posted by user: viv || 8591 views || tracked by 9 users: [display]

IoT Cloud Platforms 2017 : Special session on: IoT Cloud Platforms - Trustworthiness, Analytics, and Applications

FacebookTwitterLinkedInGoogle

Link: https://computing.derby.ac.uk/c/special-session-on-iot-cloud-platforms/
 
When Dec 5, 2017 - Dec 8, 2017
Where Austin, Texas, USA
Submission Deadline Aug 15, 2017
Notification Due Sep 8, 2017
Final Version Due Sep 30, 2017
Categories    IOT   cloud computing   security   forensics
 

Call For Papers

AIMS AND SCOPE:

Internet of Things (IoT) are systems of billions of smart devices interconnected over a network and in many cases are cloud-managed. IoT is gaining wide attention from both academia and industry and can offer transformative solutions to serious difficulties faced by elderly populations, climate change, surveillance, healthcare, resource management, and many other mission critical applications. A typical lifecycle of an IoT application starts from data generation at the smart devices, data-streaming to the cloud for storage and analysis, and ending by feedback and data visualization. Many challenges can be addressed in each of the phases of the IoT management life cycle. Example of such challenges are: the heterogeneous nature of IoT device-formation and interrelated surroundings, the remote untrustworthy operational environment, vast amount of real-time information-rich data fusion, streaming, and analytics, context-aware intelligence, and pervasive privacy-sensitive sensing and actuating capabilities.


The workshop session aims to bring together academic researchers and industry practitioners working towards solutions to address the aforementioned challenges. It is expected that the exchanged ideas on recent research and future directions opens the way for collaborative investigations towards new discoveries and extensive enhancement of the presented cutting edge technologies. Therefore, we accept research, industrial, and vision papers.


Topics of interest include, but are not limited to: 

- Cloud infrastructure to support IoT
- IoT data management in the cloud
- Real time big data analysis
- Managing streamed IoT data
- IoT secure access control
- IoT trustworthy data analytics
- Privacy preserved operation and applications
- Secure sensors, actuator technologies
- IoT network and communication security
- Confidentiality assurance mechanisms for IoT
- Exploiting accelerators (e.g. FPGAs and GPUs), coprocessors, and new hardware for efficient analysis of data
- Efficient data storage in the cloud
- Trust management for IoT cooperative devices
- Privacy and anonymization techniques in IoT
- Secure cloud of things
- Security of Big data in IoT
- Hardware security primitives
- IoT forensic analysis and biometrics in IoT
- Secure IoT related applications and Cloud operation
- Ethics and legal considerations in IoT
- IoT design and implementation
- IoT applications
- IoT data visualization

Organizing Committee: 

- Mohamed Azab, SRTA City, Egypt
- Iman Elghandour, Alexandria University, Egypt
- Virginia N. L. Franqueira, University of Derby. UK

Related Resources

IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
CETA--EI 2025   2025 4th International Conference on Computer Engineering, Technologies and Applications (CETA 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IoTI5 2025   7th International Workshop on IoT Applications and Industry 5.0
NLAIM 2025   2nd International Conference on NLP, Artificial Intelligence, Machine Learning and Applications
ccpi 2025   16th International Workshop on Cloud-Edge Continuum Projects and Initiatives (CCPI)
Signal 2025   12th International Conference on Signal and Image Processing
Integrating Embodied Intelligence and Io 2025   Intelligent Computing: Special Issue: Advanced Intelligent Computation for Integrating Embodied Intelligence and IoT Systems
ICSEA 2025   The Twentieth International Conference on Software Engineering Advances
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)