of things - Security of Big data in IoT - Hardware security primitives - IoT forensic analysis and biometrics in IoT - Secure IoT related applications and Cloud operation - Ethics and legal considerations in IoT - IoT design and implementation - IoT applications - IoT data visualization Organizing Committee: - Mohamed Azab, SRTA City, Egypt - Iman Elghandour, Alexandria University, Egypt - Virginia N. L. Franqueira, University of Derby. UK |
|