IEEE SocialSec 2016

Shangri-La's Fijian Resort and Spa, Fiji
7-10 December 2016

Welcome to Fiji

Social Networks and Big Data have pervaded all aspects of our daily lives. With their unparalleled popularity, social networks have evolved from the platforms for social communication and news dissemination, to indispensable tools for professional networking, social recommendations, marketing, and online content distribution. Social Networks, together with other activities, produce Big Data that is beyond the ability of commonly used computer software and hardware tools to capture, manage, and process within a tolerable elapsed time.

Due to their scale, complexity and heterogeneity, a number of technical and social challenges in Social Networks and Big Data must be addressed. It has been widely recognised that security and privacy are the critical issues. On one hand, Social Networks and Big Data have been an effective platform for the attackers to launch attacks and distribute malicious information. On the other hand, privacy leakage through Social Networks and Big Data has become common exercise. Following the success of the first event, the aim of the 2nd IEEE International Symposium on Security and Privacy in Social Networks and Big Data (IEEE SocialSec 2016) is to provide a leading edge forum to foster interactions between researchers and developers with the security and privacy communities in Social Networks and Big Data, and to give attendees an opportunity to interact with experts in academia, industry, and governments.

IEEE SocialSec 2016 will be held at Shangri-La's Fijian Resort and Spa, Yanuca Island, Fiji on 7-10 December 2016. It will be co-located with the 6th International Symposium on Cloud and Service Computing (SC2-2016), the 3rd International Conference on Internet of Vehicles (IOV 2016), and 16th International Conference on Computer and Information Technology (CIT 2016). Get ready to enjoy a unique trip in an wonderful island in this Globe.

Important Dates

Paper Submission Due30 September 2016 Final Extension
Author Notification20 October 2016
Camera-ready Paper Due30 October 2016
Registration Due30 October 2016
Symposium Date7-10 December 2016

Call For Papers in TXT

Keynote Speeches


Robust Allocation of Resources to Enhance System Performance

Professor H. J. Siegel
Department of Electrical and Computer Engineering and
Department of Computer Science
Colorado State University
Fort Collins, Colorado, USA

Learn More

Abstract

Throughout all fields of science and engineering, it is important that resources are allocated so that systems are robust against uncertainty. The robustness analysis approach presented here can be adapted to a variety of computing, communication, and information technology environments, such as high performance computing, clouds, grids, internet of vehicles, big data, security, embedded, multicore, content distribution, wireless, and sensor networks.

What does it mean for a system to be “robust”? How can the performance of a system be robust against uncertainty? How can robustness be described? How does one determine if a claim of robustness is true? How can one decide which of two systems is more robust? We explore these general questions in the context of parallel and distributed computing systems. Such computing systems are often heterogeneous mixtures of machines, used to execute collections of tasks with diverse computational requirements. A critical research problem is how to allocate heterogeneous resources to tasks to optimize some performance objective. However, systems frequently have degraded performance due to uncertainties, such as inaccurate estimates of actual workload parameters. To avoid this degradation, we present a model for deriving the robustness of a resource allocation. The robustness of a resource allocation is quantified as the probability that a user-specified level of system performance can be met. We show how to use historical data to build a probabilistic model to evaluate the robustness of resource assignments and to design resource management techniques that produce robust allocations.

Short Bio: H. J. Siegel is the George T. Abell Endowed Chair Distinguished Professor of Electrical and Computer Engineering at Colorado State University (CSU), where he is also a Professor of Computer Science. Before joining CSU, he was a professor at Purdue University from 1976 to 2001. He received two B.S. degrees from the Massachusetts Institute of Technology (MIT), and the M.A., M.S.E., and Ph.D. degrees from Princeton University. He is a Fellow of the IEEE and a Fellow of the ACM. Prof. Siegel has co-authored over 440 published technical papers in the areas of parallel and distributed computing and communications, which have been cited over 15,000 times. He was a Coeditor-in-Chief of the Journal of Parallel and Distributed Computing, and was on the Editorial Boards of the IEEE Transactions on Parallel and Distributed Systems and the IEEE Transactions on Computers. For more information, please see http://www.engr.colostate.edu/~hj.


Computational Social Science Meets Big Data

Professor Feng Xia
Assistant Dean, School of Software,
Head, Department of Cyber Engineering,
Director, Mobile and Social Computing Laboratory,
Dalian University of Technology (DUT), China

Learn More

Abstract

We are entering the new era of big data. With the widespread deployment of various data collection tools and systems, the amount of data that we can access and process is increasing at an unprecedented speed far from what we could imagine even a decade ago. This is happening in almost all domains in the world, including e.g. healthcare, research, finance, transportation, and education. In particular, the availability of big data has created new opportunities for transforming how we study social science phenomena. Data-driven computational social science emerges as a result of the integration of computer science and social sciences, which has been attracting more and more attentions from both academia and industry. This talk will present an overview of the computational social science in the era of big data. Special attention will be given to newly emerging topics like how to explore big data to understand human dynamics. Recent advances in the field will be introduced. Opportunities and challenges will also be discussed.

Short Bio: Dr. Feng Xia is currently Full Professor in Dalian University of Technology (DUT), China. He is Head of Department of Cyber Engineering and Assistant Dean of School of Software. He is the (Guest) Editor of over 10 international journals and a (founding) organizer of several conferences. He serves as General Chair, PC Chair, Workshop Chair, Publicity Chair, or PC Member of dozens of conferences. Dr. Xia has authored/co-authored two books, over 200 scientific papers in int’l journals and conferences (such as IEEE TMC, TBD, TCSS, TC, TPDS, TETC, THMS, TVT, TIE, ACM TOMM, WWW, JCDL, and MobiCom) and 2 book chapters, and has edited 3 int’l conference proceedings and 4 books. He has an h-index of 26, an i10-index of 84, and a total of more than 2900 citations to his work according to Google Scholar. Dr. Xia received a number of awards. He is named on the 2014 list and the 2015 list of Most Cited Chinese Researchers (published by Elsevier). He is a Senior Member of IEEE (Computer Society, SMC Society) and ACM (SIGWEB), and a Member of AAAS.


Searchable Symmetric Encryption: Potential Attacks, Practical Constructions and Extensions

Professor Jinjun Chen
School of Computing and Communications
University of Technology Sydney
Australia

Learn More

Abstract

Data outsourcing has become one of the most successful applications of cloud computing, as it significantly reduces data owners' costs on data storage and management. To prevent privacy disclosure, sensitive data has to be encrypted before outsourcing. Traditional encryption tools such as AES, however, destroy the data searchability because keyword searches cannot be performed over encrypted data. Though the above issue has been addressed by an advanced cryptographic primitive, called searchable symmetric encryption (SSE), we observe that existing SSE schemes still suffer security, efficiency or functionality flaws. In this research, we further study SSE on three aspects. Firstly, we address the search pattern leakage issue. We demonstrate that potential attacks are exist as long as an adversary with some background knowledge learns users' search pattern. We then develop a general countermeasure to transform an existing SSE scheme to a new scheme where the search pattern is hidden. Secondly, motivated by the practical phenomenon in data outsourcing scenarios that user data is distributed over multiple data sources, we propose efficient SSE constructions which allow each data source to build a local index individually and enable the storage provider to merge all local indexes into a global one. Thirdly, we extend SSE into graph encryption with support for specific graph queries. E.g., we investigate how to perform shortest distance queries on an encrypted graph.

Short Bio: Dr Jinjun Chen is a Professor from Faculty of Engineering and IT, University of Technology Sydney (UTS), Australia. He is the Director of Lab for Data Systems and Visual Analytics in the Global Big Data Technologies Centre at UTS. He holds a PhD in Information Technology from Swinburne University of Technology, Australia. His research interests include scalability, big data, data science, data intensive systems, cloud computing, workflow management, privacy and security, and related various research topics. His research results have been published in more than 130 papers in international journals and conferences, including ACM Transactions on Software Engineering and Methodology (TOSEM), IEEE Transactions on Software Engineering (TSE), IEEE Transactions on Parallel and Distributed Systems (TPDS), IEEE Transactions on Cloud Computing, IEEE Transactions on Computers (TC), IEEE Transactions on Service Computing, and IEEE TKDE.

He received UTS Vice-Chancellor's Awards for Research Excellence Highly Commended (2014), UTS Vice-Chancellor's Awards for Research Excellence Finalist (2013), Swinburne Vice-Chancellor’s Research Award (ECR) (2008), IEEE Computer Society Outstanding Leadership Award (2008-2009) and (2010-2011), IEEE Computer Society Service Award (2007), Swinburne Faculty of ICT Research Thesis Excellence Award (2007). He is an Associate Editor for ACM Computing Surveys, IEEE Transactions on Big Data, IEEE Transactions on Knowledge and Data Engineering, IEEE Transactions on Cloud Computing, as well as other journals such as Journal of Computer and System Sciences, JNCA. He is the Chair of IEEE Computer Society’s Technical Committee on Scalable Computing (TCSC), Vice Chair of Steering Committee of Australasian Symposium on Parallel and Distributed Computing, Founder and Coordinator of IEEE TCSC Technical Area on Big Data and MapReduce, Founder and Steering Committee Co-Chair of IEEE International Conference on Big Data and Cloud Computing, IEEE International Conference on Big Data Science and Engineering, and IEEE International Conference on Data Science and Systems.


Urban Sensing: Making Smart Cities Friendly and Safe to Pedestrians

Professor Kwei-Jay Lin
University of California, Irvine, USA
NTU IoX Center, Taiwan
Nagoya Institute of Technology, Japan

Learn More

Abstract

Most of the world’s population now live in big cities. As cities grow bigger, there are bound to be dark corners. Local people who are familiar with an area would avoid using certain side streets unless they have no other choice. However, for tourists from out of town and those who must work in the area, a smart pedestrian GPS with “urban sensors” would be very useful to guide people move around in the area. We study urban sensors that can identify specific types of people, events, and situations on city streets to build real-time pedestrian guiding systems. For example, homeless and drunk people may be detected and traced by street cameras that are now ubiquitous in all cities. Occasional accidents, fire or natural disasters may also be detected by urban sensors built from social or crowd sensing to mark certain areas too dangerous to use. Algorithms and techniques can be integrated for real time detection of urban events and situations. Combined with historical data analytics, urban sensing may make predictions on the perimeter of areas for people to avoid. In this talk, the issues, techniques and challenges for urban sensing are presented.

Short Bio: Kwei-Jay Lin is a Professor at the University of California, Irvine. He is an Adjunct Professor at the National Taiwan University and National Tsinghua University, Taiwan; Zhejiang University, China; Nagoya Institute of Technology, Japan. He is a Chief Scientist at the NTU IoX Research Center at the National Taiwan University, Taipei. He was a Visiting Research Fellow at the Academia Sinica, Taiwan in Spring 2016.

Prof. Lin is an IEEE Fellow, and Editor-In- Chief of the Springer Journal on Service-Oriented Computing and Applications (SOCA). He was the Co-Chair of the IEEE Technical Committee on Business Informatics and Systems (TCBIS) until 2012. He has served on many international conferences, recently as conference co-chairs of IEEE SOCA 2016. His research interest includes service-oriented systems, IoT systems, middleware, real-time computing, and distributed computing.


Recommendations based on offline data processing: techniques, features, and challenges

Professor Wanlei Zhou
Alfred Deakin Professor and Chair of Information Technology,
Associate Dean (International Research Engagement),
Faculty of Science, Engineering and Built Environment,
Deakin University, Melbourne, Australia

Learn More

Abstract

Recommendations based on off-line data processing has attracted increasing attention from both research communities and IT industries. The recommendation techniques could be used to explore huge volumes of data, identify the items that users probably like, and translate the research results into real-world applications and so on. This talk surveys the recent progress in the research of recommendation techniques based on off-line data processing, with emphasis on new techniques (such as temporal recommendation, graph-based recommendation and trustbased recommendation), new features (such as serendipitous recommendation), and new research issues (such as tag recommendation, group recommendation, privacy-preserving recommendation). We also provide an extensive review of evaluation measurements, benchmark datasets, and available open source tools. Finally, we present our recent work on recommendation techniques and outline some existing challenges for future research. The talk will be based on the following papers:

1. Yongli Ren, Gang Li, Jun Zhang, and Wanlei Zhou, "Lazy Collaborative Filtering for Datasets with Missing Values", IEEE Transactions on Cybernetics, Vol. 43, No. 6, pp. 1822-1834, December 2013.
2. Yongli Ren, Gang Li, and Wanlei Zhou, "A learning method for Top-N recommendations with incomplete data", Social Network Analysis and Mining (Springer), Volume 3, Issue 4, pp 1135-1148, December 2013.
3. Tianqing Zhu, Yongli Ren, Wanlei Zhou, Jia Rong, Ping Xiong, "An Effective Privacy Preserving Algorithm for Neighborhood-based Collaborative Filtering", Future Generation Computer System, Volume 36, Pages 142-155, 2014.
4. Yongli Ren, Gang Li, and Wanlei Zhou, "A Survey of Recommendation Techniques Based on Off-line Data Processing" Concurrency and Computation: Practice and Experience, Volume 27, Issue 15, October 2015.
5. Tianqing Zhu, Gang Li, Wanlei Zhou, Ping Xiong, and Cao Yuan, "Privacy-preserving topic model for tagging recommender systems", Knowledge and Information Systems (Springer), Volume 46, Issue 1, pp 33-58, January 2016.

Short Bio: Professor Wanlei Zhou received the B.Eng and M.Eng degrees from Harbin Institute of Technology, Harbin, China in 1982 and 1984, respectively, and the PhD degree from The Australian National University, Canberra, Australia, in 1991, all in Computer Science and Engineering. He also received a DSc degree (a higher Doctorate degree) from Deakin University in 2002. He is currently the Alfred Deakin Professor (the highest honour the University can bestow on a member of academic staff) and Chair Professor in Information Technology, School of Information Technology, Deakin University. Professor Zhou has been the Head of School of Information Technology twice (Jan 2002-Apr 2006 and Jan 2009-Jan 2015) and Associate Dean of Faculty of Science and Technology in Deakin University (May 2006-Dec 2008). Before joining Deakin University, Professor Zhou served as a lecturer in University of Electronic Science and Technology of China, a system programmer in HP at Massachusetts, USA; a lecturer in Monash University, Melbourne, Australia; and a lecturer in National University of Singapore, Singapore. His research interests include distributed systems, network security, bioinformatics, and e-learning. Professor Zhou has published more than 300 papers in refereed international journals and refereed international conferences proceedings. He has also chaired many international conferences. Prof Zhou is a Senior Member of the IEEE.


Advanced Techniques on Searchable Encryption

Dr. Joseph Liu
Faculty of Information Technology,
Monash University,
Australia

Learn More

Abstract

Searchable Encryption allows the data owner to search for some keywords (Boolean query) or a numeric value (range query) within the encrypted domain. The recent protocol proposed by Cash et al (CASH) established the state-of-the-art searchable symmetric encryption (SSE). Yet there are still many interesting extensions or improvements over the CASH protocol. In this talk, we first give an overview of the CASH protocol. Then we provide an extensive review of some interesting extensions, such as multi-client search and range search based on the original CASH protocol. Finally, we present our recent work on non-interactive multi-client search and discuss some possible future research directions on this area.

Short Bio: Dr. Joseph Liu received the Ph.D. degree in Information Engineering from the Chinese University of Hong Kong (CUHK) in July 2004, specializing in cyber security, protocols for securing wireless networks, privacy, authentication, and provable security. He is now a senior lecturer at Faculty of Information Technology, Monash University, Australia. Prior to that, he was a Research Scientist at Infocomm Security Department, Institute for Infocomm Research (I2R) in Singapore for more than 7 years. His current technical focus is particularly applied cryptography and cyber security in the cloud computing paradigm, big data, lightweight security, and privacy enhanced technology. He has published more than 120 referred journal and conference papers and received the Best Paper Award from ESORICS 2014 and ESORICS 2015. He is the co-founder of ProvSec (International Conference on Provable Security). He has served as the program chair of ProvSec 2007, 2014 ACISP 2016, and as the program committee of more than 50 international conferences.

Program

Overview

Main Session

Request Evaluation for Policy-Based Attribute Access Control in Social Network Cloud
Katanosh Morovat and Brajendra Panda
Probabilistic Inference on Twitter Data to Discover Suspicious Users and Malicious Content
Praveen Rao, Anas Katib, Charles Kamhoua, Kevin Kwiat and Laurent Njilla
Enhancement of Permission Management for an ARM-Android Platform
Rui Chang, Liehui Jiang, Wenzhi Chen, Hongqi He and Shuiqiao Yang
Comprehensive Analysis of Network Traffic Data
Yuantian Miao, Zichan Ruan, Lei Pan, Jun Zhang, Yang Xiang and Yu Wang
Studying the Global Spreading Influence and Local Connections of Users in Online Social Networks
Jiaojiao Jiang, Youyang Qu, Shui Yu, Wanlei Zhou and Wei wu

Registration

Details of conference registration, as well as hotel and airport transport booking, can be found in the following registration form. Please complete the registration form and return to NeerajS@unifiji.ac.fj.

Registration Form (PDF)

Registration Form (DOCX)

Full registration payment is required by 30 October 2016 for EACH accepted paper. This deadline will be strictly enforced. Failure to pay the registration fee by 30 October 2016 will result in the exclusion of the papers from the Conference Proceedings.

Final Paper Upload

The camera-ready copy of accepted paper is required before 30 October 2016. Authors must access IEEE CIT/SocialSec 2016 Author Kit to submit the Copyright Release Form and the camera-ready copy of the accepted paper.

IEEE CIT/SocialSec 2016 Author Kit

Information for Authors

Paper Submission

The symposium seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and privacy in Social Networks and Big Data. Papers describing case studies, implementation experiences, and lessons learned are also encouraged. Topics of interest include but are not limited to:

  • Attacks in/via social networks
  • Information control and detection
  • Malicious behavior modeling in social networks
  • Malicious information propagation via social networks
  • Phishing problems in social networks
  • Privacy protection in social networks
  • Big data analytics for threats and attacks prediction
  • Spam problems in social networks
  • Trust and reputations in social networks
  • Big data outsourcing
  • Big data forensics
  • Security and privacy in big database
  • Applied cryptography for big data
  • Big data system security
  • Mobile social networks security
  • Security and privacy in cloud
  • Forensics in social networks and big data

Paper Submission Portal

Please click the above button to submit your paper through IEEE SocialSec 2016 Easychair submission system. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 8 pages in A4 format, including tables, figures, references and appendixes, in IEEE Computer Society proceedings format with Portable Document Format (.pdf). Please refer to IEEE Manuscript Templates for Conference Proceedings for preparing the submission.

IEEE Manuscript Templates

Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the symposium to present the work.

Journal Special Issues

Selected papers presented at the SocialSec 2016 will be invited to consider submission (after significant extension) for the special issue in the following SCI-Indexed Journals:

Future Generation Computer Systems (FGCS) Impact Factor: 2.430
Special Issue on Security and Privacy in Social Big Data
Learn more
Concurrency and Computation: Practice and Experience (CCPE) Impact Factor: 0.942
Special Issue on Social Network Security and Privacy
Learn more

Orgainsation Committees

General Chairs

Shawkat Ali, University of Fiji, Fiji
David Chadwick, University of Kent, United Kingdom
Yang Xiang, Deakin University, Australia

Program Committee Chairs

Jun Zhang, Deakin University, Australia
Mirosław Kutyłowski, Wroclaw University of Technology, Poland
Murat Kantarcioglu, University of Texas at Dallas, United States

Workshop Chairs

Motoki Sakai, Chiba University of Commerce, Japan
Aniello Castiglione, University of Salerno, Italy
Ilsun You, Soonchunhyang University, Korea

Publicity Chairs

Md Zakirul Alam Bhuiyan, Temple University, United States
Xin Zhu, University of Aizu, Japan
Alfredo Cuzzocrea, University of Trieste, Italy

Program Committee Members

Cristina Alcaraz, University of Malaga, Spain
Man Ho Au, Hong Kong Polytechnic University, Hong Kong
Joonsang Baek, Khalifa University of Science, Technology and Research, Abu Dhabi
Ero Balsa, K.U.Leuven, Belgium
K. Selcuk Candan, Arizona State University, United States
Nan Cao, IBM T.J. Watson Research Center, China
Barbara Carminati, University of Insubria, Italy
David Chadwick, University of Kent, United Kingdom
Richard Chbeir, LIUPPA Laboratory, France
Alfredo Cuzzocrea, ICAR-CNR and University of Calabria, Italy
Hasan Davulcu, Arizona State University, United States
Nan Du, Georgia Institute of Technology, United States
Wei Gao, Qatar Computing Research Institute, Qatar
Gabriel Ghinita, University of Massachusetts, Boston, United States
Sokratis Katsikas, Norwegian University of Science and Technology, Norway
Jaya Kawale, University of Minnesota, United States
Muhammad Khurram Khan, King Saud University, Saudi Arabia
Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan
Xiangnan Kong, Worcester Polytechnic Institute, United States
Joseph Liu, Monash University, Australia
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Prasenjit Mitra, The Pennsylvania State University, United States
Franco Maria Nardini, ISTI-CNR, Italy
Evangelos Papalexakis, Carnegie Mellon University, Australia
Gerardo Pelosi, Politecnico di Milano, Italy
Günther Pernul, Universität Regensburg, Germany
Hung-Min Sun, National Tsing Hua University, Taiwan
Lu-An Tang, NEC Labs America, United States
Alexander Uskov, Bradley University, United States
Ting Wang, Lehigh University, United States
Yu Wang, Deakin University, Australia
Ingmar Weber, Qatar Computing Research Institute, Qatar
Sheng Wen, Deakin University, Australia
Yanghua Xiao, Fudan University, China
Guomin Yang, University of Wollongong, Australia

Symposium Venue

IEEE SocialSec 2016 will be held at Shangri-La's Fijian Resort and Spa, Yanuca Island, Fiji.

Gallery

Transportation

Getting to Nadi International Airport

Nadi International Airport (NAN) is the main international airport for Fiji as well as an important regional hub for the South Pacific islands. The airport provides service to a number of international airlines and connects Fiji to 14 cities all over the globe.

  • Fiji Airways (Qantas & American Airlines Codeshare) fly direct to Nadi from Singapore, Australia, New Zealand, Los Angeles, Hong Kong (with connections to UK/Europeon Cathay Pacific), Vancouver (via Honolulu) & Honolulu
  • Virgin Australia fly direct to Nadi from Brisbane, Sydney, Melbourne.
  • Air New Zealand (United Airlines Codeshare) fly direct to Nadi from Auckland.
  • Korean Air fly out of UK/Europe to Seoul then direct to Nadi.

Getting to Shangri-La's Fijian Resort and Spa

Shangri-La's Fijian Resort and Spa is located approximately 60 minutes by scenic countryside road from Nadi International Airport. There are several options to reach Shangri-La's Fijian Resort and Spa. Guests can choose from limousine transfer or car rental.

  • Hotel limousine transfer can be arranged by providing your flight details and estimated time of arrival when you make your booking online.
  • Car rental services, including Avis, Thrifty and Budget, are available at Nadi International Airport.
  • Private Taxis with English speaking driver can take you to Shangri-La's Fijian Resort and Spa in 40 mins with a cost around US$35.00.

Contact

For further information regarding to SocialSec 2016, please contact nsclab.events@gmail.com.

IEEE