The Fifth International Workshop on Security in Cloud Computing (SCC)

held in conjunction with the 12th ACM Asia Conference on Computer and Communications Security (ASIACCS)
April 2nd, 2017, Abu Dhabi, UAE.


Call for Papers

Cloud computing has emerged as today's most exciting computing paradigm shift in information technology. With the efficient sharing of abundant computing resources in the cloud, users can economically enjoy the on-demand high quality cloud applications and services without committing large capital outlays locally. While the cloud benefits are compelling, its unique attributes also raise many security and privacy challenges in areas such as data security, recovery, privacy, access control, trusted computing, as well as legal issues in areas such as regulatory compliance, auditing, and many others. To implement secure and privacy-aware environments which can provide on-demand computing and high-quality service for cloud users is extremely urgent. This workshop is intended to bring together researchers, developers, and practitioners in security, privacy and mobile computing communities. We encourage submissions on all theoretical and practical aspects, as well as experimental studies of deployed systems. Topics of interests include (but are not limited to) the following subject categories

Authors are invited to submit either Research Papers or Position Papers or both. Position Papers that define new problems in cloud computing security or provide visions and clarifications of cloud computing security are solicited. Regular Research Papers that present novel research results on security and privacy in cloud computing are also welcome.


Important Dates

Submissions Deadline: January 20, 2017 January 31, 2017 (extended)
Notification: February 15, 2017
Final Submission Date: February 25, 2017
Workshop: April 2, 2017

Submission

Submissions must be written in English with at most 8 pages including the bibliography and appendices. Submissions must be in double-column ACM format with a font no smaller than 9 point. Please use the ACM SIG Proceedings Templates (download here). Only PDF files will be accepted. Accepted papers will be published by ACM Press as conference proceedings in USB thumb drives and in the ACM DigitalLibrary.

Electronic submission site: https://easychair.org/conferences/?conf=asiaccsscc2017.


Previous Editions


Venue

A6 Building Room 004

Program at a Glance (Tentative)

09:00 - 09:10 Welcome Message
Keynote
09:10 - 10:10 Cloud Data Analytics for Security: Applications, Challenges, and Opportunities [slides]
Dr. Danfeng (Daphne) Yao, Virginia Tech, USA.
10:10 - 10:30 Coffee Break
  Technical Session I (Session Chair: Lihua Wang, National Institute of Information and Communications Technology, Japan)
10:30 - 10:55
To Cheat or Not to Cheat - A Game-Theoretic Analysis of Outsourced Computation Verification
Balázs Pejó (University of Luxembourg); Qiang Tang (Luxembourg Institute of Science and Technology).
10:55 - 11:20
Reconciling Security and Functional Requirements in Multi-tenant Clouds
Ghassan Karame (NEC Laboratories Europe); Matthias Neugschwandtner (IBM Research Zurich); Melek Önen (EURECOM); Hubert Ritzdorf (ETH Zurich).
11:20 - 11:45
Cloud Storage File Recoverability
Christian A. Gorke (Uni Mannheim); Christian Janson (Technische Universität Darmstadt); Frederik Armknecht (Uni Mannheim); Carlos Cid (Royal Holloway, University of London).
11:45 - 12:10
A Secure Algorithm for Outsourcing Matrix Multiplication Computation in the Cloud
Shaojing Fu (National university of defense technology); Yunpeng Yu (National university of defense technology); Ming Xu (National university of defense technology).
12:10 - 13:30 Lunch Break
  Technical Session II (Session Chair: Cong Wang, City University of Hong Kong, China)
13:30 - 13:55
Efficient Key-Rotatable and Security-Updatable Homomorphic Encryption
Yoshinori Aono (National Institute of Information and Communications Technology); Takuya Hayashi (National Institute of Information and Communications Technology); Le Trieu Phong (National Institute of Information and Communications Technology); Lihua Wang (National Institute of Information and Communications Technology).
13:55 - 14:20
Security of Okamoto Identification Scheme in Practice - a Defense against Ephemeral Key Leakage and Setup
Lukasz Krzywiecki (Wroclaw University of Technology); Miroslaw Kutylowski (Wroclaw University of Technology).
14:20 - 14:45
Enabling Privacy-assured Mobile Advertisement Targeting and Dissemination
Zhenkui Shi (City University of Hong Kong); Xiaoning Liu (City University of Hong Kong); Xingliang Yuan (City University of Hong Kong).
14:45 - 15:10
Privacy-preserving Hybrid Recommender System
Qiang Tang (Luxembourg Institute of Science and Technology); Husen Wang (Luxembourg Institute of Science and Technology).
15:10 - 15:30 Coffee Break
                    Technical Session III (Session Chair: Xingliang Yuan, City University of Hong Kong, China)
15:30 - 15:55
Efficient implementation of a proxy-based protocol for data sharing on the cloud
Maryam Sepehri (Milan University); Stelvio Cimato (Milan University); Ernesto Damiani (Khalifa University of Science, Technology and Research).
15:55 - 16:20
Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM
Jun Zhang (The University of Hong Kong); Xin Wang (The University of Hong Kong); Siu Ming Yiu (The University of Hong Kong); Zoe Jiang (Harbin Institute of Technology, Shenzhen); Jin Li (Guangzhou University).
16:20 - 16:45
A Privacy-Preserving and Vessel Authentication Scheme Using Automatic Identification System
Pengchuan Su (Beijing Institute of Technology); Nan Sun (Beijing Institute of Technology); Liehuang Zhu (Beijing Institute of Technology); Yandong Li (Beijing Institute of Technology); Meng Li (Beijing Institute of Technology); Zijian Zhang (Beijing Institute of Technology).

Organizers


Program Co-Chairs

Cong Wang, City University of Hong Kong, China
Murat Kantarcioglu, University of Texas at Dallas, US

Steering Committee

Kui Ren, State University of New York at Buffalo, US
Elaine Shi, Cornell University, US
Robert Deng, Singapore Management University, Singapore

Web Chair

Xingliang Yuan, City University of Hong Kong, China

TPC Members

Man Ho Au, Hong Kong Polytechnic University, China
Erik­-Oliver Blass, Airbus Group Innovations, Germany
Michael Brenner, Leibniz Universität Hannover, Germany
Ee-Chien Chang, National University of Singapore, Singapore
Kai Chen, Chinese Academy of Sciences, China
Sherman S. M. Chow, Chinese University of Hong Kong, China
Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
Sara Foresti, Università degli Studi di Milano, Italy
Xinwen Fu, University of Massachusetts Lowell, US
Felix Gomez Marmol, NEC Laboratories Europe, Germany
Stefanos Gritzalis, University of the Aegean, Greece
Shaopeng Guan, Shandong Institute of Business and Technology, China
Jinguang Han, Nanjing University of Finance and Economics, China
Ragib Hasan, University of Alabama at Birmingham, US
Shoichi Hirose, University of Fukui, Japan
Hsu­-Chun Hsiao, National Taiwan University, Taiwan
Jingyu Hua, Nanjing University, China
Qiang­-Sheng Hua, Huazhong University of Science and Technology, China
Xinyi Huang, Fujian Normal University, China
Murtuza Jadliwala, Wichita State University, US
Yier Jin, The University of Central Florida, US
Murat Kantarcioglu, University of Texas at Dallas, US
Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan
Junzhuo Lai, Jinan University, China
Wing Cheong Lau, The Chinese University of Hong Kong, China
Kwangsu Lee, Sejong University, Korea
Qi Li, Tsinghua University, China
Yu Li, Chinese Academy of Science, China
Dan Lin, Missouri University of Science and Technology, US
Jiqiang Liu, Beijing Jiaotong University, China
Joseph Liu, Monash University, Australia
Yao Liu, University of South Florida, US
Rongxing Lu, University of New Brunswick, Canada
John C.S. Lui, The Chinese University of Hong Kong, China
Refik Molva, EURECOM, France
Daniel Slamanig, Graz University of Technology, Austria
Alessandro Sorniotti, IBM Research Zurich, Switzerland
Angelos Stavrou, George Mason University, US
Yuqiong Sun, The Pennsylvania State University, US
Jakub Szefer, Yale University, US
Qiang Tang, Luxembourg Institute of Science and Technology, Luxembourg
Shambhu Upadhyaya, The State University of New York at Buffalo, US
Marten van Dijk, University of Connecticut, US
Cong Wang, City University of Hong Kong, China
Lihua Wang, National Institute of Information and Communications Technology, Japan
Wei Wang, Nanjing University, China
Wendy Hui Wang, Stevens Institute of Technology, US
Lingyu Wang, Concordia University, Canada
Edgar Weippl, SBA Research, Austria
Jian Weng, Jinan University, China
Qianhong Wu, Beihang University, China
Fengyuan Xu, Nanjing University, China
Jia Xu, Institute for Infocomm Research, Singapore
Kuai Xu, Arizona State University, US
Toshihiro Yamauchi, Okayama University, Japan
Danfeng Yao, Virginia Tech, US
Meng Yu, University of Texas at San Antonio, US
Shucheng Yu, University of Arkansas at Little Rock, US
Xingliang Yuan, City University of Hong Kong, China
Bingsheng Zhang, Lancaster University, UK
Haibin Zhang, University of Connecticut, US
Yuan Zhang, Nanjing University, China
Yongbin Zhou, Chinese Academy of Sciences, China