Scopes
Topic 1: Data Security
Data Protection and Privacy
Information Security
Network security
Big data security
Artificial Intelligence and Data Security
Data mining
Symmetric and Asymmetric Encryption Algorithms
Lightweight encryption algorithm
Homomorphic encryption
Data Encryption Standards and Protocols
Hash functions and digital signatures
Data integrity verification mechanism
Secure data transmission
Data encryption
Topic 2: Cloud Computing
Cloud Economy
Distributed and point-to-point search
Cloud middleware framework
Cloud optimization and automation
Cloud Quality and Performance
Cloud resource virtualization and combination
Cloud solution design pattern
Cloud management and operation for enterprise business transformation
Intelligent computing infrastructure and platforms
Topic 3: Data Encryption and Privacy Protection
Hardware and software solutions for big data search, storage, and management
Privacy and Security of Cloud and Big Data
Virtualization technology, cloud data management and storage, cloud resource management and QoS
Big data analysis encryption
Big data analysis management
Big Data as a Service
Big data encryption
Big Data in Enterprise Performance Management
Big Data in Enterprise Management Models and Practices
Big Data in Government Management Models and Practices
Using big data analysis for collaborative threat detection
Management Issues of Social Network Big Data
Models and Languages for Big Data Protection
Privacy Protection and Big Data Analytics
Security and Privacy of Big Data
Big Data Management
Big data protection, integrity, and privacy
The secure application of big data
Anomaly detection in ultra large scale systems
The persistence and preservation of big data
Data quality issues: such as validation, metrics, optimization, and consistency
Data Protection and Privacy
Information Security
Network security
Big data security
Artificial Intelligence and Data Security
Data mining
Symmetric and Asymmetric Encryption Algorithms
Lightweight encryption algorithm
Homomorphic encryption
Data Encryption Standards and Protocols
Hash functions and digital signatures
Data integrity verification mechanism
Secure data transmission
Data encryption
Topic 2: Cloud Computing
Cloud Economy
Distributed and point-to-point search
Cloud middleware framework
Cloud optimization and automation
Cloud Quality and Performance
Cloud resource virtualization and combination
Cloud solution design pattern
Cloud management and operation for enterprise business transformation
Intelligent computing infrastructure and platforms
Topic 3: Data Encryption and Privacy Protection
Hardware and software solutions for big data search, storage, and management
Privacy and Security of Cloud and Big Data
Virtualization technology, cloud data management and storage, cloud resource management and QoS
Big data analysis encryption
Big data analysis management
Big Data as a Service
Big data encryption
Big Data in Enterprise Performance Management
Big Data in Enterprise Management Models and Practices
Big Data in Government Management Models and Practices
Using big data analysis for collaborative threat detection
Management Issues of Social Network Big Data
Models and Languages for Big Data Protection
Privacy Protection and Big Data Analytics
Security and Privacy of Big Data
Big Data Management
Big data protection, integrity, and privacy
The secure application of big data
Anomaly detection in ultra large scale systems
The persistence and preservation of big data
Data quality issues: such as validation, metrics, optimization, and consistency
Important Dates/重要日期
- Submission Deadline: 2025.8.10
- Registration Deadline: 2025.8.15
- Conference Date: 2025.8.30
- Notification Date: About a week after the submission
Submission Portal/投稿方式
Mail Address: ei_sahwm@163.com
If you have any question or need any assistance regarding the conference, please feel free to contact our conference specialists:
唐老师
+86-17168296597(微信同号)
3264234551
--
+86---(微信同号)
--