The 4th IEEE International Conference on Big Data Security on Cloud

BigDataSecurity 2018


Computer Security & Cryptography Security & Trust & Testing



Current continuously increasing demands of cloud computing and relevant network-based techniques have driven a dramatical growth of the implementations of data mining, smart data, artifical intelligence, and data analysis in multiple domains. Security and privacy issues in big data have become a great concern due to the interconnecting environment. IEEE BigDataSecurity 2018 addresses this domain and aims to gather recent academic achievements in this field.
Moreover, cloud computing is the second concentration of IEEE BigDataSecurity 2018. The emerging mechanism of cloud computing has provided a variety of novel approaches addressing the solutions of big data. The new methods deriving from cloud computing have covered distinct dimensions, such as edge/fog computing, energy consumptions, high performance, and heterogeneous resources, cloud models, heterogeneous architecture, tele-health, resource allocation, load balance, multimedia, and QoS, etc.
Novel big data model
Big data security issues in cloud computing
Big data privacy in cloud computing
Big data storage, integration, service, mining
Big data security applications
Cyber hacking, next generation fire wall
Cyber monitoring, incident response
Database security, data center security
Social engineering, insider threats, advance spear phishing
Cyber threat intelligence
Security and fault tolerance for embedded or ubiquitous systems
Tele-health security in cloud computing
Sensor network security in cloud computing
Security policy and legal considerations
Cloud and networking security
Cloud computing and networking models
Virtualization for big data on cloud
MapReduce with cloud for big data processing
Heterogeneous architecture for cloud computing
Dynamic resource sharing algorithm for cloud computing
Load balance for cloud computing
Mobile cloud computing
Mobile commerce security and privacy
Green cloud computing
Embedded networks and sensor network optimizations
Cyber Security in emergent technologies