The Fourth International Workshop on Security in Cloud Computing (SCC)held in conjunction with the 11th ACM Asia Conference on Computer and Communications Security (ASIACCS) May 30th, 2016, Xi'an, China. |
Call for Papers |
Cloud computing has emerged as today's most exciting computing paradigm shift in information technology. With the efficient sharing of abundant computing resources in the cloud, users can economically enjoy the on-demand high quality cloud applications and services without committing large capital outlays locally. While the cloud benefits are compelling, its unique attributes also raise many security and privacy challenges in areas such as data security, recovery, privacy, access control, trusted computing, as well as legal issues in areas such as regulatory compliance, auditing, and many others. To implement secure and privacy-aware environments which can provide on-demand computing and high-quality service for cloud users is extremely urgent. This workshop is intended to bring together researchers, developers, and practitioners in security, privacy and mobile computing communities. We encourage submissions on all theoretical and practical aspects, as well as experimental studies of deployed systems. Topics of interests include (but are not limited to) the following subject categories
Authors are invited to submit either Research Papers or Position Papers or both. Position Papers that define new problems in cloud computing security or provide visions and clarifications of cloud computing security are solicited. Regular Research Papers that present novel research results on security and privacy in cloud computing are also welcome.
Important Dates |
Submission |
Submissions must be written in English with at most 8 pages including the bibliography and appendices. Submissions must be in double-column ACM format with a font no smaller than 9 point. Please use the ACM SIG Proceedings Templates (download here). Only PDF files will be accepted. Accepted papers will be published by ACM Press as conference proceedings in USB thumb drives and in the ACM DigitalLibrary.
Electronic submission site: https://easychair.org/conferences/?conf=scc2016.
Camera-ready Preparation Instruction: http://www.sheridanprinting.com/typedept/scc.htm
Previous Editions |
Venue |
Program |
09:00 - 09:10 | Welcome Message |
Keynote | |
09:10 - 10:30 | Giano – toward Large Scale Access Security Management in Private Cloud Dr. Ye Wu, Baidu Inc, China. |
10:30 - 10:45 | Coffee Break |
Technical Session I: Infrastructure Support (Session Chair: Cong Wang, City University of Hong Kong, Hong Kong) | |
10:45 - 11:05 | SPLM: Security Protection of Live Virtual Machine Migration in Cloud Computing Degang Sun, Jie Zhang, Wei Fan, Tingting Wang, Chao Liu and Weiqing Huang. |
11:05 - 11:25 | Lightweight Examination of DLL Environments in Virtual Machines to Detect Malware Xiongwei Xie and Weichao Wang. |
11:25 - 11:45 | Enabling Assured Deletion in the Cloud Storage by Overwriting Yuchuan Luo, Ming Xu, Shaojing Fu and Dongsheng Wang. |
11:45 - 12:05 | Cloud Storage Integrity Checking: Going From Theory To Practice Fei Chen, Taoyi Zhang, Jianyong Chen and Tao Xiang. |
12:05 - 13:30 | Lunch Break |
Technical Session II: Data Processing (Session Chair: Sheng Zhong, Nanjing University, China) | |
13:30 - 13:50 | Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets Shuo Qiu, Boyang Wang, Ming Li, Jesse Victors, Jiqiang Liu, Yanfeng Shi and Wei Wang. |
13:50 - 14:10 | A new secure index supporting efficient index updating and similarity search on clouds Baojia Zhang, Yuan Zhang and He Zhang. |
14:10 - 14:30 | Another compression method for homomorphic ciphertexts Sergiu Carpov and Renaud Sirdey. |
14:30 - 14:50 | Dynamic execution of secure queries over homomorphic encrypted databases Oana Stan, Sergiu Carpov and Renaud Sirdey. |
14:50 - 15:05 | Coffee Break |
Technical Session III: Applications (Session Chair: Yuan Zhang, Nanjing University, China) | |
15:05 - 15:25 | Towards Secure and Fast Mapping of Genomic Sequences on Public Clouds Seungmin Kang, Khin Mi Mi Aung and Bharadwaj Veeravalli. |
15:25 - 15:45 | Privacy Preserving Distributed Permutation Test Yunlong Mao and Yuan Zhang. |
15:45 - 16:05 | Decentralized Secure Data Sharing with Attribute-Based Encryption: A Resource Consumption Analysis Holger Kuehner and Hannes Hartenstein. |
16:05 - 16:25 | Community-Based Secure Information and Resource Sharing in Azure Cloud IaaS Yun Zhang, Farhan Patwa and Ravi Sandhu. |
Organizers |