(Click here to download CFP in PDF format)

The Cloud is becoming an enabler for enhanced control and management of IP and telecommunications networks. A rapidly-growing example of this is Software Defined Networking (SDN), in which the underlying tools include virtualisation and “Cloud” technology. However, a new paradigm is beginning to emerge: “Cloud” networks: nano, pico, small, large, super large, and extraordinarily large. Location of virtual machines is a major concern for performance optimisation, energy consumption, reliability, cost, etc. In such distributed global environments, control and adequate security measures are of particular concern, yet these, to date, have been largely overlooked giving rise to numerous attacks and incidents involving cloud and virtualised resources.

The objective of this conference is to present state-of-the-art solutions for Cloud solutions, and their associated management and orchestration. The first aspect of this conference will cover new control and orchestration solutions. A second aspect relates to the safety and security of applications made available through Cloud technology and solutions. For this reason new concepts such as an “authentication credentials cloud” solution can increase security in network protocols, as well as fixed and mobile applications. A third element that will be covered involves the solutions and inherent challenges involving the relationship between the control plane (hypervisors) and user space (virtual machines).

Areas of interest include, but are not limited to:

  • Cloud computing and network virtualization
  • Cloud networks and Distributed Cloud
  • Cloud of Security
  • Control algorithms using Cloud
  • Control and Secure Multi-Tenancy
  • Crowdsourcing and Cloud services
  • Cyber-attacks Cloud-oriented vs Cyber defense Cloud-oriented
  • Data Center Network Control, Security and Optimization
  • Internet of Things and Cloud
  • Intra-Cloud vs Inter-Cloud Control and Security
  • MEC Mobile Edge Computing
  • SDN: Software-Defined Networking
  • Security and control of Mobile Internet applications
  • Security of Virtual Machines
  • Security, trust and privacy challenges
  • Virtual Controller and interfaces
  • Virtual firewalls
  • Virtual identity management server
  • WiFi controller and Cloud approach

Paper Submission

Submitted papers must represent original material that is not currently under review in any other conference or journal, and has not been previously published. All submissions should be written in English with maximum of eight (8) printed pages (in Two-Column IEEE Conference Format), including text, figures and references.

Papers should be submitted through EDAS website

IEEE two-column conference templates that can be downloaded from

  • Full Paper – maximum length of 8 pages (10-point font) including tables, figures and references.
  • Short Paper – minimum length of 3 pages (10-point font) including tables, figures and references.

Best papers will be considered for fast-track publication in the Annals of Telecommunications (Springer, ISI-indexed)