International Workshop on Security and Privacy in Fog and Cloud Computing

International Workshop on Security and Privacy in Fog and Cloud Computing (SPFC2-2018)

In conjunction with the 9th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2018)

Leuven, Belgium on September 5-8, 2018

Jully 22, 2018: Papers Submission Due. (FINAL)


Fog computing is a paradigm that optimizes cloud computing systems to address network bottlenecks. Its characteristic lies in the fact that data processing such as analysis and knowledge generation are carried out at the periphery of the network, as close as possible to the original source. Network latency can therefore be improved. Communication bandwidth requirements between sensors and the data center can also be significantly reduced.

The new paradigm of fog computing allows resources and IT services to be allocated and controlled as closely as possible to users. Software distributions for various Applications can now be hosted on fog servers, for example, image processing software packages for image preprocessing in video surveillance applications. Operating systems and related services can be offered through onboard servers and fog nearby to reduce latency. Devices and equipment outsourcing, such as, servers, hardware, storage and networking.

Many new problems arise in enabling fog computing and services, creating a fertile ground for research and innovation.


In cloud/fog computing field, security and privacy threats have been extensively studied and received considerable attention in recent few years, as witnessed by the number of related publications. In the context of these trends, the forthcoming workshop on recent advances on Security and Privacy in Fog and Cloud Computing will address significant issues in the field.

The main goal of this special issue is to encourage both researchers and practitioners to share and exchange their experiences and recent studies with a particular emphasis on interdisciplinary approaches and novel techniques to increase the security posture of Cloud/fog computing. The overall objectives are:

    • To analyze and present the state-of-the-art of the Security and privacy for Cloud and fog Computing and related technologies and methodologies.
    • To highlight and discuss the recent development and emerging trends related to Security and privacy for Cloud/fog computing.
    • To propose new models, practical solutions and technological advances related to Security and privacy for Cloud/fog computing.
    • Discusses new Security and privacy models, prototypes and protocols for the Cloud/fog computing.

TOPICS:

Topics to be discussed in this workshop include (but are not limited to) the following:

        • Authentication in cloud/fog computing
        • Information management incloud/fog computing
        • Auditing and accountability in cloud/fog computing
        • Access control mechanisms in cloud/fog computing
        • Security models and frameworks for cloud/fog applications
        • Key management in cloud/fog computing
        • Privacy preserving in cloud/fog computing
        • Privacy enhanced technologies for cloud/fog applications
        • Data confidentiality in cloud/fog devices
        • Security and privacy in SDN/NFV Networks
        • Intrusion Detection & Prevention in cloud/fog computing
        • Security and privacy in Internet of Things (IoT)
        • Cyber physical security of cloud/fog devices
        • ...


All submitted papers will be sent to reviewers for a blind review. The reviewers use the following in evaluating research papers:

  • Novel Contribution
  • Originality in Thought
  • Key Strengths
  • Key Weaknesses
  • Areas of Improvement
  • Presentation/Organization of Research