Special Session on Security and Privacy in Internet of Things, Services and People (SP-IoTSP)
In the envisaged Future Internet which consists of billions of digital devices, people, services and other physical objects, people will utilize these digital devices and physical objects to exchange data about themselves and their perceived surrounding environments over a web-based service infrastructure, in what we refer to as the Internet of Things, Services, and People (IoTSP). Interconnecting things, services and people via the internet improves data analysis, boosts productivity, enhances reliability, saves energy and costs, and generates new revenue opportunities through innovative business models. However, because of the heterogeneous nature of the IoTSP, more connected devices mean more attack vectors and more possibilities for hackers to target it. The frightening vulnerabilities found on IoT devices have brought IoTSP security and privacy further up the stack of issues that need to be addressed quickly. The IoTSP requires a very strong foundation with security, trust and privacy as a top priority. Without effective solutions for securing IoTSP-related data, qualified services with security and privacy concern and enhanced user acceptance and experience cannot be achieved.
The proposed special session on security and privacy in Internet of Things, Services and People (SP-IoTSP) aims to bring academia researchers as well as industry partners to meet together and exchange ideas on recent research and future directions for IoTSP security and privacy. The cutting edge results and innovative solutions will be presented with a specific focus on the safety, reliability, cyber security and data privacy challenges in IoTSP, including usable and theoretical security and privacy for software, algorithms, protocols, systems and infrastructure.
The technical topics of interest to the special issue include, but are not limited to:
- IoTSP secure network infrastructure
- IoTSP security protocols
- Authentication and identification technologies and solutions
- Threat landscapes and potential countermeasures and technologies
- Cyber attacks detection and prevention
- Risk analysis, mitigation, and management
- Intrusion and Malware Detection
- Applied Cryptography and lightweight security solutions
- Reliable Interactions with Network Services
- System and Data Integrity
- Security of Big data in IoTSP
- Identity Management and biometrics in IoTSP
- Trustworthiness in IoTSP
- Privacy and anonymization techniques in IoTSP
- Adaptive Security in IoTSP
- Privacy, policy and legal issues as well as their interaction with technological development in IoTSP
Session Chair: Lei Shu
Co-Chairs: Biao Song, Yuan Tian
Name: Lei Shu, Prof., Ph.D
Address: Guangdong University of Petrochemical Technology, China /University of Lincoln, UK
Email: email@example.com, firstname.lastname@example.org
Biography: Lei Shu is a “Lincoln Professor” of University of Lincoln, UK and a Distinguished Professor in Guangdong University of Petrochemical Technology, China. He is also the executive director of Guangdong Provincial Key Laboratory of Petrochemical Equipment Fault Diagnosis, China. He has published over 300 papers in related conferences, journals, and books in the area of sensor networks. He has been serving as Editor-in-Chief for EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, and associate editors for IEEE Systems Journal, IEEE Access, etc. He has served as more than 50 various Co-Chair for international conferences/workshops, e.g., IWCMC, ICC, ISCC, ICNC, Chinacom, especially Symposium Co-Chair for IWCMC 2012, ICC 2012, General Co-Chair for Chinacom 2014, Qshine 2015, Collaboratecom 2017, Mobiquitous2018, Steering and TPC Chair for InisCom 2015; TPC members of more than 150 conferences, e.g., ICDCS, DCOSS, MASS, ICC, Globecom, ICCCN, WCNC, ISCC.
Name: Biao Song, Ph.D
Address: Dept. Information System, King Saud University, Riyadh, KSA
Biography: Song Biao received his Ph.D. degree in Computer Engineering from Kyung Hee University, South Korea in 2012. Currently he is with King Saud University, Kingdom of Saudi Arabia as Assistant Professor, in College of Computer and Information Science. His current research interests are security，Cloud computing, remote display technologies and dynamic VM resource allocation.
Name: Yuan Tian, Ph.D
Address: Dept. Computer Science, King Saud University, P.O. Box 51178, Riyadh 11543, KSA
Biography: Yuan Tian has received her master and Ph.D degree from KyungHee University and she is currently working as Assistant Professor at College of Computer and Information Sciences, King Saud University, Kingdom of Saudi Arabia. She is member of technical committees of several international conferences. In addition, she is an active reviewer of many international journals. Her research interests are broadly divided into privacy and security, which are related to cloud computing, bioinformatics, multimedia, cryptograph, smart environment, and big data.
Process for Reviewing and Selecting Papers
We will distribute the received submissions to our colleagues who are expert in these fields for peer review. Only high quality papers will be accepted.
How the Session will be Advertised
We will announce the call for paper via DB world to the public, and share the news with our colleagues, students, familiar researchers, and our collaborated research group abroad through Email, poster, and meeting.