Cloud computing has emerged as today's most exciting computing paradigm shift in information technology. With the efficient sharing of abundant computing resources in the cloud, users can economically enjoy the on-demand high quality cloud applications and services without committing large capital outlays locally. While the cloud benefits are compelling, its unique attributes also raise many security and privacy challenges in areas such as data security, recovery, privacy, access control, trusted computing, as well as legal issues in areas such as regulatory compliance, auditing, and many others. To implement secure and privacy-aware environments which can provide on-demand computing and high-quality service for cloud users is extremely urgent. This workshop is intended to bring together researchers, developers, and practitioners in security, privacy and mobile computing communities. We encourage submissions on all theoretical and practical aspects, as well as experimental studies of deployed systems.
Authors are invited to submit either Research Papers or Position Papers or both. Position Papers that define new problems in cloud computing security or provide visions and clarifications of cloud computing security are solicited. Regular Research Papers that present novel research results on security and privacy in cloud computing are also welcome.
Program Co-Chairs
Cong Wang, City University of Hong Kong, China
Murat Kantarcioglu, University of Texas at Dallas, US
Steering Committee
Kui Ren, State University of New York at Buffalo, US
Elaine Shi, Cornell University, US
Robert Deng, Singapore Management University, Singapore
Web Chair
Xingliang Yuan, City University of Hong Kong, China
Topics of interests include (but are not limited to) the following subject categories
Secure cloud architecture
Cloud cryptography
Cloud access control and key management
Identification and privacy in cloud
Integrity assurance for data outsourcing
Integrity and verifiable computation
Computation over encrypted data
Software and data segregation security
Secure management of virtualized resources
Trusted computing technology
Joint security and privacy aware protocol design
Failure detection and prediction
Secure data management within and across data centers
Availability, recovery and auditing
Secure computation outsourcing
Secure mobile cloud
04月02日
2017
会议日期
初稿截稿日期
初稿录用通知日期
终稿截稿日期
注册截止日期
留言