The 2013 International Workshop on Security in Cloud Computing

held in conjunction with the 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS)
May 8-10, 2013 Hangzhou, China.

CFP | Important dates | Submission | Program | Organizers

Call for Papers

Cloud computing has emerged as today's most exciting computing paradigm shift in information technology. With the efficient sharing of abundant computing resources in the cloud, users can economically enjoy the on-demand high quality cloud applications and services without committing large capital outlays locally. While the cloud benefits are compelling, its unique attributes also raise many security and privacy challenges in areas such as data security, recovery, privacy, access control, trusted computing, as well as legal issues in areas such as regulatory compliance, auditing, and many others. This workshop aims to bring together the research efforts from both the academia and industry in all security aspects related to cloud computing. We encourage submissions on all theoretical and practical aspects, as well as experimental studies of deployed systems. Topics of interests include (but are not limited to) the following subject categories:

Authors are invited to submit either Research Papers or Position Papers or both. Position Papers that define new problems in cloud computing security or provide visions and clarifications of cloud computing security are solicited. Regular Research Papers that present novel research results on security and privacy in cloud computing.

Important Dates

Submissions Deadline: Feb. 8, 2013 (extended deadline)
Notification Date: Feb. 27, 2013
Final Submission Date: Mar. 10, 2013
Workshop: May 7, 2013


Camera-ready Preparation Instruction:

Submissions must be written in English with at most 8 pages including the bibliography and appendices. Submissions must be in double-column ACM format with a font no smaller than 9 point. Please use the ACM SIG Proceedings Templates (download here). Only PDF files will be accepted. Accepted papers will be published by ACM Press as conference proceedings in USB thumb drives and in the ACM DigitalLibrary.

Electronic submission site:


08:45 - 09:00 Welcome Message
Keynote (Keynote Chair: Kui Ren, State University of New York, Buffalo)
09:00 - 10:00 Secure Access to Outsourced Data
Prof. Robert Deng, Singapore Management University, Singapore.
10:00 - 10:15 Break
  Technical Session I (Session Chair: Sherman S.M. Chow, The Chinese University of Hong Kong)
10:15 - 10:35
Characterizing Hypervisor Vulnerabilities in Cloud Computing Servers
Diego Perez-Botero, Jakub Szefer and Ruby B. Lee, Princeton University
10:35 - 10:55
Verification of Data Redundancy in Cloud Storage
Zhan Wang, State Key Laboratory of Information Security, IIE, Chinese Academy of Sciences, Kun Sun, George Mason University, Sushil Jajodia, George Mason University, and Jiwu Jing, State Key Laboratory of Information Security, IIE, Chinese Academy of Sciences.
10:55 - 11:15
Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud
Jiawei Yuan and Shucheng Yu, University of Arkansas at Little Rock
11:15 - 11:30 Break
  Technical Session II (Session Chair: Cong Wang, City University of Hong Kong)
11:30 - 11:50
Verifying that the Cloud Stores Data with Redundancies
Sumanta Sarkar, Rei Safavi-Naini and Liang Feng Zhang, University of Calgary
11:50 - 12:10
How to Use Attribute-Based Encryption to Implement Role-based Access Control in the Cloud
Yan Zhu, University of Science and Technology Beijing, Di Ma, University of Michigan-Dearborn, Changjun Hu, University of Science and Technology Beijing, and Dijiang Huang, Arizona State University.
12:10 - 12:30
PRIAM: Privacy preserving identity and access management scheme in cloud
Jinbo Xiong, Fujian Normal University
12:30 - 13:45 Lunch Break
                    Technical Session III (Session Chair: Di Ma, University of Michigan-Dearborn)
13:45 - 14:05
Hub: HeterogeneoUs Bucketization for Database Outsourcing
Lei Xu and Xiaoxin Wu, Huawei Technologies Co. Ltd.
14:05 - 14:25
Secure k-NN Computation on Encrypted Cloud Data Without Sharing Key with Query Usersl
Youwen Zhu, Rui Xu and Tsuyoshi Takagi, Kyushu University
14:25 - 14:45
Verifying Correctness of Inner Product of Vectors in Cloud Computing
Gang Sheng, Northeastern University, China, Tao Wen, Northeastern University, China, Quan Guo, Dalian Neusoft University of Information, and Ying Yin, Northeastern University, China


General Chair

Xingming Sun, Nanjing University of Information Science & Technology

Program Co-Chairs

Elaine Shi, University of Maryland, College Park
Kui Ren, State University of New York, Buffalo

Web and Publicity Chair

Cong Wang, City University of Hong Kong

TPC Members

Gail-Joon Ahn, Arizona State University
Ning Cao, Google Inc.
Tingting Chen, Oklahoma State University
Richard Chow, Samsung Research
Sherman S.M. Chow, The Chinese University of Hong Kong
Reza Curtmola, New Jersey Institute of Technology
Roberto Di Pietro, Università di Roma Tre
Xuhua Ding, Singapore Management University
Sara Foresti, Università degli Studi di Milano
Keesook Han, Air Force Research Laboratory
Ragib Hasan, University of Alabama at Birmingham
Dijiang Huang, Arizona State University
Yan Huang, University of Virginia and University of Maryland
Xuejia Lai, Shanghai Jiao Tong University
Xiehua Li, Hunan University
Jiqiang Liu, Beijing Jiaotong University
Yao Liu, University of South Florida
Rongxing Lu, University of Waterloo
Di Ma, University of Michigan-Dearborn
Abedelaziz Mohaisen, Verisign Labs
Charalampos Papamanthou, UC Berkeley
Ning Qu, Google Inc.
Eleanor Rieffel, FXPAL
Anna Squicciarini, The Pennsylvania State University
Jinyuan Sun, The University of Tennessee, Knoxville
Jakub Szefer, Princeton University
Cong Wang, City University of Hong Kong
Licheng Wang, Beijing University of Posts and Telecommunications
Qian Wang, Wuhan University
Zhi Wang, Florida State University
Tao Wei, UC Berkeley and Peking University
Jian Weng, Jinan University
Hui Xue, UC Berkeley
Siu-Ming Yiu, The University of Hong Kong
Shucheng Yu, University of Arkansas at Little Rock
Bingsheng Zhang, State University of New York, Buffalo
Hong-Sheng Zhou, University of Maryland, College Park
Chi Zhang, University of Science and Technology of China
Xinchang Zhang, Shangdong Academy of Sciences, China
Yan Zhu, Peking University

Updated: April 2nd, 2013