In conjunction with the 9th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2018)
Leuven, Belgium on September 5-8, 2018
Jully 22, 2018: Papers Submission Due. (FINAL)
Fog computing is a paradigm that optimizes cloud computing systems to address network bottlenecks. Its characteristic lies in the fact that data processing such as analysis and knowledge generation are carried out at the periphery of the network, as close as possible to the original source. Network latency can therefore be improved. Communication bandwidth requirements between sensors and the data center can also be significantly reduced.
The new paradigm of fog computing allows resources and IT services to be allocated and controlled as closely as possible to users. Software distributions for various Applications can now be hosted on fog servers, for example, image processing software packages for image preprocessing in video surveillance applications. Operating systems and related services can be offered through onboard servers and fog nearby to reduce latency. Devices and equipment outsourcing, such as, servers, hardware, storage and networking.
Many new problems arise in enabling fog computing and services, creating a fertile ground for research and innovation.
In cloud/fog computing field, security and privacy threats have been extensively studied and received considerable attention in recent few years, as witnessed by the number of related publications. In the context of these trends, the forthcoming workshop on recent advances on Security and Privacy in Fog and Cloud Computing will address significant issues in the field.
The main goal of this special issue is to encourage both researchers and practitioners to share and exchange their experiences and recent studies with a particular emphasis on interdisciplinary approaches and novel techniques to increase the security posture of Cloud/fog computing. The overall objectives are:
TOPICS:
Topics to be discussed in this workshop include (but are not limited to) the following:
All submitted papers will be sent to reviewers for a blind review. The reviewers use the following in evaluating research papers: