The Third International Workshop on Security in Cloud Computing (SCC)held in conjunction with the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS) April 14th, 2015, Singapore. |
Call for Papers |
Cloud computing has emerged as today's most exciting computing paradigm shift in information technology. With the efficient sharing of abundant computing resources in the cloud, users can economically enjoy the on-demand high quality cloud applications and services without committing large capital outlays locally.
While the cloud benefits are compelling, its unique attributes also raise many security and privacy challenges in areas such as data security, recovery, privacy, access control, trusted computing, as well as legal issues in areas such as regulatory compliance, auditing, and many others.
This workshop aims to bring together the research efforts from both the academia and industry in all security aspects related to cloud computing.
We encourage submissions on all theoretical and practical aspects, as well as experimental studies of deployed systems. Topics of interests include (but are not limited to) the following subject categories:
Authors are invited to submit either Research Papers or Position Papers or both. Position Papers that define new problems in cloud computing security or provide visions and clarifications of cloud computing security are solicited. Regular Research Papers that present novel research results on security and privacy in cloud computing are also welcome.
Important Dates |
Submission |
Submissions must be written in English with at most 8 pages including the bibliography and appendices. Submissions must be in double-column ACM format with a font no smaller than 9 point. Please use the ACM SIG Proceedings Templates (download here). Only PDF files will be accepted. Accepted papers will be published by ACM Press as conference proceedings in USB thumb drives and in the ACM DigitalLibrary.
Electronic submission site: https://easychair.org/conferences/?conf=asiaccsscc2015.
Camera-ready preparation instruction: http://www.sheridanprinting.com/typedept/scc.htm
Previous Editions |
Venue |
Program |
09:00 - 09:10 | Welcome Message |
Keynote
(Keynote Chair: Sherman S. M. Chow, The Chinese University of Hong Kong, Hong Kong) |
|
09:10 - 10:00 |
Secure Outsourcing Image Feature Extraction: Challenges and Solutions Dr. Kui Ren, State University of New York at Buffalo, US |
10:00 - 10:30 | Coffee Break |
S1: Cloud Storage and Data Privacy (Session Chair: Cong Wang, City University of Hong Kong, Hong Kong) |
|
10:30 - 10:55 |
Entangled Encodings and Data Entanglement
[ePrint]
Giuseppe Ateniese; Özgür Dagdelen; Ivan Damgård; Daniele Venturi |
10:55 - 11:20 |
Armadillo: a compilation chain for privacy preserving applications
[ePrint]
Sergiu Carpov; Paul Dubrulle; Renaud Sirdey |
11:20 - 11:45 |
Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation [ePrint] Shlomi Dolev; Niv Gilboa; Ximing Li |
12:10 - 13:30 | Lunch Break |
S2: Re-encryption in Cloud (Session Chair: Lihua Wang, National Institute of Information and Communications Technology, Japan) |
|
13:30 - 13:55 |
Fully Secure Inner-Product Proxy Re-Encryption with Constant Size Ciphertext Michael Backes; Martin Gagne; Sri Aravinda Krishnan Thyagarajan |
13:55 - 14:20 |
Certificateless Proxy Re-Encryption Without Pairing: Revisited
[ePrint]
Akshayaram Srinivasan; Chandrasekaran Pandurangan |
14:20 - 14:45 |
Secure Data Devolution: Practical Re-encryption with Auxiliary Data in LWE-based Somewhat Homomorphic Encryption Masaya Yasuda; Takeshi Koshiba; Takeshi Shimoyama; Jun Kogure; Kazuhiro Yokoyama |
S3: Invited Talks on Emerging Problems in Cloud Security
(Panel Chair: Kui Ren, State University of New York at Buffalo, US) |
|
14:45 - 15:05 | Processing Encrypted Data
Sherman S. M. Chow, The Chinese University of Hong Kong, Hong Kong |
15:05 - 15:25 |
Some Challenges on Enabling Encrypted Cloud Media Centre
Cong Wang, City University of Hong Kong, Hong Kong |
15:20 - 15:50 | Coffee Break |
S4: Authorization and Certification
(Session Chair: Zhan Wang, Chinese Academy of Sciences, China) |
|
16:00- 16:25 |
Authorization Federation in IaaS Multi Cloud Navid Pustchi; Ram Krishnan; Ravi Sandhu |
16:25 - 16:50 |
Data Freshness for Non-Trusted Environments Using Disposable Certificates
Kevin Koerner; Thomas Walter; Michael Menth |
Closing Remark
(Session Chair: Sherman S. M. Chow, The Chinese University of Hong Kong, Hong Kong) |
|
18:00 - 20:00 | Welcome Reception |
Organizers |