BigSecurity 2014 - The Second International Workshop on Security and Privacy in Big Data
Topics/Call fo Papers
The Second International Workshop on Security and Privacy in Big Data (BigSecurity 2014)
As we are deep into the Information Age, we witness the explosive growth of data available on the Internet. For example, human beings create about 2.5 quintillion bytes of data every day in 2012, which come from sensors, individual archives, social networks, Internet of Things, enterprise and Internet in all scales and formats. We face one of the most challenging issues, i.e., how to effectively manage such a large amount of data and identify new ways to analyze large amounts of data and unlock information. The issue is also known as Big Data, which has been emerging as a hot topic in Information and Communication Technologies (ICT) research.
Security and privacy issue is critical for Big Data. Many works have been carried out focusing on business, application and information processing level from big data, such as data mining and analysis. However, security and privacy issues in Big Data are seldom mentioned to date. Due to its extraordinary scale, security and privacy in Big Data faces many challenges, such as efficient encryption and decryption algorithms, encrypted information retrieval, attribute based encryption, attacks on availability, reliability and integrity of Big Data.
This workshop offers a timely venue for researchers and industry partners to present and discuss their latest results in security and privacy related work of Big Data.
The topics of interest include, but are not limited to:
Threat and Vulnerability Analysis in Big Data
Architecture for Security and Privacy in Big Data
Anonymous communication in Big Data
Physical Layer Security in Big Data
Privacy and Security in Cloud Data
Privacy and Security in Data Center Networks
Application Level Security and Privacy in Big Data
Attacks and Counter Measures in Big Data
Information Forensics in Big Data
Cross-layer Design for Security and Privacy in Big Data
Cryptanalysis, Lightweight Cryptographic Algorithms and Applications
Identity Management and Key Management Systems
Intrusion Detection and Response in Big Data
Security and Privacy in Complex Networks
Malware and virus detection in Big Data
Biometric security and forensics in Big Data
Reliability and Availability in Big Data
Network security in Big Data
Network privacy in Big Data
Trust in Big Data
Security and Privacy Theories in Big Data
Security, Privacy, and Trust in Cloud
Security, Privacy, and Trust in Large Scale Systems
As we are deep into the Information Age, we witness the explosive growth of data available on the Internet. For example, human beings create about 2.5 quintillion bytes of data every day in 2012, which come from sensors, individual archives, social networks, Internet of Things, enterprise and Internet in all scales and formats. We face one of the most challenging issues, i.e., how to effectively manage such a large amount of data and identify new ways to analyze large amounts of data and unlock information. The issue is also known as Big Data, which has been emerging as a hot topic in Information and Communication Technologies (ICT) research.
Security and privacy issue is critical for Big Data. Many works have been carried out focusing on business, application and information processing level from big data, such as data mining and analysis. However, security and privacy issues in Big Data are seldom mentioned to date. Due to its extraordinary scale, security and privacy in Big Data faces many challenges, such as efficient encryption and decryption algorithms, encrypted information retrieval, attribute based encryption, attacks on availability, reliability and integrity of Big Data.
This workshop offers a timely venue for researchers and industry partners to present and discuss their latest results in security and privacy related work of Big Data.
The topics of interest include, but are not limited to:
Threat and Vulnerability Analysis in Big Data
Architecture for Security and Privacy in Big Data
Anonymous communication in Big Data
Physical Layer Security in Big Data
Privacy and Security in Cloud Data
Privacy and Security in Data Center Networks
Application Level Security and Privacy in Big Data
Attacks and Counter Measures in Big Data
Information Forensics in Big Data
Cross-layer Design for Security and Privacy in Big Data
Cryptanalysis, Lightweight Cryptographic Algorithms and Applications
Identity Management and Key Management Systems
Intrusion Detection and Response in Big Data
Security and Privacy in Complex Networks
Malware and virus detection in Big Data
Biometric security and forensics in Big Data
Reliability and Availability in Big Data
Network security in Big Data
Network privacy in Big Data
Trust in Big Data
Security and Privacy Theories in Big Data
Security, Privacy, and Trust in Cloud
Security, Privacy, and Trust in Large Scale Systems
Other CFPs
Last modified: 2013-11-05 22:13:37