Ubiquitous sensors and processors embedded in the physical environment hold promise of a smart world where the personal data collected is used to derive computational intelligence and provide trustworthy, personalized, and adaptive services to people. The sensors are often unobtrusive and continually collect data as people perform their daily activities. The personal data thus collected, can reveal addictive habits and embarrassing behaviors, raising privacy and security concerns that threaten the very adoption of these ubiquitous technologies.

The PTUC workshop intends to bring together researchers to discuss these emerging privacy and security challenges that arise due to the sharing of personal, time-varying, and voluminous sensory data. These challenges, are fundamentally different than the traditional notions of privacy defined for static and structured databases, and require new privacy-preserving techniques and realizable cryptographic mechanisms, that account for the unique characteristics and limitations of the ubiquitous platforms.

The workshop invites papers presenting original research results addressing both theoretical and practical aspects of privacy and security that arise while sharing of personal sensor data. Papers may include but need not be limited to:

  • New privacy-preserving techniques.
  • Privacy metrics and evaluation of existing privacy/security techniques.
  • Construction and evaluation of privacy-aware systems.
  • Privacy attacks on existing security/privacy systems.
  • Authentication mechanisms.
  • Embedded systems security.
  • Cloud security.
  • Security/Privacy threat modeling.
  • Usable security and privacy.
  • Applied cryptography.
  • Access control.
  • Intrusion detection.
  • Hardware-based security mechanisms.
  • CPS(Cyber-Physical Systems) security.

Interested authors can either submit full technical papers (at most 6 pages) or short position papers (at most 4 pages). For formatting instructions and other details, authors are requested to follow the submission guidelines available on the

UIC2015 submission page.

Accepted papers must be presented at the workshop and will appear in the proceedings of the UIC2015 conference published by the IEEE Computer Society. At least one author of each published paper is required to register for the conference and present their work at PTUC 2015.