<div dir="ltr"><div style="margin:0px;padding:0px;border:0px;font-variant-numeric:inherit;font-variant-east-asian:inherit;font-stretch:inherit;line-height:inherit;vertical-align:baseline">The 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020)<br></div><div style="margin:0px;padding:0px;border:0px;font-variant-numeric:inherit;font-variant-east-asian:inherit;font-stretch:inherit;line-height:inherit;vertical-align:baseline">May 25-27, Baltimore, USA<br></div><div style="margin:0px;padding:0px;border:0px;font-variant-numeric:inherit;font-variant-east-asian:inherit;font-stretch:inherit;line-height:inherit;vertical-align:baseline"><a href="http://www.cloud-conf.net/datasec/2020/hpsc/" target="_blank" style="margin:0px;padding:0px;border:0px;font:inherit;vertical-align:baseline">http://www.cloud-conf.net/datasec/2020/</a><br></div><div style="margin:0px;padding:0px;border:0px;font-variant-numeric:inherit;font-variant-east-asian:inherit;font-stretch:inherit;line-height:inherit;vertical-align:baseline"><br></div><div style="margin:0px;padding:0px;border:0px;font-variant-numeric:inherit;font-variant-east-asian:inherit;font-stretch:inherit;line-height:inherit;vertical-align:baseline"></div><div style="margin:0px;padding:0px;border:0px;font-variant-numeric:inherit;font-variant-east-asian:inherit;font-stretch:inherit;line-height:inherit;vertical-align:baseline"><br></div><div style="margin:0px;padding:0px;border:0px;font-variant-numeric:inherit;font-variant-east-asian:inherit;font-stretch:inherit;line-height:inherit;vertical-align:baseline"><b>IMPORTANT DATES<br></b>Paper submission: <b><font color="#ff9900">January 15th, 2020</font></b><br>Author notification: March 15th, 2020<br>Camera-Ready: April 5th, 2020<br>Registration: April 5th, 2020<br>Conference date: May 25th-27th, 2020<br></div><div style="margin:0px;padding:0px;border:0px;font-variant-numeric:inherit;font-variant-east-asian:inherit;font-stretch:inherit;line-height:inherit;vertical-align:baseline"><br></div><div style="margin:0px;padding:0px;border:0px;font-variant-numeric:inherit;font-variant-east-asian:inherit;font-stretch:inherit;line-height:inherit;vertical-align:baseline"><b>CALL FOR PAPERS<br></b>With rapid development of big data storage and computing techniques, we have developed novel techniques beyond big data. Many aspects for both scientific research and people’s daily life have been influenced by big data based technology such as artificial intelligence, cloud computing, and Internet of Things. Providing security and privacy for big data storage, transmission, and processing have been attracting much attention in all big data related areas. IEEE BigDataSecurity 2020 addresses this domain and aims to gather recent academic achievements in this field. </div><div style="margin:0px;padding:0px;border:0px;font-variant-numeric:inherit;font-variant-east-asian:inherit;font-stretch:inherit;line-height:inherit;vertical-align:baseline"><br></div><div style="margin:0px;padding:0px;border:0px;font-variant-numeric:inherit;font-variant-east-asian:inherit;font-stretch:inherit;font-size:16px;line-height:inherit;vertical-align:baseline;color:rgb(50,49,48)"><font color="#222222" face="Arial, Helvetica, sans-serif" size="2">Security and robustness on Artificial Intelligence is the second concentration of IEEE BigDataSecurity 2020. The emerging needs for building reliable and robust AI models in Big Data and Cloud environments with security and privacy guaranteed have attracted attention from a number of different perspectives. The new methods deployed in Big Data and Cloud environment have covered distinct dimensions, such as robust deep learning, secure deep learning/machine learning, multi-party computing, edge/fog computing, energy consumptions, high performance, and heterogeneous resources, cloud models, heterogeneous architecture, tele-health, resource allocation, load balance, multimedia, and QoS, etc.</font><div style="margin:0px;padding:0px;border:0px;font:inherit;vertical-align:baseline;color:inherit"><ul style="color:rgb(34,34,34);font-size:small"><ul style="margin:0px 0px 1.5em 3em;list-style:disc;color:rgb(64,64,64);font-family:Lato,sans-serif;font-size:16px"><li style="overflow-wrap: break-word;"><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:13.35pt;line-height:inherit;font-family:arial,helvetica,sans-serif;vertical-align:baseline;color:rgb(34,34,34);background-color:rgba(0,0,0,0)">Novel big data model</span></li><li style="overflow-wrap: break-word;"><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:13.35pt;line-height:inherit;font-family:arial,helvetica,sans-serif;vertical-align:baseline;color:rgb(34,34,34);background-color:rgba(0,0,0,0)">Big data security issues in IoT</span></li><li style="overflow-wrap: break-word;"><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:13.35pt;line-height:inherit;font-family:arial,helvetica,sans-serif;vertical-align:baseline;color:rgb(34,34,34);background-color:rgba(0,0,0,0)">Big data privacy issues in IoT</span></li><li style="overflow-wrap: break-word;"><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:13.35pt;line-height:inherit;font-family:arial,helvetica,sans-serif;vertical-align:baseline;color:rgb(34,34,34);background-color:rgba(0,0,0,0)">Big data security issues in cloud computing</span></li><li style="overflow-wrap: break-word;"><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:13.35pt;line-height:inherit;font-family:arial,helvetica,sans-serif;vertical-align:baseline;color:rgb(34,34,34);background-color:rgba(0,0,0,0)">Big data privacy in cloud computing</span></li><li style="overflow-wrap: break-word;"><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:13.35pt;line-height:inherit;font-family:arial,helvetica,sans-serif;vertical-align:baseline;color:rgb(34,34,34);background-color:rgba(0,0,0,0)">Big data storage, integration, service, mining</span></li><li style="overflow-wrap: break-word;"><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:13.35pt;line-height:inherit;font-family:arial,helvetica,sans-serif;vertical-align:baseline;color:rgb(34,34,34);background-color:rgba(0,0,0,0)">Blockchain-based security mechanism</span></li><li style="overflow-wrap: break-word;"><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:13.35pt;line-height:inherit;font-family:arial,helvetica,sans-serif;vertical-align:baseline;color:rgb(34,34,34);background-color:rgba(0,0,0,0)">Blockchain-based big data sharing</span></li><li style="overflow-wrap: break-word;"><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:13.35pt;line-height:inherit;font-family:arial,helvetica,sans-serif;vertical-align:baseline;color:rgb(34,34,34);background-color:rgba(0,0,0,0)">Security and privacy issues in blockchain</span></li><li style="overflow-wrap: break-word;"><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:13.35pt;line-height:inherit;font-family:arial,helvetica,sans-serif;vertical-align:baseline;color:rgb(34,34,34);background-color:rgba(0,0,0,0)">Cyber hacking, next generation fire wall</span></li><li style="overflow-wrap: break-word;"><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:13.35pt;line-height:inherit;font-family:arial,helvetica,sans-serif;vertical-align:baseline;color:rgb(34,34,34);background-color:rgba(0,0,0,0)">Cyber monitoring, incident response</span></li><li style="overflow-wrap: break-word;"><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:13.35pt;line-height:inherit;font-family:arial,helvetica,sans-serif;vertical-align:baseline;color:rgb(34,34,34);background-color:rgba(0,0,0,0)">Database security, data center security</span></li><li style="overflow-wrap: break-word;"><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:13.35pt;line-height:inherit;font-family:arial,helvetica,sans-serif;vertical-align:baseline;color:rgb(34,34,34);background-color:rgba(0,0,0,0)">Social engineering, insider threats, advance spear phishing</span></li><li style="overflow-wrap: break-word;"><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:13.35pt;line-height:inherit;font-family:arial,helvetica,sans-serif;vertical-align:baseline;color:rgb(34,34,34);background-color:rgba(0,0,0,0)">Cyber threat intelligence</span></li><li style="overflow-wrap: break-word;"><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:13.35pt;line-height:inherit;font-family:arial,helvetica,sans-serif;vertical-align:baseline;color:rgb(34,34,34);background-color:rgba(0,0,0,0)">Security and fault tolerance for embedded or ubiquitous systems</span></li><li style="overflow-wrap: break-word;"><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:13.35pt;line-height:inherit;font-family:arial,helvetica,sans-serif;vertical-align:baseline;color:rgb(34,34,34);background-color:rgba(0,0,0,0)">Tele-health security in cloud computing</span></li><li style="overflow-wrap: break-word;"><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:13.35pt;line-height:inherit;font-family:arial,helvetica,sans-serif;vertical-align:baseline;color:rgb(34,34,34);background-color:rgba(0,0,0,0)">Sensor network security in cloud computing</span></li><li style="overflow-wrap: break-word;"><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:13.35pt;line-height:inherit;font-family:arial,helvetica,sans-serif;vertical-align:baseline;color:rgb(34,34,34);background-color:rgba(0,0,0,0)">Security policy and legal considerations</span></li><li style="overflow-wrap: break-word;"><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:13.35pt;line-height:inherit;font-family:arial,helvetica,sans-serif;vertical-align:baseline;color:rgb(34,34,34);background-color:rgba(0,0,0,0)">Cloud and networking security</span></li><li style="overflow-wrap: break-word;"><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:13.35pt;line-height:inherit;font-family:arial,helvetica,sans-serif;vertical-align:baseline;color:rgb(34,34,34);background-color:rgba(0,0,0,0)">Cloud computing and networking models</span></li><li style="overflow-wrap: break-word;"><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:13.35pt;line-height:inherit;font-family:arial,helvetica,sans-serif;vertical-align:baseline;color:rgb(34,34,34);background-color:rgba(0,0,0,0)">Virtualization for big data on cloud</span></li><li style="overflow-wrap: break-word;"><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:13.35pt;line-height:inherit;font-family:arial,helvetica,sans-serif;vertical-align:baseline;color:rgb(34,34,34);background-color:rgba(0,0,0,0)">MapReduce with cloud for big data processing</span></li><li style="overflow-wrap: break-word;"><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:13.35pt;line-height:inherit;font-family:arial,helvetica,sans-serif;vertical-align:baseline;color:rgb(34,34,34);background-color:rgba(0,0,0,0)">Heterogeneous architecture for cloud computing</span></li><li style="overflow-wrap: break-word;"><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:13.35pt;line-height:inherit;font-family:arial,helvetica,sans-serif;vertical-align:baseline;color:rgb(34,34,34);background-color:rgba(0,0,0,0)">Dynamic resource sharing algorithm for cloud computing</span></li><li style="overflow-wrap: break-word;"><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:13.35pt;line-height:inherit;font-family:arial,helvetica,sans-serif;vertical-align:baseline;color:rgb(34,34,34);background-color:rgba(0,0,0,0)">Load balance for cloud computing</span></li><li style="overflow-wrap: break-word;"><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:13.35pt;line-height:inherit;font-family:arial,helvetica,sans-serif;vertical-align:baseline;color:rgb(34,34,34);background-color:rgba(0,0,0,0)">Mobile cloud computing</span></li><li style="overflow-wrap: break-word;"><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:13.35pt;line-height:inherit;font-family:arial,helvetica,sans-serif;vertical-align:baseline;color:rgb(34,34,34);background-color:rgba(0,0,0,0)">Mobile commerce security and privacy</span></li><li style="overflow-wrap: break-word;"><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:13.35pt;line-height:inherit;font-family:arial,helvetica,sans-serif;vertical-align:baseline;color:rgb(34,34,34);background-color:rgba(0,0,0,0)">Green cloud computing</span></li><li style="overflow-wrap: break-word;"><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:13.35pt;line-height:inherit;font-family:arial,helvetica,sans-serif;vertical-align:baseline;color:rgb(34,34,34);background-color:rgba(0,0,0,0)">Embedded networks and sensor network optimizations</span></li><li style="overflow-wrap: break-word;"><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:13.35pt;line-height:inherit;font-family:arial,helvetica,sans-serif;vertical-align:baseline;color:rgb(34,34,34);background-color:rgba(0,0,0,0)">Cyber Security in emergent technologies</span></li></ul></ul></div></div></div>