The main goal of Fog Computing and other related Edge paradigms, such as Multi-Access Edge Computing, is to decentralize the Cloud and bring some of its services closer to the edge of the network, where data are generated and decisions are made. Cloud-enabled edge platforms will be able to cooperate not only with each other but with the cloud, effectively creating a collaborative and federated environment. This paradigm shift will fulfill the needs of novel services, such as augmented reality, that have particularly stringent requirements like extremely low latency. It will also help improve the vision of the Internet of Things by improving its scalability and overall functionality, among other benefits.

To enable this vision, a number of platforms and technologies need to securely coexist, including sensors and actuators, edge-deployed systems, software-defined networks, hardware virtualization, data mining mechanisms, etc. However, this paradigm shift calls for new security challenges and opportunities to leverage services for new scenarios and applications. The field of edge computing security is almost unexplored, and demands further attention from the research community and industry in order to unleash the full potential of this paradigm.

This workshop expects original research papers on, but not limited to, the topics described below:

  • Edge devices security
  • Attacks and Countermeasures to Edge computing platforms
  • Authentication and Access control in Edge computing
  • Accountability and Accounting in Edge computing
  • Identity management systems in Edge computing
  • Secure federation of Edge computing devices
  • Secure Orchestration and Management of Edge devices
  • Secure Software-Defined Networking for Edge computing
  • Secure Virtualization in Edge Computing
  • Secure Migration of resources in Edge Computing
  • Data and Computation integrity in Edge Computing
  • Trust and Reputation Management in Edge computing
  • Privacy in Edge Computing
  • Intrusion Detection and Prevention systems for Edge computing
  • Digital Forensics in Edge Computing
  • Risk Analysis in Edge Computing
  • Incident Management in Edge Computing
Revised selected papers will be published as a joint post-proceedings by Springer in the Lecture Notes in Computer Science (LNCS) series with other ESORICS Workshops (confirmed).


Contact the organizing committe:

Important Dates

Submission deadline30th June 2017
7th July 2017
Authors' notification30th July 2017
Camera ready version27th August 2017