The Fourth International Workshop on Security in Cloud Computing (SCC)

held in conjunction with the 11th ACM Asia Conference on Computer and Communications Security (ASIACCS)
May 30th, 2016, Xi'an, China.

CFP | Important dates | Submission | Previous Editions | Venue | Program | Organizers

Call for Papers

Cloud computing has emerged as today's most exciting computing paradigm shift in information technology. With the efficient sharing of abundant computing resources in the cloud, users can economically enjoy the on-demand high quality cloud applications and services without committing large capital outlays locally. While the cloud benefits are compelling, its unique attributes also raise many security and privacy challenges in areas such as data security, recovery, privacy, access control, trusted computing, as well as legal issues in areas such as regulatory compliance, auditing, and many others. To implement secure and privacy-aware environments which can provide on-demand computing and high-quality service for cloud users is extremely urgent. This workshop is intended to bring together researchers, developers, and practitioners in security, privacy and mobile computing communities. We encourage submissions on all theoretical and practical aspects, as well as experimental studies of deployed systems. Topics of interests include (but are not limited to) the following subject categories

Authors are invited to submit either Research Papers or Position Papers or both. Position Papers that define new problems in cloud computing security or provide visions and clarifications of cloud computing security are solicited. Regular Research Papers that present novel research results on security and privacy in cloud computing are also welcome.

Important Dates

Submissions Deadline: February 4, 2016 February 11, 2016 (extended)
Notification: March 1, 2016
Final Submission Date: March 15, 2016
Workshop: May 30, 2016


Submissions must be written in English with at most 8 pages including the bibliography and appendices. Submissions must be in double-column ACM format with a font no smaller than 9 point. Please use the ACM SIG Proceedings Templates (download here). Only PDF files will be accepted. Accepted papers will be published by ACM Press as conference proceedings in USB thumb drives and in the ACM DigitalLibrary.

Electronic submission site:

Camera-ready Preparation Instruction:

Previous Editions


The wholeday workshop will be held at Room 2 of the conference venue.


09:00 - 09:10 Welcome Message
09:10 - 10:30 Giano – toward Large Scale Access Security Management in Private Cloud
Dr. Ye Wu, Baidu Inc, China.
10:30 - 10:45 Coffee Break
  Technical Session I: Infrastructure Support (Session Chair: Cong Wang, City University of Hong Kong, Hong Kong)
10:45 - 11:05
SPLM: Security Protection of Live Virtual Machine Migration in Cloud Computing
Degang Sun, Jie Zhang, Wei Fan, Tingting Wang, Chao Liu and Weiqing Huang.
11:05 - 11:25
Lightweight Examination of DLL Environments in Virtual Machines to Detect Malware
Xiongwei Xie and Weichao Wang.
11:25 - 11:45
Enabling Assured Deletion in the Cloud Storage by Overwriting
Yuchuan Luo, Ming Xu, Shaojing Fu and Dongsheng Wang.
11:45 - 12:05
Cloud Storage Integrity Checking: Going From Theory To Practice
Fei Chen, Taoyi Zhang, Jianyong Chen and Tao Xiang.
12:05 - 13:30 Lunch Break
  Technical Session II: Data Processing (Session Chair: Sheng Zhong, Nanjing University, China)
13:30 - 13:50
Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets
Shuo Qiu, Boyang Wang, Ming Li, Jesse Victors, Jiqiang Liu, Yanfeng Shi and Wei Wang.
13:50 - 14:10
A new secure index supporting efficient index updating and similarity search on clouds
Baojia Zhang, Yuan Zhang and He Zhang.
14:10 - 14:30
Another compression method for homomorphic ciphertexts
Sergiu Carpov and Renaud Sirdey.
14:30 - 14:50
Dynamic execution of secure queries over homomorphic encrypted databases
Oana Stan, Sergiu Carpov and Renaud Sirdey.
14:50 - 15:05 Coffee Break
                    Technical Session III: Applications (Session Chair: Yuan Zhang, Nanjing University, China)
15:05 - 15:25
Towards Secure and Fast Mapping of Genomic Sequences on Public Clouds
Seungmin Kang, Khin Mi Mi Aung and Bharadwaj Veeravalli.
15:25 - 15:45
Privacy Preserving Distributed Permutation Test
Yunlong Mao and Yuan Zhang.
15:45 - 16:05
Decentralized Secure Data Sharing with Attribute-Based Encryption: A Resource Consumption Analysis
Holger Kuehner and Hannes Hartenstein.
16:05 - 16:25
Community-Based Secure Information and Resource Sharing in Azure Cloud IaaS
Yun Zhang, Farhan Patwa and Ravi Sandhu.


Program Co-Chairs

Sheng Zhong, Nanjing University, China
Anna Squicciarini, The Pennsylvania State University, US

Steering Committee

Kui Ren, State University of New York at Buffalo, US
Elaine Shi, Cornell University, US
Robert Deng, Singapore Management University, Singapore

Web Chair

Cong Wang, City University of Hong Kong, Hong Kong

TPC Members

Man Ho Au, Hong Kong Polytechnic University, Hong Kong
Haipeng Dai, State Key Laboratory for Novel Software Technology, Nanjing University, China
Marten van Dijk, University of Connecticut, US
Shaopeng Guan, Shandong Institute of Business and Technology, China
Jinguang Han, Nanjing University of Finance and Economics, China
Ragib Hasan, University of Alabama at Birmingham, US
Jingyu Hua, Nanjing University, China
Qiang-Sheng Hua, Huazhong University of Science and Technology, China
Junzuo Lai, Jinan University, China
Zhetao Li, Xiangtan University, China
Yu Li, Chinese Academy of Science, China
Dan Lin, Missouri University of Science and Technology, US
Di Niu, University of Alberta, Canada
Daniela Oliveira, University of Florida, US
Federica Paci, University of Southampton, UK
Charalampos Papamanthou, University of Maryland at College Park, US
Rahul Potharaju, Microsoft Research Redmond, US
Chen Qian, University of Kentucky, US
Zhiyun Qian, University of California, Riverside, US
Peter Y.A. Ryan, The University of Luxembourg, Luxembourg
Rei Safavi-Naini, The University of Calgary, Canada
Pierangela Samarati, Università degli Studi di Milano, Italy
Daniel Slamanig, Graz University of Technology, Austria
Anna Squicciarini, The Pennsylvania State University, US
Douglas Stebila, Queensland University of Technology, Australia
Shambhu Upadhyaya, State University of New York at Buffalo, US
Cong Wang, City University of Hong Kong, Hong Kong
Hui Wang, Stevens Institute of Technology, US
Lihua Wang, National Institute of Information and Communications Technology, Japan
Wei Wang, Nanjing University, China
Zhan Wang, Amazon Web Services, China
Edgar Weippl, SBA Research, Austria
Ye Wu, Baidu Inc., China
Jia Xu, Institute for Infocomm Research, Singapore
Kuai Xu, Arizone State University, US
Danfeng Yao, Virginia Tech, US
Meng Yu, University of Texas at San Antonio, US
Haibin Zhang, University of North Carolina at Chapel Hill, US
Xiaoyan Zhang, Nanjing University, China
Yuan Zhang, Nanjing University, China
Sheng Zhong, Nanjing University, China
Yongbin Zhou, Chinese Academy of Sciences, China

Updated: Apr. 03th, 2016