The Third International Workshop on Security in Cloud Computing (SCC)


held in conjunction with the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS)
April 14th, 2015, Singapore.

CFP | Important dates | Submission | Previous Editions | Venue | Program | Organizers

Call for Papers

Cloud computing has emerged as today's most exciting computing paradigm shift in information technology. With the efficient sharing of abundant computing resources in the cloud, users can economically enjoy the on-demand high quality cloud applications and services without committing large capital outlays locally.

While the cloud benefits are compelling, its unique attributes also raise many security and privacy challenges in areas such as data security, recovery, privacy, access control, trusted computing, as well as legal issues in areas such as regulatory compliance, auditing, and many others.

This workshop aims to bring together the research efforts from both the academia and industry in all security aspects related to cloud computing.

We encourage submissions on all theoretical and practical aspects, as well as experimental studies of deployed systems. Topics of interests include (but are not limited to) the following subject categories:

Authors are invited to submit either Research Papers or Position Papers or both. Position Papers that define new problems in cloud computing security or provide visions and clarifications of cloud computing security are solicited. Regular Research Papers that present novel research results on security and privacy in cloud computing are also welcome.

Important Dates


Submissions Deadline:
Dec. 23, 2014
extended to Jan. 5, 2015
Notification:
Jan. 19, 2014
now Jan. 31, 2015
Final Submission Date:
Jan. 28, 2014
now Feb. 14, 2015
Workshop: April 14, 2015

Submission

Submissions must be written in English with at most 8 pages including the bibliography and appendices. Submissions must be in double-column ACM format with a font no smaller than 9 point. Please use the ACM SIG Proceedings Templates (download here). Only PDF files will be accepted. Accepted papers will be published by ACM Press as conference proceedings in USB thumb drives and in the ACM DigitalLibrary.

Electronic submission site: https://easychair.org/conferences/?conf=asiaccsscc2015.

Camera-ready preparation instruction: http://www.sheridanprinting.com/typedept/scc.htm

Previous Editions

Venue

Program


09:00 - 09:10 Welcome Message
Keynote
(Keynote Chair: Sherman S. M. Chow, The Chinese University of Hong Kong, Hong Kong)
09:10 - 10:00 Secure Outsourcing Image Feature Extraction: Challenges and Solutions
Dr. Kui Ren, State University of New York at Buffalo, US
10:00 - 10:30 Coffee Break
  S1: Cloud Storage and Data Privacy
(Session Chair: Cong Wang, City University of Hong Kong, Hong Kong)
10:30 - 10:55 Entangled Encodings and Data Entanglement [ePrint]
Giuseppe Ateniese; Özgür Dagdelen; Ivan Damgård; Daniele Venturi
10:55 - 11:20 Armadillo: a compilation chain for privacy preserving applications [ePrint]
Sergiu Carpov; Paul Dubrulle; Renaud Sirdey
11:20 - 11:45 Accumulating Automata and Cascaded Equations Automata
for Communicationless Information Theoretically Secure Multi-Party Computation
[ePrint]
Shlomi Dolev; Niv Gilboa; Ximing Li
12:10 - 13:30 Lunch Break
  S2: Re-encryption in Cloud
(Session Chair: Lihua Wang, National Institute of Information and Communications Technology, Japan)
13:30 - 13:55 Fully Secure Inner-Product Proxy Re-Encryption with Constant Size Ciphertext
Michael Backes; Martin Gagne; Sri Aravinda Krishnan Thyagarajan
13:55 - 14:20 Certificateless Proxy Re-Encryption Without Pairing: Revisited [ePrint]
Akshayaram Srinivasan; Chandrasekaran Pandurangan
14:20 - 14:45 Secure Data Devolution:
Practical Re-encryption with Auxiliary Data in LWE-based Somewhat Homomorphic Encryption

Masaya Yasuda; Takeshi Koshiba; Takeshi Shimoyama; Jun Kogure; Kazuhiro Yokoyama
S3: Invited Talks on Emerging Problems in Cloud Security
(Panel Chair: Kui Ren, State University of New York at Buffalo, US)
14:45 - 15:05 Processing Encrypted Data
Sherman S. M. Chow, The Chinese University of Hong Kong, Hong Kong
15:05 - 15:25 Some Challenges on Enabling Encrypted Cloud Media Centre
Cong Wang, City University of Hong Kong, Hong Kong
15:20 - 15:50 Coffee Break
  S4: Authorization and Certification
(Session Chair: Zhan Wang, Chinese Academy of Sciences, China)
16:00- 16:25 Authorization Federation in IaaS Multi Cloud
Navid Pustchi; Ram Krishnan; Ravi Sandhu
16:25 - 16:50 Data Freshness for Non-Trusted Environments Using Disposable Certificates
Kevin Koerner; Thomas Walter; Michael Menth
Closing Remark
(Session Chair: Sherman S. M. Chow, The Chinese University of Hong Kong, Hong Kong)
18:00 - 20:00 Welcome Reception

Organizers


Program Co-Chairs

Sherman S.M. Chow, The Chinese University of Hong Kong, Hong Kong
Danfeng Yao, Virginia Tech, US

Steering Committee

Kui Ren, State University of New York at Buffalo, US
Elaine Shi, University of Maryland at College Park, US
Robert Deng, Singapore Management University, Singapore

Web Chair

Cong Wang, City University of Hong Kong, Hong Kong

TPC Members

Elli Androulaki, IBM Research Zürich, Switzerland
Erik-Oliver Blass, Airbus Group Innovations, Germany
Michael Brenner, Leibniz Universität Hannover, Germany
Roy Campbell, University of Illinois at Urbana-Champaign, US
Ee-Chien Chang, The National University of Singapore, Singapore
Sherman S. M. Chow, The Chinese University of Hong Kong, Hong Kong
Charles Clancy, Virginia Tech, US
Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
Shlomi Dolev, Ben-Gurion University, Israel
Dario Fiore, IMDEA Software Institute, Spain
Sara Foresti, Università degli Studi di Milano, Italy
Félix Gómez Mármol, NEC Laboratories Europe, Germany
Stefanos Gritzalis, University of the Aegean, Greece
Hsu-Chun Hsiao, The National Taiwan University, Taiwan
Trent Jaeger, The Pennsylvania State University, US
Pramod Jamkhedkar, AT&T Labs Research, US
Florian Kerschbaum, SAP Research, Germany
Christopher Kruegel, University of California at Santa Barbara, US
Wing Cheong Lau, The Chinese University of Hong Kong, Hong Kong
Kwangsu Lee, Korea University, Korea
John C.S. Lui, The Chinese University of Hong Kong, Hong Kong
Aziz Mohaisen, Verisign Labs, US
Refik Molva, Eurecom, France
Payman Mohassel, Yahoo Labs, US
Olga Ohrimenko, Microsoft Research Cambridge, UK
Xinming Ou, Kansas State University, US
Charalampos Papamanthou, University of Maryland at College Park, US
Rahul Potharaju, Microsoft Research Redmond, US
Peter Y.A. Ryan, The University of Luxembourg, Luxembourg
Ahmad-Reza Sadeghi, Technische Universität Darmstadt, Germany
Rei Safavi-Naini, The University of Calgary, Canada
Pierangela Samarati, Università degli Studi di Milano, Italy
Daniel Slamanig, Graz University of Technology, Austria
Alessandro Sorniotti, IBM Research Zürich, Switzerland
Anna Squicciarini, The Pennsylvania State University, US
Angelos Stavrou, George Mason University, US
Douglas Stebila, Queensland University of Technology, Australia
Jakub Szefer, Yale University, US
Roberto Tamassia, Brown University, US
Marten van Dijk, The University of Connecticut, US
Cong Wang, City University of Hong Kong, Hong Kong
Lihua Wang, National Institute of Information and Communications Technology, Japan
Wendy Hui Wang, Stevens Institute of Technology, US
Zhan Wang, Chinese Academy of Sciences, China
Edgar Weippl, SBA Research, Austria
Qianhong Wu, Beihang University, China
Jia Xu, Institute for Infocomm Research, Singapore
Danfeng Yao, Virginia Tech, US
Haibin Zhang, University of North Carolina at Chapel Hill, US
Xinwen Zhang, Samsung Telecom America, US

Updated: Mar. 10th, 2015