IEEE International Conference on Computer Communications
15-19 April 2018 // Honolulu, HI // USA

Workshop on BigSecurity: Security and Privacy in Big Data - Program

The sixth International Workshop on Security and Privacy in Big Data

(BigSecurity 2018)

 

Monday, April 16, 2018 ● 8:00 – 17:30 ●Lehua Suite

 

As we are deep into the Information Age, we also witness the explosive growth of data available on the Internet. Now we are face a fundamental challenge of Big Data, which has been emerging as a hot topic in Information and Communication Technologies (ICT) research. Many works have been carried out focusing on business, application and information processing level from big data, such as data mining and analysis.  However, security and privacy issues in Big Data have not been extensively explored to date. Due to its extraordinary scale, security and privacy in Big Data faces many challenges, such as efficient encryption and decryption algorithms, encrypted information retrieval, attribute based encryption, attacks on availability, reliability and integrity of Big Data. The purpose of this workshop is to offer a timely venue for researchers and industry partners to present and discuss their latest results in security and privacy related work of Big Data.

General Co-chairs
Nirwan Ansari (New Jersey Institute of Technology, USA)
Chonggang Wang (InterDigital Communications, USA)

Technical Program Co-chairs
Shui Yu (Deakin University, Australia)
Ke Liu (National Natural Science Foundation of China, China)

___________________________________________________________________________________________________________________________

 

S1: Big Data Security, 8:00-10:00

Chair: Laurent L. Njilla (Air Force Research Lab, USA)

Compromised Secrecy Region with Friendly Jamming in Heterogeneous Network
Shiwei Yan, Yong Shang, Yanbo Huang and Xiaobo Li (Peking University, P.R. China)
 
A Stochastic Game Approach to Cyber-Physical Security with Applications to Smart Grid
Yuanxiong Guo and Yanmin Gong (Oklahoma State University, USA); Laurent Njilla (Air Force Research Laboratory, USA); Charles A Kamhoua (US Army Research Laboratory & Network Science Division, USA)
 
Data Security Storage Model for Fog Computing in Large-Scale IoT Application
Shuqing He and Bo Cheng (Beijing University of Posts & Telecommunications, P.R. China); Haifeng Wang, Xuelian Xiao and Yunpeng Cao (Linyi University, P.R. China); Junliang Chen (Beijing University of Posts and Telecommunications, Taiwan)
 
An Improved Scheme for Outsourced Computation Based on ABE
Haining Yang (School of Mathematics, Shandong University, P.R. China); Jing Qin (Shandong University, P.R. China); Jixin Ma (University of Greenwich, United Kingdom (Great Britain))
 
Hybrid Malware Detection for Big Data on Cloud
Alessandra De Paola, Salvatore Gaglio, Giuseppe Lo Re and Marco Morana (University of Palermo, Italy)
 
Deep Learning-based Online Counterfeit-seller Detection
Pak Ming Cheung (The Hong kong University of Science and Technology, Hong Kong); James She (Hong Kong University of Science and Technology, Hong Kong); Lufi Liu (HKUST-NIE Social Media Lab., Hong Kong)

 

10:00-10:30: Coffee Break

 

10:30-12:00

S2: Keynote 1
Chair: Shui Yu (Deakin University, Australia)

Title: Learning Towards Better Privacy
Speaker: Professor Baochun Li, University of Toronto, Canada

 

12:00-13:30: Lunch

 

13:30-15:00

S3: Keynote 2, 13:30-15:00
Chair: Shui Yu (Deakin University, Australia)

Title: Attributing Pictures to Smartphones via Camera Fingerprinting
Speaker: Kui Ren (Zhejiang University, China)

 

15:00-15:30: Coffee Break

 

15:30-17:30

S4: Big Data Privacy
Chair: Ruidong Li (NICT, Japan)

Towards Practical Personalized Recommendation with Multi-level Differential Privacy Controls
Guowen Xu and Hongwei Li (University of Electronic Science and Technology of China, P.R. China); Wenlei Wang and Yue Chen (CNCERT/CC, P.R. China); Haomiao Yang and Yanzhi Ren (University of Electronic Science and Technology of China, P.R. China)
 
Uncovering Hidden Social Relationships Through Location-Based Services: The Happn Case Study
Adriano Di Luzio, Alessandro Mei and Julinda Stefa (Sapienza University of Rome, Italy)
 
Trustworthy Caching for Mobile Social Big Data with Edge Computing
Qichao Xu, Zhou Su and Minghui Dai (Shanghai University, P.R. China)
 
Efficient Privacy-Preserving Motion Detection for HEVC Compressed Video in Cloud Video Surveillance
Xiaojing Ma and Tao Zhang (Huazhong University of Science and Technology, P.R. China); Bin Zhu (Microsoft Research Asia, P.R. China); Sixing Cao and Hai Jin (Huazhong University of Science and Technology, P.R. China); Deqing Zou (Huazhong University of Science andTechnology, P.R. China)
 
A Multi-source Feedback based Trust Calculation Mechanism for Edge Computing
Jie Yuan and Li Xiaoyong (Beijing University of Posts and Telecommunications, P.R. China)
 
Secure In-Network Big Data Provision with Suspension Chain Model
Ruidong Li and Hitoshi Asaeda (National Institute of Information and Communications Technology (NICT), Japan)