Shangri-La's Fijian Resort and Spa, Fiji
7-10 December 2016
Social Networks and Big Data have pervaded all aspects of our daily lives. With their unparalleled popularity, social networks have evolved from the platforms for social communication and news dissemination, to indispensable tools for professional networking, social recommendations, marketing, and online content distribution. Social Networks, together with other activities, produce Big Data that is beyond the ability of commonly used computer software and hardware tools to capture, manage, and process within a tolerable elapsed time.
Due to their scale, complexity and heterogeneity, a number of technical and social challenges in Social Networks and Big Data must be addressed. It has been widely recognised that security and privacy are the critical issues. On one hand, Social Networks and Big Data have been an effective platform for the attackers to launch attacks and distribute malicious information. On the other hand, privacy leakage through Social Networks and Big Data has become common exercise. Following the success of the first event, the aim of the 2nd IEEE International Symposium on Security and Privacy in Social Networks and Big Data (IEEE SocialSec 2016) is to provide a leading edge forum to foster interactions between researchers and developers with the security and privacy communities in Social Networks and Big Data, and to give attendees an opportunity to interact with experts in academia, industry, and governments.
IEEE SocialSec 2016 will be held at Shangri-La's Fijian Resort and Spa, Yanuca Island, Fiji on 7-10 December 2016. It will be co-located with the 6th International Symposium on Cloud and Service Computing (SC2-2016), the 3rd International Conference on Internet of Vehicles (IOV 2016), and 16th International Conference on Computer and Information Technology (CIT 2016). Get ready to enjoy a unique trip in an wonderful island in this Globe.
|Paper Submission Due||30 September 2016 Final Extension|
|Author Notification||20 October 2016|
|Camera-ready Paper Due||30 October 2016|
|Registration Due||30 October 2016|
|Symposium Date||7-10 December 2016|
Professor H. J. Siegel
Department of Electrical and Computer Engineering and
Department of Computer Science
Colorado State University
Fort Collins, Colorado, USA
Throughout all fields of science and engineering, it is important that resources are allocated so that systems are robust against uncertainty. The robustness analysis approach presented here can be adapted to a variety of computing, communication, and information technology environments, such as high performance computing, clouds, grids, internet of vehicles, big data, security, embedded, multicore, content distribution, wireless, and sensor networks.
What does it mean for a system to be “robust”? How can the performance of a system be robust against uncertainty? How can robustness be described? How does one determine if a claim of robustness is true? How can one decide which of two systems is more robust? We explore these general questions in the context of parallel and distributed computing systems. Such computing systems are often heterogeneous mixtures of machines, used to execute collections of tasks with diverse computational requirements. A critical research problem is how to allocate heterogeneous resources to tasks to optimize some performance objective. However, systems frequently have degraded performance due to uncertainties, such as inaccurate estimates of actual workload parameters. To avoid this degradation, we present a model for deriving the robustness of a resource allocation. The robustness of a resource allocation is quantified as the probability that a user-specified level of system performance can be met. We show how to use historical data to build a probabilistic model to evaluate the robustness of resource assignments and to design resource management techniques that produce robust allocations.
Short Bio: H. J. Siegel is the George T. Abell Endowed Chair Distinguished Professor of Electrical and Computer Engineering at Colorado State University (CSU), where he is also a Professor of Computer Science. Before joining CSU, he was a professor at Purdue University from 1976 to 2001. He received two B.S. degrees from the Massachusetts Institute of Technology (MIT), and the M.A., M.S.E., and Ph.D. degrees from Princeton University. He is a Fellow of the IEEE and a Fellow of the ACM. Prof. Siegel has co-authored over 440 published technical papers in the areas of parallel and distributed computing and communications, which have been cited over 15,000 times. He was a Coeditor-in-Chief of the Journal of Parallel and Distributed Computing, and was on the Editorial Boards of the IEEE Transactions on Parallel and Distributed Systems and the IEEE Transactions on Computers. For more information, please see http://www.engr.colostate.edu/~hj.
Professor Feng Xia
Assistant Dean, School of Software,
Head, Department of Cyber Engineering,
Director, Mobile and Social Computing Laboratory,
Dalian University of Technology (DUT), China
We are entering the new era of big data. With the widespread deployment of various data collection tools and systems, the amount of data that we can access and process is increasing at an unprecedented speed far from what we could imagine even a decade ago. This is happening in almost all domains in the world, including e.g. healthcare, research, finance, transportation, and education. In particular, the availability of big data has created new opportunities for transforming how we study social science phenomena. Data-driven computational social science emerges as a result of the integration of computer science and social sciences, which has been attracting more and more attentions from both academia and industry. This talk will present an overview of the computational social science in the era of big data. Special attention will be given to newly emerging topics like how to explore big data to understand human dynamics. Recent advances in the field will be introduced. Opportunities and challenges will also be discussed.
Short Bio: Dr. Feng Xia is currently Full Professor in Dalian University of Technology (DUT), China. He is Head of Department of Cyber Engineering and Assistant Dean of School of Software. He is the (Guest) Editor of over 10 international journals and a (founding) organizer of several conferences. He serves as General Chair, PC Chair, Workshop Chair, Publicity Chair, or PC Member of dozens of conferences. Dr. Xia has authored/co-authored two books, over 200 scientific papers in int’l journals and conferences (such as IEEE TMC, TBD, TCSS, TC, TPDS, TETC, THMS, TVT, TIE, ACM TOMM, WWW, JCDL, and MobiCom) and 2 book chapters, and has edited 3 int’l conference proceedings and 4 books. He has an h-index of 26, an i10-index of 84, and a total of more than 2900 citations to his work according to Google Scholar. Dr. Xia received a number of awards. He is named on the 2014 list and the 2015 list of Most Cited Chinese Researchers (published by Elsevier). He is a Senior Member of IEEE (Computer Society, SMC Society) and ACM (SIGWEB), and a Member of AAAS.
Professor Jinjun Chen
School of Computing and Communications
University of Technology Sydney
Data outsourcing has become one of the most successful applications of cloud computing, as it significantly reduces data owners' costs on data storage and management. To prevent privacy disclosure, sensitive data has to be encrypted before outsourcing. Traditional encryption tools such as AES, however, destroy the data searchability because keyword searches cannot be performed over encrypted data. Though the above issue has been addressed by an advanced cryptographic primitive, called searchable symmetric encryption (SSE), we observe that existing SSE schemes still suffer security, efficiency or functionality flaws. In this research, we further study SSE on three aspects. Firstly, we address the search pattern leakage issue. We demonstrate that potential attacks are exist as long as an adversary with some background knowledge learns users' search pattern. We then develop a general countermeasure to transform an existing SSE scheme to a new scheme where the search pattern is hidden. Secondly, motivated by the practical phenomenon in data outsourcing scenarios that user data is distributed over multiple data sources, we propose efficient SSE constructions which allow each data source to build a local index individually and enable the storage provider to merge all local indexes into a global one. Thirdly, we extend SSE into graph encryption with support for specific graph queries. E.g., we investigate how to perform shortest distance queries on an encrypted graph.
Short Bio: Dr Jinjun Chen is a Professor from Faculty of Engineering and IT, University of Technology Sydney (UTS), Australia. He is the Director of Lab for Data Systems and Visual Analytics in the Global Big Data Technologies Centre at UTS. He holds a PhD in Information Technology from Swinburne University of Technology, Australia. His research interests include scalability, big data, data science, data intensive systems, cloud computing, workflow management, privacy and security, and related various research topics. His research results have been published in more than 130 papers in international journals and conferences, including ACM Transactions on Software Engineering and Methodology (TOSEM), IEEE Transactions on Software Engineering (TSE), IEEE Transactions on Parallel and Distributed Systems (TPDS), IEEE Transactions on Cloud Computing, IEEE Transactions on Computers (TC), IEEE Transactions on Service Computing, and IEEE TKDE.
He received UTS Vice-Chancellor's Awards for Research Excellence Highly Commended (2014), UTS Vice-Chancellor's Awards for Research Excellence Finalist (2013), Swinburne Vice-Chancellor’s Research Award (ECR) (2008), IEEE Computer Society Outstanding Leadership Award (2008-2009) and (2010-2011), IEEE Computer Society Service Award (2007), Swinburne Faculty of ICT Research Thesis Excellence Award (2007). He is an Associate Editor for ACM Computing Surveys, IEEE Transactions on Big Data, IEEE Transactions on Knowledge and Data Engineering, IEEE Transactions on Cloud Computing, as well as other journals such as Journal of Computer and System Sciences, JNCA. He is the Chair of IEEE Computer Society’s Technical Committee on Scalable Computing (TCSC), Vice Chair of Steering Committee of Australasian Symposium on Parallel and Distributed Computing, Founder and Coordinator of IEEE TCSC Technical Area on Big Data and MapReduce, Founder and Steering Committee Co-Chair of IEEE International Conference on Big Data and Cloud Computing, IEEE International Conference on Big Data Science and Engineering, and IEEE International Conference on Data Science and Systems.
Professor Kwei-Jay Lin
University of California, Irvine, USA
NTU IoX Center, Taiwan
Nagoya Institute of Technology, Japan
Most of the world’s population now live in big cities. As cities grow bigger, there are bound to be dark corners. Local people who are familiar with an area would avoid using certain side streets unless they have no other choice. However, for tourists from out of town and those who must work in the area, a smart pedestrian GPS with “urban sensors” would be very useful to guide people move around in the area. We study urban sensors that can identify specific types of people, events, and situations on city streets to build real-time pedestrian guiding systems. For example, homeless and drunk people may be detected and traced by street cameras that are now ubiquitous in all cities. Occasional accidents, fire or natural disasters may also be detected by urban sensors built from social or crowd sensing to mark certain areas too dangerous to use. Algorithms and techniques can be integrated for real time detection of urban events and situations. Combined with historical data analytics, urban sensing may make predictions on the perimeter of areas for people to avoid. In this talk, the issues, techniques and challenges for urban sensing are presented.
Short Bio: Kwei-Jay Lin is a Professor at the University of California, Irvine. He is an Adjunct Professor at the National Taiwan University and National Tsinghua University, Taiwan; Zhejiang University, China; Nagoya Institute of Technology, Japan. He is a Chief Scientist at the NTU IoX Research Center at the National Taiwan University, Taipei. He was a Visiting Research Fellow at the Academia Sinica, Taiwan in Spring 2016.
Prof. Lin is an IEEE Fellow, and Editor-In- Chief of the Springer Journal on Service-Oriented Computing and Applications (SOCA). He was the Co-Chair of the IEEE Technical Committee on Business Informatics and Systems (TCBIS) until 2012. He has served on many international conferences, recently as conference co-chairs of IEEE SOCA 2016. His research interest includes service-oriented systems, IoT systems, middleware, real-time computing, and distributed computing.
Professor Wanlei Zhou
Alfred Deakin Professor and Chair of Information Technology,
Associate Dean (International Research Engagement),
Faculty of Science, Engineering and Built Environment,
Deakin University, Melbourne, Australia
Recommendations based on off-line data processing has attracted increasing attention from both research communities and IT industries. The recommendation techniques could be used to explore huge volumes of data, identify the items that users probably like, and translate the research results into real-world applications and so on. This talk surveys the recent progress in the research of recommendation techniques based on off-line data processing, with emphasis on new techniques (such as temporal recommendation, graph-based recommendation and trustbased recommendation), new features (such as serendipitous recommendation), and new research issues (such as tag recommendation, group recommendation, privacy-preserving recommendation). We also provide an extensive review of evaluation measurements, benchmark datasets, and available open source tools. Finally, we present our recent work on recommendation techniques and outline some existing challenges for future research. The talk will be based on the following papers:
1. Yongli Ren, Gang Li, Jun Zhang, and Wanlei Zhou, "Lazy Collaborative Filtering for Datasets with Missing Values", IEEE Transactions on Cybernetics, Vol. 43, No. 6, pp. 1822-1834, December 2013.
2. Yongli Ren, Gang Li, and Wanlei Zhou, "A learning method for Top-N recommendations with incomplete data", Social Network Analysis and Mining (Springer), Volume 3, Issue 4, pp 1135-1148, December 2013.
3. Tianqing Zhu, Yongli Ren, Wanlei Zhou, Jia Rong, Ping Xiong, "An Effective Privacy Preserving Algorithm for Neighborhood-based Collaborative Filtering", Future Generation Computer System, Volume 36, Pages 142-155, 2014.
4. Yongli Ren, Gang Li, and Wanlei Zhou, "A Survey of Recommendation Techniques Based on Off-line Data Processing" Concurrency and Computation: Practice and Experience, Volume 27, Issue 15, October 2015.
5. Tianqing Zhu, Gang Li, Wanlei Zhou, Ping Xiong, and Cao Yuan, "Privacy-preserving topic model for tagging recommender systems", Knowledge and Information Systems (Springer), Volume 46, Issue 1, pp 33-58, January 2016.
Short Bio: Professor Wanlei Zhou received the B.Eng and M.Eng degrees from Harbin Institute of Technology, Harbin, China in 1982 and 1984, respectively, and the PhD degree from The Australian National University, Canberra, Australia, in 1991, all in Computer Science and Engineering. He also received a DSc degree (a higher Doctorate degree) from Deakin University in 2002. He is currently the Alfred Deakin Professor (the highest honour the University can bestow on a member of academic staff) and Chair Professor in Information Technology, School of Information Technology, Deakin University. Professor Zhou has been the Head of School of Information Technology twice (Jan 2002-Apr 2006 and Jan 2009-Jan 2015) and Associate Dean of Faculty of Science and Technology in Deakin University (May 2006-Dec 2008). Before joining Deakin University, Professor Zhou served as a lecturer in University of Electronic Science and Technology of China, a system programmer in HP at Massachusetts, USA; a lecturer in Monash University, Melbourne, Australia; and a lecturer in National University of Singapore, Singapore. His research interests include distributed systems, network security, bioinformatics, and e-learning. Professor Zhou has published more than 300 papers in refereed international journals and refereed international conferences proceedings. He has also chaired many international conferences. Prof Zhou is a Senior Member of the IEEE.
Dr. Joseph Liu
Faculty of Information Technology,
Searchable Encryption allows the data owner to search for some keywords (Boolean query) or a numeric value (range query) within the encrypted domain. The recent protocol proposed by Cash et al (CASH) established the state-of-the-art searchable symmetric encryption (SSE). Yet there are still many interesting extensions or improvements over the CASH protocol. In this talk, we first give an overview of the CASH protocol. Then we provide an extensive review of some interesting extensions, such as multi-client search and range search based on the original CASH protocol. Finally, we present our recent work on non-interactive multi-client search and discuss some possible future research directions on this area.
Short Bio: Dr. Joseph Liu received the Ph.D. degree in Information Engineering from the Chinese University of Hong Kong (CUHK) in July 2004, specializing in cyber security, protocols for securing wireless networks, privacy, authentication, and provable security. He is now a senior lecturer at Faculty of Information Technology, Monash University, Australia. Prior to that, he was a Research Scientist at Infocomm Security Department, Institute for Infocomm Research (I2R) in Singapore for more than 7 years. His current technical focus is particularly applied cryptography and cyber security in the cloud computing paradigm, big data, lightweight security, and privacy enhanced technology. He has published more than 120 referred journal and conference papers and received the Best Paper Award from ESORICS 2014 and ESORICS 2015. He is the co-founder of ProvSec (International Conference on Provable Security). He has served as the program chair of ProvSec 2007, 2014 ACISP 2016, and as the program committee of more than 50 international conferences.
|Request Evaluation for Policy-Based Attribute Access Control in Social Network Cloud|
Katanosh Morovat and Brajendra Panda
|Probabilistic Inference on Twitter Data to Discover Suspicious Users and Malicious Content|
Praveen Rao, Anas Katib, Charles Kamhoua, Kevin Kwiat and Laurent Njilla
|Enhancement of Permission Management for an ARM-Android Platform|
Rui Chang, Liehui Jiang, Wenzhi Chen, Hongqi He and Shuiqiao Yang
|Comprehensive Analysis of Network Traffic Data|
Yuantian Miao, Zichan Ruan, Lei Pan, Jun Zhang, Yang Xiang and Yu Wang
|Studying the Global Spreading Influence and Local Connections of Users in Online Social Networks|
Jiaojiao Jiang, Youyang Qu, Shui Yu, Wanlei Zhou and Wei wu
Details of conference registration, as well as hotel and airport transport booking, can be found in the following registration form. Please complete the registration form and return to NeerajS@unifiji.ac.fj.
Full registration payment is required by 30 October 2016 for EACH accepted paper. This deadline will be strictly enforced. Failure to pay the registration fee by 30 October 2016 will result in the exclusion of the papers from the Conference Proceedings.
The camera-ready copy of accepted paper is required before 30 October 2016. Authors must access IEEE CIT/SocialSec 2016 Author Kit to submit the Copyright Release Form and the camera-ready copy of the accepted paper.
Shawkat Ali, University of Fiji, Fiji
David Chadwick, University of Kent, United Kingdom
Yang Xiang, Deakin University, Australia
Jun Zhang, Deakin University, Australia
Mirosław Kutyłowski, Wroclaw University of Technology, Poland
Murat Kantarcioglu, University of Texas at Dallas, United States
Motoki Sakai, Chiba University of Commerce, Japan
Aniello Castiglione, University of Salerno, Italy
Ilsun You, Soonchunhyang University, Korea
Md Zakirul Alam Bhuiyan, Temple University, United States
Xin Zhu, University of Aizu, Japan
Alfredo Cuzzocrea, University of Trieste, Italy
Cristina Alcaraz, University of Malaga, Spain
Man Ho Au, Hong Kong Polytechnic University, Hong Kong
Joonsang Baek, Khalifa University of Science, Technology and Research, Abu Dhabi
Ero Balsa, K.U.Leuven, Belgium
K. Selcuk Candan, Arizona State University, United States
Nan Cao, IBM T.J. Watson Research Center, China
Barbara Carminati, University of Insubria, Italy
David Chadwick, University of Kent, United Kingdom
Richard Chbeir, LIUPPA Laboratory, France
Alfredo Cuzzocrea, ICAR-CNR and University of Calabria, Italy
Hasan Davulcu, Arizona State University, United States
Nan Du, Georgia Institute of Technology, United States
Wei Gao, Qatar Computing Research Institute, Qatar
Gabriel Ghinita, University of Massachusetts, Boston, United States
Sokratis Katsikas, Norwegian University of Science and Technology, Norway
Jaya Kawale, University of Minnesota, United States
Muhammad Khurram Khan, King Saud University, Saudi Arabia
Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan
Xiangnan Kong, Worcester Polytechnic Institute, United States
Joseph Liu, Monash University, Australia
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Prasenjit Mitra, The Pennsylvania State University, United States
Franco Maria Nardini, ISTI-CNR, Italy
Evangelos Papalexakis, Carnegie Mellon University, Australia
Gerardo Pelosi, Politecnico di Milano, Italy
Günther Pernul, Universität Regensburg, Germany
Hung-Min Sun, National Tsing Hua University, Taiwan
Lu-An Tang, NEC Labs America, United States
Alexander Uskov, Bradley University, United States
Ting Wang, Lehigh University, United States
Yu Wang, Deakin University, Australia
Ingmar Weber, Qatar Computing Research Institute, Qatar
Sheng Wen, Deakin University, Australia
Yanghua Xiao, Fudan University, China
Guomin Yang, University of Wollongong, Australia
IEEE SocialSec 2016 will be held at Shangri-La's Fijian Resort and Spa, Yanuca Island, Fiji.
Nadi International Airport (NAN) is the main international airport for Fiji as well as an important regional hub for the South Pacific islands. The airport provides service to a number of international airlines and connects Fiji to 14 cities all over the globe.
Shangri-La's Fijian Resort and Spa is located approximately 60 minutes by scenic countryside road from Nadi International Airport. There are several options to reach Shangri-La's Fijian Resort and Spa. Guests can choose from limousine transfer or car rental.
For further information regarding to SocialSec 2016, please contact email@example.com.