The Second International Workshop on Security in Cloud Computingheld in conjunction with the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS) June 3, 2014, Kyoto, Japan. |
Call for Papers |
Cloud computing has emerged as today's most exciting computing paradigm shift in information technology. With the efficient sharing of abundant computing resources in the cloud, users can economically enjoy the on-demand high quality cloud applications and services without committing large capital outlays locally. While the cloud benefits are compelling, its unique attributes also raise many security and privacy challenges in areas such as data security, recovery, privacy, access control, trusted computing, as well as legal issues in areas such as regulatory compliance, auditing, and many others. This workshop aims to bring together the research efforts from both the academia and industry in all security aspects related to cloud computing. We encourage submissions on all theoretical and practical aspects, as well as experimental studies of deployed systems. Topics of interests include (but are not limited to) the following subject categories:
Authors are invited to submit either Research Papers or Position Papers or both. Position Papers that define new problems in cloud computing security or provide visions and clarifications of cloud computing security are solicited. Regular Research Papers that present novel research results on security and privacy in cloud computing are also welcome.
Important Dates |
Submission |
Camera-ready Preparation Instruction: http://www.sheridanprinting.com/typedept/scc.htm
Submissions must be written in English with at most 8 pages including the bibliography and appendices. Submissions must be in double-column ACM format with a font no smaller than 9 point. Please use the ACM SIG Proceedings Templates (download here). Only PDF files will be accepted. Accepted papers will be published by ACM Press as conference proceedings in USB thumb drives and in the ACM DigitalLibrary.
Electronic submission site: https://www.easychair.org/conferences/?conf=asiaccsscc14
Program |
09:00 - 09:10 | Welcome Message |
Keynote (Keynote Chair: Kui Ren, State University of New York, Buffalo) | |
09:10 - 10:10 | On the Security of Cloud Data Storage and Sharing Dr. Jianying Zhou, Infocomm Security Department, Institute for Infocomm Research, Singapore. |
10:10 - 10:30 | Coffee Break |
Technical Session I (Session Chair: Cong Wang, City University of Hong Kong) | |
10:30 - 10:55 | Verifiable Local Computation on Distributed Data
Liang Feng Zhang, Reihaneh Safavi-Naini, and Xiao Wei Liu, University of Calgary |
10:55 - 11:20 | CryptVMI: A Flexible and Encrypted Virtual Machine Introspection System in the Cloud Fangzhou Yao, Read Sprabery, and Roy Campbell, University of Illinois at Urbana-Champaign. |
11:20 - 11:45 | Cloud-Based User Authentication with Geo-Temporal Queries on Smartphones Brian Choi, Reservoir High School, Kun Sun, George Mason University, and Seonho Choi, Bowie State University |
11:45 - 13:55 | Lunch Break |
Technical Session II (Session Chair: Kun Sun, College of William and Mary) | |
13:55 - 14:20 | Privacy Aware Access Control for Data Sharing in Cloud Hassan Takabi, University of North Texas |
14:20 - 14:45 | Domain Based Storage Protection with Secure Access Control for the Cloud
Nicolae Paladi, Antonis Michalas, and Christian Gehrmann, Swedish Institute of Computer Science |
14:45 - 15:10 | A Secure and Efficient Outsourceable Group Key Transfer Protocol in Cloud Computing Junchao Wu, Qun Liu, and Xiaofeng Liao, Chongqing University of Posts and Telecommunications |
15:10 - 15:30 | Coffee Break |
Technical Session III (Session Chair: Pramod Jamkhedkar, Princeton University) | |
15:30 - 15:55 | Arbitrary Control-Flow Embedding into Multiple Threads for Obfuscation: A Preliminary Complexity and Performance Analysis Rasha Omar, Ahmed El-Mahdy, Egypt-Japan University for Science and Technology, and Erven Rohou, Centre de Recherche Inria Rennes |
15:55 - 16:20 | Semantic Keyword Search based on Trie over Encrypted Cloud Data Zhangjie Fu, Xingming Sun, and Jiangang Shu, Nanjing University of Information Science and Technology |
16:20 - 16:45 | On Secure Outsourcing of Cryptographic Computations to Cloud Lakshmi Kuppusamy, Jothi Rangasamy, SETS, India, and Praveen Gauravaram, Tata Consultancy Services Limited, India |
Organizers |