With a Mobile Cloud Computing (MCC) market value of US$9.5 billion in 2014 and with more than 1 trillion cloud-ready devices in the next four years, MCC is considered as one of today's hottest new technologies in both academia and industry. MCC integrates different major technologies such as smart devices technologies (phones, tablets, watches, …etc), cloud services, big data, and cloud computing in one platform that services the end users. Despite the rapid growth of MCC, many issues are still challenging and need to be addressed. These challenges are related to the underlying networks , cloud services, security, the required Quality of Service, the availability of services, the needed user data management, and many others. The International Workshop on Mobile Cloud Computing systems, Management, and Security (MCSMS) is introduced as a forum for scientists, researchers, students, and practitioners to present their latest research results, ideas, and developments in the area of Mobile Cloud Computing that addresses the aforementioned challenges.
MCSMS 2017 workshop aims to investigate the opportunities and requirements for Mobile Cloud Computing, as well as Fog and Edge Computing domains. The objective of MCSMS2017 is to provide a forum for scientists, engineers, and researchers to discuss their research and results on all aspects of Mobile Cloud Computing (MCC) as well as Fog and Mobile Edge Computing (FMEC). . Researchers are encouraged to submit original research contributions in all major areas, which include, but not limited to:
* Mobile Cloud Computing Systems.
* Mobile Cloud Computing Security and Privacy Issues.
* Mobile Cloud Computing Pricing and billing models.
* Mobile Cloud Computing support for VANETS and MANETS
* Cloudlet based computing
* Lightweight authentication mechanisms in Mobile Cloud Computing architecture.
* Access Control models in Mobile Cloud Computing.
* Identification of incentives for FMEC service providers.
* The future perspective for Mobile Cloud Computing: Challenges and Open Issues.
* Mobile Cloud Computing Quality of Service (QoS) improvements techniques.
* Mobile Cloud Computing architecture features and evolution.
* Mobile Cloud Computing Networking and Communication considerations
* Mobile Cloud Computing Software development platform and enabled new applications
* Mobile Cloud Computing Power Efficiency for resources and networking
* Mobile Cloud Computing Availability and Quality of Service.
* Security and privacy of mobile cloud computing
* Mobile Cloud Computing Resource Management, Optimization, and Migration
* Mobile Cloud Computing Support for Multimedia Communication and Game Computing
* Mobile Cloud Computing Support for Big Data Management
* Mobile Cloud Computing intrusion detection systems
* Security of pricing and billing for mobile cloud computing services
* Security of mobile, peer-to-peer and pervasive services in clouds
* Security of mobile commerce and mobile Internet of Things
* Security of mobile social networks
* Security and privacy in smartphone devices
* Security and privacy in social applications and networks
* Security of Mobile, peer-to-peer and pervasive services in clouds
* Network virtualization and cloud-based radio access networks
* Andy Rindos, IBM research, USA.
* Mohammad Alsmirat, Jordan University of Science and Technology, Jordan.
Technical Program Co-Chairs:
* Hideaki Nii, IIJ Innovation Institute Inc., Japan
* Houbing Song, West Virginia University, USA.
* Elhadj Benkhelifa, Staffordshire University, UK. firstname.lastname@example.org
* Periklis Chatzimisios, Alexander TEI of Thessaloniki, Greece
* Lo'ai Tawalbeh, UCSB, USA
* Shingo Yamaguchi, Yamaguchi University, Japan
* Paolo Bellavista, University of Bologna, Italy
* Danda Rawat, Georgia Southern University, USA.
* B.B. Gupta, National Institute of Technology Kurukshetra, India
* Yaser Jararweh, Jordan University of Science and Technology, Jordan.
* Qussai M. Yaseen, Jordan University of Science and Technology, Jordan
Invited Speaker and Panel Co-Chairs
* Mahmoud Al-Ayyoub, Jordan University of Science and Technology, Jordan
* Houbing Song, West Virginia University, USA.
* Dharma P. Agrawal, University of Cincinnati, USA
* Massimo Villari, UMessina, Italy
* Ajay Kshemkalyani, University of Illinois at Chicago, USA
* Yang Xiang, Deakin University, Australia
* Ajith Abraham, Machine Intelligence Research Labs (MIR Labs), Washington, USA
* Amiya Nayak, University of Ottawa, Canada
* Mehdi Shadaram, The University of Texas at San Antonio, USA
* Soumaya Cherkaoui, Université de Sherbrooke, Canada
* Muaz Niazi, COMSATS Institute of Information Technology, Islamabad, Pakistan
* Paolo Bellavista, DISI - University of Bologna, Italy
* Nadir Shah, COMSATS Institute of Information Technology, Wah Cantt, Pakistan
* Milena Radenkovic, University of Nottingham, UK
* Hassnaa Moustafa, Intel USA
* Ayaz Ahmad, COMSATS Institute of Information Technology, Wah Cantt, Pakistan
* Syed Hassan Ahmed, KNU, Republic of Korea
* Yasir Faheem, COMSATS Institute of Information Technology, Islamabad, Pakistan
* Zeeshan Ali Khan, University of Dammam, Kingdom of Saudi Arabia
* Yasir Saleem, Telecom SudParis, France
* Tariq Umer, COMSATS Institute of Information Technology, Wah Cantt, Pakistan
* Ibrar Yaqoob, University of Malaya, Malaysia
* Arif Ahmed,National Institute of Technology, Silchar, India
* Ibrahim Abaker Targio Hashem, University of Malaya, Malaysia
* Muhammad Khalil Afzal, COMSATS Institute of Information Technology, Wah Cantt, Pakistan
* Syed Hashim Raza Bukhari, COMSATS Institute of Information Technology, Attock, Pakistan
* Saida Maaroufi, Polytechnique Montreal, Canada
* Athar Ali Khan, COMSATS Institute of Information Technology, Wah Cantt, Pakistan
* T. Perumal, Universiti Putra Malaysia (UPM), Malaysia
* Zbigniew Leonowicz, Wroclaw University of Technology, Poland
* Sebastián García, CTU University, Prague, Czech Republic
* Muhammad Amjad, COMSATS Institute of Information Technology, Wah Cantt, Pakistan
* Zhiyong Zhang, Henan University of Science and Technology, China
* Angela Amphawan, Universiti Utara Malaysia (UUM), Malaysia
* Atsuhiro Goto, Institute of Information Security (IISEC), Japan
* T. C. Wan, Universiti Sains Malaysia (USM), Penang, Malaysia
* Chinthaka Premachandra, Tokyo University of Science, Japan
* Thi Thi Zin, Miyazaki University, Japan
* Ammar Almomani, Al- Balqa Applied University, Po.Box: 50, Irbid, Jordan
* Suresh Veluru, United Technologies Research Centre Ireland, Ltd., Ireland.
* Yogachandran Rahulamathavan, City University London, UK
* Neminath Hubballi, Indian Institute of Technology Indore, India
* Selvakumar Manickam, National Advanced IPv6 Centre, USM, Malaysia
* P. Raj, IBM Global Cloud Center of Excellence (COE), IBM, India.
* S. Karuppayah, Technische Universitat Darmstadt, Germany
* Esraa Alomari, Universiti Sains Malaysia, Malaysia
* Segun Adedugbe, Staffordshire University, UK
Papers selected for presentation will appear in the FMEC Proceedings, which will be published by the IEEE Computer Society and be submitted to IEEE Xplore for inclusion. Papers must be 6 pages in IEEE format, 10pt font using the IEEE 8.5" x 11" two-column format, single space, A4 format. All papers should be in PDF format, and submitted electronically at Paper Submission Link. A full paper must not exceed the stated length (including all figures, tables and references).
Submitted papers must present original unpublished research that is not currently under review for any other conference or journal. Papers not following these guidelines may be rejected without review. Also submissions received after the due date, exceeding length limit, or not appropriately structured may also not be considered. Authors may contact the Program Chair for further information or clarification.
Papers should be submitted electronically by the deadline to https://easychair.org/conferences/?conf=mcsms2017
Please refer to the link below for detailed instructions to complete your registrations and Final Submissions