The 8th Annual International Conference on ICT: Big Data, Cloud and Security (ICT-BDCS) 2017 serves as a platform for industry professionals, academics, researchers, scientists, consultants and policy makers to interact and discuss various issues in big data, cloud computing and IT security. The event will commence on August 21 – 22, 2017 in Singapore and is organised by the Global Scientific and Technology Forum (GSTF).
Conference Theme
Big Data is a key enabler of exploring business insights and economics of services and is already making large impacts in finance, manufacturing, retail, and social networks. BDCS 2017’s include but not limited to: Big Data Architecture, Big Data Modeling, Big Data As A Service, Big Data for Vertical Industries (Government, Healthcare, etc.), Big Data Analytics, Big Data Toolkits, Big Data Open Platforms, Economic Analysis, Big Data for Enterprise Transformation, Big Data in Business Performance Management, Big Data for Business Model Innovations and Analytics, Big Data in Enterprise Management Models and Practices, Big Data in Government Management Models and Practices, and Big Data in Smart Planet Solutions.
Computing in its purest form has changed a lot of times. From the early stages of the mainframes where larger and more expensive, to smaller and more affordable personal computers and servers to a newer, emerging technology, cloud computing. It is an emerging research topic widely discussed within the community of distributed systems and Grid computing experts. It promises to vastly change how we use, manage and implement the computing systems both in the public and private sector. We are accepting papers with topics but not limited to new applications for clouds, mobile clouds, cloud management and configuration, cloud economics, core cloud services, cloud technologies and virtualization platforms.
In IT Security, we constantly hear information how hackers find new and scary ways to access – and misuse — privileged information for unscrupulous or questionable purposes. The conference hopes to address these concerns as you learn all about actual and important IT-Security trends, technologies and solutions to get real answers of your questions and practical benefits to meet today´s and tomorrow’s threats. Possible topics include, but are not limited to: access control, accountability, anonymity, authentication, critical infrastructure security, data and system integrity, database security, executable content, formal methods and verification, game theory and decision theory, hardware– based security, humans and computer security, intrusion detection, language-based security, network security, privacy, provenance, resource usage control, security for mobile computing, security models, security protocols, software security, socio-technical security, trust management, usable security and web security.
The conference seeks submissions from academia, government, and industry presenting novel research on all practical and theoretical aspects in the field of cloud computing, big data and IT security. It provides a key forum for researchers and industry practitioners to exchange information regarding advancements in the state of art and practice of these fields in today’s ubiquitous and virtual environment.
Keynote Speakers
- Prof. Benjamin W. Wah – Professor of Computer Science and Engineering, Chinese University of Hong Kong: “Using Kernels to Harness the Complexity of Big Data“
- Prof. Lynn Margaret Batten – Deakin Research Chair in Mathematics, School of Information Technology, Deakin University, Australia: “Robust Trust Assessment Model for the Selection of Trustworthy Cloud Services“
Workshops
Workshop on “Digital Business: Technologies and Transformation“
22 August
By Prof. Venky Shankararaman and Prof Swapna Gottipati – School of Information Systems, Singapore Management University
On completing this workshop, you will be able to: Evaluate the opportunities and challenges of different digital technologies namely, cloud computing, big data and analytics, mobile networks, social media, and the Internet of Things in driving transformation
Analyse digital transformation case studies to explain how an organization can:
- Digitally enhance operations
- Engage better with their customers
- Create a digital vision
- Govern their digital activities
Ideate how an existing organization can become digital and formulate a digital transformation strategy
Workshop on “Why Cyber Security is a Strategic Issue?“
By Prof. the Hon. Dr. Stephen Martin — Chairman, Bank of China (Australia), Former Speaker Parliament of Australia, Former Deputy Vice Chancellor (Strategy and Planning), Curtin University of Technology, Former Pro Vice Chancellor International, Victoria University, Australia
This workshop will provide businesses with detailed information on the strategic importance of cyber-security and highlight the critical need to maintain robust protection measures. Prof Martin will provide insights on what works from a strategic perspective, and discuss implications for the economy.
Highlights
- Conference Proceedings: All accepted and presented papers at the conference (ICT-BDCS 2017) will be published in the conference proceedings (Print ISSN: 2251 – 2136, E-periodical: 2251 – 2144).
- Journal on Computing: All authors who present their papers at the conference will be invited to submit an extended version of their research paper for the GSTF Journal on Computing (JoC) — Print ISSN: 2251 – 3043, E-periodical: 2010 – 2283. All submitted papers will go through a blind review process for acceptance and will be published without additional cost (digital).
- Best Paper Awards and Best Student Paper Awards will be conferred at the conference (in order to qualify for the award, the paper must be presented at the conference).
- Panel Proposals are invited for submission. A minimum of three papers centering on a specific topic will be accepted for submission under Panel Category.
Conference Topics
The topics of interest include, but are not limited to:
Big Data
- Architectures for Big Data
- Big Data & Bioinformatics
- Big Data & Security
- Big Data & Virtualization
- Big Data Analytics
- Big Data Economics
- Big Data Search
- Big Data Tools Landscape
- Federal Big Data
- Object Storage for Big Unstructured Data
- Predictive Analytics
- Rise of Database Sharing
- Scaling Big Data
Cloud Computing and Virtualization
- Cloud Computing Architectures
- Cloud Configuration, Performance, and Capacity Management
- Cloud Migration
- Cloud Resource Virtualization and Composition
- Cloud Software Patch and License Management
- Cloud Solution Design Patterns
- Cloud Workload Profiling and Deployment Control
- Economic, Business and ROI Models for Cloud Computing
- Green Cloud Computing
- High Performance Cloud Computing
- Infrastructure, Platform, Application, Business, Social, and Mobile Clouds
- Model Driven Cloud Computing
- Security, Privacy, and Compliance Management in Clouds
- Self-service Cloud Portal, Dashboard, and Analytics
- Service Level Agreement (SLA)
- Storage, Data, and Analytics Clouds
Cloud and Grid Security
- Design Tool for Cloud Computing
- Green Cloud Computing & Economics of the Cloud
- Monitoring, Management and Maintenance of Clouds
- Performance Improvements for Cloud Computing
- Programming Models and Systems/Tools
- Quality of Service (QoS) in Cloud Computing
- Security, Privacy and Cryptography in Clouds
- Service-Oriented Architecture and Cloud Computing
- Virtualization Trends & Challenges for Cloud Computing
Cryptography and Algorithms
- Analysis of Security Protocols
- Cryptographic Algorithms, Hash Functions
- Cryptographic Primitives and Security Protocols
- Digital Signatures
- Identity Management
- Key Distribution and Management
- Privacy, Anonymity and Traceability
- Provable Security
- Secure System Implementation
Multimedia Security
- Digital Rights Management
- Image, Audio and Video Encryption Mechanisms
- Intelligent Multimedia Security Services
- Multimedia Forensics
- Privacy and Security in Surveillance Videos
- Security of VOIP and multimedia
- Steganography and Digital Watermarking
Information and Network Security
- Access Controls and Security Mechanisms
- Business Continuity & Disaster Recovery Planning
- Cyber Security
- Database and System Security
- Firewalls
- Hacking and Defending
- High Performance Security Systems
- Insider Threats
- Internet Security & Applications
- Intrusion Detection and Prevention
- Malwares
- Model-driven security
- Network Monitoring
- Network Security Policies: Implementation and Management
- Physical Security
- SAN/NAS Security
- Secure Operating Systems
- Secure Routing and Network Management
- Security in Content Delivery Networks
- Security in High Speed Network
- Security in Optical Systems and Networks
- Web Security, Web Services and Enterprise Security
Security and Privacy Issues in Networks
- Ad Hoc Networks
- E-Governance and E-commerce
- Internet of Things
- Mobile Networks
- P2P Networks
- Satellite Networks
- Sensor Networks
- Social Networks
- VANET Networks
- Wireless Networks