Josef Spillner, Manar AbuTalib, Q. Nasir, Farhad Khalilnia
{"title":"CIFS'19 Workshop Chairs' Welcome & Organization","authors":"Josef Spillner, Manar AbuTalib, Q. Nasir, Farhad Khalilnia","doi":"10.1145/3368235.3368885","DOIUrl":null,"url":null,"abstract":"It is our great pleasure to welcome you to the first International Workshop on Cloud, IoT and Fog Security - CIFS 2019 collocated with the 12th IEEE/ACM International Conference on Utility and Cloud Computing - UCC 2019. Welcome to Auckland! The processing of sensitive information is a cross-cutting topic unimpressed by imaginary system boundaries. In many scenarios, sensors or actors are connected to on-site compute units and fog systems which themselves are connected to clouds. The transmission, processing and storage of information needs to be secured across the entire chain or network, using diverse mechanisms often outside the control of the application developer. This workshop aims to discuss recent advances around holistic security aspects involving availability, integrity, confidentiality, non-repudiability and other guaranteeable properties. With six peer-reviewed research papers and one impulse talk, this workshop combines the most pressing topics on the intersection between distributed systems and (cyber-)security aspects. Two papers investigate the use of blockchains: «Intelligent Price Alert System for Blockchain-based Digital Assets» and «Blockchain as a Trusted Component in Cloud SLA Verification». Intrusion detection and avoidance is the suject of three papers: «MEML: Resource-aware MQTT-based Machine Learning for Network Attacks Detection on IoT Edge Devices», «An Algorithm to Prevent Unauthorised Data Modification using Collaborative Nodes» and «Techniques for Mutual Auditability in a Cloud Environment». Finally, algorithmic aspects of data encoding are covered in «Concurrent Failure Recovery for MSR Regenerating Code via Product Matrix Construction». These papers represent authors from six countries over four continents, and thus a significant glimpse into emerging research around the world. With an impulse talk «Novel Applications of Stealth Computing», the workshop also conveys recent research efforts on holistic combinations of data encoding, dispersal and processing for industrially relevant systems combining connected devices and continuum services from fogs to clouds.","PeriodicalId":166357,"journal":{"name":"Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing Companion","volume":"115 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing Companion","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3368235.3368885","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
It is our great pleasure to welcome you to the first International Workshop on Cloud, IoT and Fog Security - CIFS 2019 collocated with the 12th IEEE/ACM International Conference on Utility and Cloud Computing - UCC 2019. Welcome to Auckland! The processing of sensitive information is a cross-cutting topic unimpressed by imaginary system boundaries. In many scenarios, sensors or actors are connected to on-site compute units and fog systems which themselves are connected to clouds. The transmission, processing and storage of information needs to be secured across the entire chain or network, using diverse mechanisms often outside the control of the application developer. This workshop aims to discuss recent advances around holistic security aspects involving availability, integrity, confidentiality, non-repudiability and other guaranteeable properties. With six peer-reviewed research papers and one impulse talk, this workshop combines the most pressing topics on the intersection between distributed systems and (cyber-)security aspects. Two papers investigate the use of blockchains: «Intelligent Price Alert System for Blockchain-based Digital Assets» and «Blockchain as a Trusted Component in Cloud SLA Verification». Intrusion detection and avoidance is the suject of three papers: «MEML: Resource-aware MQTT-based Machine Learning for Network Attacks Detection on IoT Edge Devices», «An Algorithm to Prevent Unauthorised Data Modification using Collaborative Nodes» and «Techniques for Mutual Auditability in a Cloud Environment». Finally, algorithmic aspects of data encoding are covered in «Concurrent Failure Recovery for MSR Regenerating Code via Product Matrix Construction». These papers represent authors from six countries over four continents, and thus a significant glimpse into emerging research around the world. With an impulse talk «Novel Applications of Stealth Computing», the workshop also conveys recent research efforts on holistic combinations of data encoding, dispersal and processing for industrially relevant systems combining connected devices and continuum services from fogs to clouds.