SecureEdge 2017: Secure and Resource-Efficient Edge Computing 2017 Helsinki, Finland, August 21-23, 2017 |
Conference website | https://research.comnet.aalto.fi/CIT2017/index.html |
Submission deadline | May 15, 2017 |
Call for Papers
IEEE International Workshop on
“Secure and Resource-Efficient Edge Computing 2017" (SecureEdge 2017)
Organized in conjunction with the 17th IEEE International Conference on Computer and Information Technology (IEEE CIT-2017)
Helsinki, Finland, 21-23 August, 2017
https://research.comnet.aalto.fi/CIT2017/wssecureedge2017.html
Edge computing is one of the most recent approaches towards the extension of cloud computing capabilities to the edge of the network. It combines elements of Information Technology (IT) and telecommunication networking, hence extending cloud computing capabilities and IT services to the edge of cellular networks. This minimizes network congestion and also improves the overall performance of the network. The main idea of edge computing is bringing the cloud processing, storage and caching closer to the edge of the network as well as to the users. Other similar approaches are Cloudlets, Fog, Mobile Edge Computing (MEC), as well as their hybrids. Edge computing provides many advantages, such as improved QoS (lower latency, higher throughput), improved security and privacy, improved scalability and management through virtualization.
Furthermore, ubiquitous ultra-broadband, virtually zero latency and gigabit experience will be the key defining features of beyond 5G networks to enable new services. The extreme capacity and performance demands of future mobile networks will necessitate major changes in the way we produce and utilize digital services. Along with SDN (Software Defined Networks), NFV (Network Function Virtualization) concepts, enabling technologies such as cloud computing and edge computing become pertinent towards the evolution to future mobile networks. The heterogeneity of future mobile services and connected devises will lead to the challenge of holistic design of a robust edge computing system. Among them, security and resource efficiency are identified as key challenges in edge computing systems. The “Secure and Resource-Efficient Edge Computing 2017" (SecureEdge 2017) aims at crossroads between scientists, researchers, practitioners and students from diverse domains in edge computing research. The workshop aims at attracting contributions of secure and resource efficient design that can support existing and future applications.
Researchers are encouraged to submit original research contributions in all major areas, which include, but not limited to the List of Topics below.
Submission Guidelines
The submission Web page for SecureEdge2017 is https://easychair.org/conferences/?conf=secureedge2017
Papers submitted to SecureEdge2017 should be written in English conforming to the IEEE Conference Proceedings Format (8.5" x 11", Two-Column). The paper should be submitted through the EasyChair paper submission system at the Symposium website. The length of the papers should not exceed 6 pages + 2 pages for over length charges.
Accepted and presented papers will be included into the IEEE Conference Proceedings published by IEEE CS CPS and submitted to IEEE Xplore and CSDL. Authors of accepted papers, or at least one of them, are requested to register and present their work at the conference, otherwise their papers will be removed from the digital libraries of IEEE CS after the conference. Distinguished papers presented at the conference, after further revision, will be recommended to special issues of reputable SCI/EI-indexed journals.
Submitting a paper to SecureEdge2017 means that, if the paper is accepted, at least one author should attend the Workshop and present the paper.
List of Topics
- Theoretical analysis for edge computing systems
- Edge computing architectures and solution design patterns
- Virtualization for edge computing systems and networking
- Modeling and performance analysis for edge computing
- Service provisioning and migration in edge computing
- Multimedia service provisioning on edge computing
- Peer-to-Peer (P2P) in edge computing
- Mobile Edge Computing (MEC) and Fog Computing
- Edge computing for Internet of Things (IoT)
- Cognitive Edge computing and the Blockchain
- Virtual Private LAN Services in edge computing
- Mobile edge cloud system and network design
- Storage, data, and analytics for edge computing design and networking
- Software Defined Networking (SDN) for edge computing
- Network Function Virtualization (NFV) for edge computing
- Sensor Key Management Protocols
- Privacy-preserving data processing
- Identity-Defined Networking
- MEC security architectures for 5G Networks
- Security and privacy management for edge cloud systems
- Security Requirements and Security Principles in edge computing
- Authentication and access management in edge computing
- Edge computing Security Business and Technical Use cases
- Security Auditing and Security Monitoring
- Regulatory Impacts on Security
- Resilience, fault tolerance in edge computing
- Performance Optimization for edge computing applications
- Green edge computing systems and networking
- Scalability, performance, and load balance
- Real-time resource reporting and monitoring for edge computing management
- Quality of service on edge computing applications, including reliability, availability
- Validations and Testbed
- Surveys on edge computing systems
Important Dates
Paper submission deadline: 15 April, 2017 EXTENDED: 15 MAY, 2017
Internal Reviews to be completed: 15 May, 2017
Author notification: 10 June, 2017
Camera-ready and Registration: 18 June, 2017
Conference datas: 21-23 August, 2017
Committees
Workshop Chairs
- Chair: Mika Ylianttila, University of Oulu, Finland
- Co-Chair: Andrei Gurtov, Linkoping University, Sweden
Program Committee
- Mika Ylianttila, University of Oulu, Finland
- Andrei Gurtov, Linkoping University, Sweden
- Madhusanka Liyanage, University of Oulu, Finland
- Erkki Harjula, University of Oulu, Finland
Technical Program committee
-
Adrian Popescu, Blekinge Institute of Technology, Sweden
-
Alla Levina, ITMO University, Russia
-
An Braeken, Vrije Universiteit Brussel, Belgium
-
Anca Delia Jurcut, University College Dublin, Ireland
-
Antonio Manzalini, Telecom Italia, Italy
-
Ariel Stulman, Jerusalem College of Technology, Israel
-
Arsham Farshad, Lancaster University, UK
-
Björn Landfeldt, Lund University, Sweden
-
Chamitha De Alwis, University of Sri Jayewardenepura, Sri Lanka
-
Eryk Schiller, University of Bern, Switzerland
-
Esa Piri, Kaitotek Oy, Finland
-
Flavio Esposito, Saint Louis University, USA
-
Jan Janak, Columbia University, USA
-
Jyrki Huusko, VTT, Finland
-
Kanchana Thilakarathna, Data61, CSIRO, Australia
-
Karl Andersson, Luleå University of Technology, Sweden
-
Kimmo Halunen, VTT, Finland
-
Markus Fiedler, Blekinge Institute of Technology, Sweden
-
Martti Ylikoski, Nokia, Finland
-
Noel Crespi, Institut Mines-Télécom, France
-
Pardeep Kumar, Oxford University, UK
-
Reza Farakhbash, Institut Mines-Télécom, France
-
Stephan Sigg, Aalto University, Finland
-
Sorin Ifrim, Nokia, Finland
-
Suranga Seneviratne, Data61, CSIRO, Australia
-
Tang Qiang, Luxembourg institute of Science and Technology, Luxembourg
-
Tarik Taleb, Aalto University, Finland
-
Timo Hämäläinen, University of Jyväskylä, Finland
-
Truong Khoa Phan, University College London, UK
-
Yu Xiao, Aalto University, Finland
-
Zhonghong Ou, Beijing University of Posts and Telecommunications, China
-
Zhongliang Zhao, University of Bern, Switzerland
Contact
All questions about submissions should be emailed to mika.ylianttila@oulu.fi