The 2013 International Workshop on Security in Cloud Computing
held in conjunction with the 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS)
May 8-10, 2013 Hangzhou, China.
Call for Papers
Cloud computing has emerged as today's most exciting computing paradigm shift in information technology. With the efficient sharing of abundant computing resources in the cloud, users can economically enjoy the on-demand high quality cloud applications and services without committing large capital outlays locally. While the cloud benefits are compelling, its unique attributes also raise many security and privacy challenges in areas such as data security, recovery, privacy, access control, trusted computing, as well as legal issues in areas such as regulatory compliance, auditing, and many others. This workshop aims to bring together the research efforts from both the academia and industry in all security aspects related to cloud computing. We encourage submissions on all theoretical and practical aspects, as well as experimental studies of deployed systems. Topics of interests include (but are not limited to) the following subject categories:
Authors are invited to submit either Research Papers or Position Papers or both. Position Papers that define new problems in cloud computing security or provide visions and clarifications of cloud computing security are solicited. Regular Research Papers that present novel research results on security and privacy in cloud computing.
Camera-ready Preparation Instruction: http://www.sheridanprinting.com/typedept/cloudcomputing.htm
Submissions must be written in English with at most 8 pages including the bibliography and appendices. Submissions must be in double-column ACM format with a font no smaller than 9 point. Please use the ACM SIG Proceedings Templates (download here). Only PDF files will be accepted. Accepted papers will be published by ACM Press as conference proceedings in USB thumb drives and in the ACM DigitalLibrary.
Electronic submission site: https://www.easychair.org/conferences/?conf=asiaccsscc13
|08:45 - 09:00||Welcome Message|
|Keynote (Keynote Chair: Kui Ren, State University of New York, Buffalo)|
|09:00 - 10:00||Secure Access to Outsourced Data
Prof. Robert Deng, Singapore Management University, Singapore.
|10:00 - 10:15||Break|
|Technical Session I (Session Chair: Sherman S.M. Chow, The Chinese University of Hong Kong)|
|10:15 - 10:35||
Characterizing Hypervisor Vulnerabilities in Cloud Computing Servers
Diego Perez-Botero, Jakub Szefer and Ruby B. Lee, Princeton University
|10:35 - 10:55||
Verification of Data Redundancy in Cloud Storage
Zhan Wang, State Key Laboratory of Information Security, IIE, Chinese Academy of Sciences, Kun Sun, George Mason University, Sushil Jajodia, George Mason University, and Jiwu Jing, State Key Laboratory of Information Security, IIE, Chinese Academy of Sciences.
|10:55 - 11:15||
Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud
Jiawei Yuan and Shucheng Yu, University of Arkansas at Little Rock
|11:15 - 11:30||Break|
|Technical Session II (Session Chair: Cong Wang, City University of Hong Kong)|
|11:30 - 11:50||
Verifying that the Cloud Stores Data with Redundancies
Sumanta Sarkar, Rei Safavi-Naini and Liang Feng Zhang, University of Calgary
|11:50 - 12:10||
How to Use Attribute-Based Encryption to Implement Role-based Access Control in the Cloud
Yan Zhu, University of Science and Technology Beijing, Di Ma, University of Michigan-Dearborn, Changjun Hu, University of Science and Technology Beijing, and Dijiang Huang, Arizona State University.
|12:10 - 12:30||
PRIAM: Privacy preserving identity and access management scheme in cloud
Jinbo Xiong, Fujian Normal University
|12:30 - 13:45||Lunch Break|
|Technical Session III (Session Chair: Di Ma, University of Michigan-Dearborn)|
|13:45 - 14:05||
Hub: HeterogeneoUs Bucketization for Database Outsourcing
Lei Xu and Xiaoxin Wu, Huawei Technologies Co. Ltd.
|14:05 - 14:25||
Secure k-NN Computation on Encrypted Cloud Data Without Sharing Key with Query Usersl
Youwen Zhu, Rui Xu and Tsuyoshi Takagi, Kyushu University
|14:25 - 14:45||
Verifying Correctness of Inner Product of Vectors in Cloud Computing
Gang Sheng, Northeastern University, China, Tao Wen, Northeastern University, China, Quan Guo, Dalian Neusoft University of Information, and Ying Yin, Northeastern University, China