THE FIRST INTERNATIONAL WORKSHOP ON SECURE MOBILE CLOUD COMPUTING (IWoSeMC-20)

In conjunction with 


The 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing

May 11-14, 2020, Melbourne, Victoria, Australia

Cloud computing is recognized as a cost-effective paradigm in outsourcing infrastructure, platforms and software. The problems related to privacy and security are still challenging especially in mobile cloud systems. Cloud end-users are now using mobile systems for applications that fall under the data intensive paradigm, such as Skyline queries, streaming information relays, and crowd sourced disaster management. However, the above paradigm shift has opened newer research directions in security, data interoperability, sustainable software development and many other areas.

This workshop primarily encompasses practical approaches that advance research in all aspects of handling large amounts of data in a secure manner in the cloud, mobile nodes and cloud connected Edge clusters such as in MANETs and Wireless Sensor Networks. Successful contributions may range from advanced technologies, applications and innovative solutions for secure clouds, to development of methods, conceptual and theoretical models related to secure management, monitoring, scheduling and resource allocation.

Recommended topic areas include, but are not limited to:

  • Mobile systems for security-aware data gathering and assimilation
  • Mobile edge and fog secure models and infrastructures
  • Mobile secure multi-agent systems
  • Machine learning – based models and simulators of mobile clouds
  • Advanced security and privacy mechanisms in smart phones and tablets
  • Scalable identity and authentication protocols in mobile systems
  • Security aware resource allocation and scheduling in mobile networks
  • Secure communication in Smart Grid installations using Mobile Ad Hoc Network protocols
  • Wireless Sensor Node applications for Smart Grid
  • Secure 5G applications for Smart Grid
  • Economical models in secure mobile networks
  • Secure mobile network applications