Overview
In recent years, the analyses on big data have been vigorously requested and performed everywhere in the world. But due to security reasons, the relationship among data is often hidden or removed. For example, owing to suppressing the ID of a patient, the associations of different disease records belonging to this patient is also lost. How to develop a security mechanism to keep both the relationship and the ID of a patient is an engineering challenge. On the other hand, Internet of Things (IoT) has been one of the hot research topics in computer industries and studies. It attempts to connect all network objects together so that they are all Internet accessible. But this also causes serious security problem since hackers can then attack these objects through the connections. Furthermore, due to the increase in number of mobile, ubiquitous, cloud, network and communication applications & studies, the required security mechanisms and pivotal challenges include integrity verification, authentication, access control, attack prevention, etc., also rise. In fact, security technologies are booming right now. However, to achieve the whole security target for above-mentioned Computing and technologies, it requires much more than the mere applications of current core technologies. The main purpose of this workshop is to bring together the researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of Security Technology in big data and its analyses, IoT, Mobile Commerce, Cloud Computing, Network and Communication, especially aiming to promote state-of-the-art research in these areas.
Topics
Authors are solicited to contribute to the workshop by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas of Big Data, IoT, Mobile Commerce, Cloud Computing, Network, Communication and their Securities (MCNCS), but are not limited to:
- Big Data and its Analyses
- IoT and its Security
- Network Mobility and its Security
- Mobile Agent and its Security
- Cloud and its Security
- RFID and its Security
- Network Handover and its Security
- VoIP and its Security
- Mobile, Ad Hoc and Sensor Network and their Security
- 3G/4G/5G Communication and their Security
- Motion Detection and Tracing
- Access Control, Authentication and Authorization for MCNCS
- Cryptography, Cryptanalysis and Digital Signatures for MCNCS
- Key Management and Recovery for MCNCS
- Trust Negotiation, Establishment and Management for MCNCS
- Network Management for MCNCS
- Performance Evaluation for MCNCS
- Privacy, Data Integrity and Data Protection for MCNCS
- Computer Forensics for MCNCS
- Security Threats and Countermeasures for MCNCS
- Cross-layer Design for MCNCS