BDS 2019: Big Data Security |
Website | http://bds.teamsb.net/ |
Submission link | https://easychair.org/conferences/?conf=bds2019 |
Abstract registration deadline | August 15, 2018 |
Submission deadline | November 15, 2018 |
The research in the field of Big data in computer science and mathematics has become the most remarkable apparatus. Big data produces exceptional amounts of data points, which gives greater insights that determinate sensational research, better business decisions and greater value for customers. To accomplish these endings, establishments need to be able to handle the data includes sensitive private information efficiently, quickly and thus the implementation of security issue creates a vigorous role. End-point devices create the main factors for observance the big data. Processing, Storage and other necessary responsibilities have been performed by the help of input data, which has been generated by the end-points. Therefore, an association should make sure to use an authentic and valid end-point security. Due to large amounts of data generation, it is quite impossible to maintain regular checks by most of the establishments. Therefore, observe and perform the security checks can be the utmost promising in real time. Cloud-based storage has enabled data mining and collection. Though, this big data and cloud storage incorporation has produced an encounter to secrecy and security threats.
Submission Guidelines
All papers must be original and not simultaneously submitted to another journal or conference. The following paper categories are welcome:
- Prospective authors are invited to submit a 3- 4 pages Abstract of the paper along with title of the paper and author details. Abstract should highlight the novelty and contribution of the proposed article.
- Author need to submit their abstract using the Easy Chair Submission Link given in http://bds.teamsb.net/#submission
List of Topics
-
Big Data fundamentals introduction and background.
Experiments of security solutions:
Concepts of data security.
Recovery as well as disaster recovery system.
Organizational security: issues and recommendations.
Encryption Methodologies.
Identity management, Firewall, Access Control.
Ethical hacking and Social engineering techniques.
Security modeling and business process modeling.
Large-scale Information Systems and Applications.
Analytics, Intelligence and Knowledge Engineering.
Location-based privacy. - Conceptual frameworks and models.
- Large-scale Cloud simulation and Big Data.
- Legal Challenges, Risk Modeling, Trust and Privacy.
Publication
BDS 2019 proceedings will be published in De Gruyter
Contact
All questions about submissions should be emailed to dr.siddhartha.bhattacharyya@gmail.com