| |||||||||||||||
IEEE EdgeCom 2019 : The 5th IEEE International Conference on Edge Computing and Scalable Cloud | |||||||||||||||
Link: http://www.cloud-conf.net/cscloud/2019/ssc/index.html | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The increasing amount of digital devices and corresponding computing capacity needs have enabled a great improvement in digital era. Heterogeneous network connects billions of digital devices, smart machines, industrial equipments, etc., and generates an unprecedented volume of data. It is not practical to consume too much network bandwidth and introduce latency to transfer the large amount of generated data from digital devices edge to a central data server. In order to solve this issue, edge computing has been proposed to connect various kinds of digital devices and the central data server. As a crucial technical trend, edge computing and the corresponding scalable computing technology are considered as an important concept of cloud computing implementations. Gathering contemporary research achievements in the field is remarkably significant for the research.
Topics of particular interest include, but are not limited to: - Edge computing in IoT - Security and fault tolerance for embedded or ubiquitous systems - Cloud users’ privacy information protection - Critical issues and solutions of Cyber security in tele-health - Cyber security in mobile embedded systems - New paradigms in cyber security - Emerging attack methods - Digital forensics and privacy issues in cloud computing - Cyber monitoring approaches - Big data security strategy - Big data security issues in social networks - Social engineering, insider threats, advance spear phishing - New security cloud computing model, framework, and application - Heterogeneous clouds and vulnerabilities - Secure methods for heterogeneous cloud resource sharing - Green cloud computing mechanisms - Cloud-based audio/video streaming techniques - Quality of Service (QoS) improvements techniques - Case studies for cyber security applications - Cloud-based real-time multimedia techniques - New attack methods and applications - Green cloud computing - Quality of Service (QoS) improvements techniques - Case studies for various applications - Cloud-based sensor network and security issues |
|