征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

Fog computing is a paradigm that optimizes cloud computing systems to address network bottlenecks. Its characteristic lies in the fact that data processing such as analysis and knowledge generation are carried out at the periphery of the network, as close as possible to the original source. Network latency can therefore be improved. Communication bandwidth requirements between sensors and the data center can also be significantly reduced.

The new paradigm of fog computing allows resources and IT services to be allocated and controlled as closely as possible to users. Software distributions for various Applications can now be hosted on fog servers, for example, image processing software packages for image preprocessing in video surveillance applications. Operating systems and related services can be offered through onboard servers and fog nearby to reduce latency. Devices and equipment outsourcing, such as, servers, hardware, storage and networking.

Many new problems arise in enabling fog computing and services, creating a fertile ground for research and innovation.

In cloud/fog computing field, security and privacy threats have been extensively studied and received considerable attention in recent few years, as witnessed by the number of related publications. In the context of these trends, the forthcoming workshop on recent advances on Security and Privacy in Fog and Cloud Computing will address significant issues in the field.

The main goal of this special issue is to encourage both researchers and practitioners to share and exchange their experiences and recent studies with a particular emphasis on interdisciplinary approaches and novel techniques to increase the security posture of Cloud/fog computing. The overall objectives are:

  • To analyze and present the state-of-the-art of the Security and privacy for Cloud and fog Computing and related technologies and methodologies.
  • To highlight and discuss the recent development and emerging trends related to Security and privacy for Cloud/fog computing.
  • To propose new models, practical solutions and technological advances related to Security and privacy for Cloud/fog computing.
  • Discusses new Security and privacy models, prototypes and protocols for the Cloud/fog computing.
组委会
  • Abdellah Ezzati, FST, Univ Hassan 1, Morocco

  • Abderrahim Beni-hssane, FS, Univ Chouaib Doukkali, Morocco

  • Mostafa Saadi, ENSA-K, Univ Hassan 1, Morocco

  • Yassine Maleh, FST, Univ Hassan 1, Morocco

  • Khalid El Makkaoui, FST, Univ Hassan 1, Morocco

General Chairs

  • Abdellah EZZATI, FST, Univ Hassan 1, Settat Morocco.

  • Abderrahim BENI-HSSANE, FS, Univ Chouaib Doukkali, Eljadida, Morocco.

Scientific committee

  • Abdelkrim Haqiq, FST, Univ Hassan 1, Settat, Morocco.

  • Abdellah EZZATI, FST, Univ Hassan 1, Settat, Morocco.

  • Abdelmajid EL MOUTAOUAKKIL, FS, Univ Chouaib Doukkali, Morocco

  • Abdelmajid Hajami, FST, Univ Hassan 1, Settat, Morocco.

  • Abderrahim Beni-Hssane, FS, Univ Chouaib Doukkali, Eljadida, Morocco.

  • Abderrahim Marzouk, FST, Univ Hassan 1, Settat, Morocco.

  • Ahmed Fahli, Univ Hassan 1, Settat, Morocco.

  • Anilkumar Chunduru, VIT University VELLORE, India.

  • Antonio J. Jara, University of Applied Sciences Western, Switzerland.

  • Aromeh Junior Gabriel, The Federal University of Technology, Akure, Nigeria.

  • Aymen Akremi, Umm Al-Qura University, Kingdom Saudi Arabia.

  • Biju Issac, Teesside University, UK.

  • Brice Augustin, University of Paris-Est Creteil – UPEC, France

  • Dakshina Ranjan Kisku, National Institute of Technology (NIT) Durgapur, India.

  • Edgar SWeippl, SBA Research, Austria.

  • Elhadi M. Shakshuki, JSCS Acadia University Wolfville, NS Canada.

  • Gnanajeyaraman Rajaram, SBM College of Engineering, India.

  • Homero Toral Cruz, University of Quintana Roo, Mexico

  • Hossain Shahriar, Kennesaw State University, USA.

  • Imed Romdhani, Edinburgh Napier University, UK.

  • Jean-Marie BONNIN, Institut Mines Télécom / IMT Atlantique - Inria/IRISA, France.

  • Kam Pui Chow, The University of Hong Kong, China.

  • Kevin Curran, University of Ulster, UK.

  • Mohamed Amine Ferrag, Guelma University, Algeria.

  • Mohamed Amnai, ENSA Khouribga, Univ Hassan 1, Morocco

  • Mohamed BAKHOUYA, International University of Rabat, Morocco.

  • Mostafa Saadi, ENSA Khouribga, Univ Hassan 1, Morocco.

  • Moulay Driss EL OUADGHIRI, My Ismail University - Meknes, Morocco.

  • Moulay Lahcen HASNAOUI, ESTM, Univ Moulay Ismail (UMI), Morocco

  • Nitin Jain, DELHI TECHNOLOGICAL UNIVERSITY, India.

  • Omar BOUTKHOUM, Univ Cadi Ayad, Morocco

  • Rafigul Islam, Charles Sturt University, Australia.

  • Said Ben alla , EST-B, Univ Hassan 1, Morocco.

  • Said Benkirane, High School of Technology, Cadi Ayyad University, Morocco

  • Salim BITAM, University of Biskra, Algeria

  • Tayeb Sadiki, UIR, Morocco

  • Teddy MANTORO, USBI-Sampoema University, Indonesia

  • Yacine Sam, Tours University, France.

  • Yang Yang, Institute of Automation Chinese Academy of Sciences, China.

  • Yassine Maleh , FST, Univ Hassan 1, Settat, Morocco.

  • Yudi Prayudi, Universitas Gadjah Mada, Indonesia

征稿信息

重要日期

2018-07-02
初稿截稿日期
2018-08-08
初稿录用日期
2018-09-08
终稿截稿日期

Topics to be discussed in this Workshop include (but are not limited to) the following:

  • Authentication in cloud/fog computing
  • Information management incloud/fog computing
  • Auditing and accountability in cloud/fog computing
  • Access control mechanisms in cloud/fog computing
  • Security models and frameworks for cloud/fog applications
  • Key management in cloud/fog computing
  • Privacy preserving in cloud/fog computing
  • Privacy enhanced technologies for cloud/fog applications
  • Data confidentiality in cloud/fog devices
  • Security and privacy in SDN/NFV Networks
  • Intrusion Detection & Prevention in cloud/fog computing
  • Security and privacy in Internet of Things (IoT)
  • Cyber physical security of cloud/fog devices

作者指南

Submission instructions

Prospective authors are invited to submit original papers in standard format (MS Word Template, Latex) describing new theoretical and/or experimental research.

Submissions are recommended to have no more than 6 pages (extra pages are subject to surcharge), including figures, tables, and references.

Submissions will be judged on originality, significance, interest, clarity, relevance, correctness, and presentation.

The authors of the best papers will be invited to adapt their papers for a publication in International Journals.

The full papers should be submitted in PDF format via using SPFC2-18 EasyChair online submission system

If you face problems with paper submission, please feel free to contact the editor at: saadi_mo@yahoo.fr / spfc2@easychair.org

The following instructions should be respected

  • Authors should make sure that the English of their papers meets the required standard. All contributions should be original and not published elsewhere or intended to be published during the review period.
  • Submitted papers should be in the scope of the workshop
  • All accepted papers must be presented in  English  by one of the authors who must register for the workshop and pay the fee.
  • The quality of figures, photos and tables is also a very important requirement for this publication.
留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    11月05日

    2018

    11月08日

    2018

  • 07月02日 2018

    初稿截稿日期

  • 08月08日 2018

    初稿录用通知日期

  • 09月08日 2018

    终稿截稿日期

  • 11月08日 2018

    注册截止日期

移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询