Cloud computing has emerged as today's most exciting computing paradigm shift in information technology. With the efficient sharing of abundant computing resources in the cloud, users can economically enjoy the on-demand high quality cloud applications and services without committing large capital outlays locally. While the cloud benefits are compelling, its unique attributes also raise many security and privacy challenges in areas such as data security, recovery, privacy, access control, trusted computing, as well as legal issues in areas such as regulatory compliance, auditing, and many others. To implement secure and privacy-aware environments which can provide on-demand computing and high-quality service for cloud users is extremely urgent. This workshop is intended to bring together researchers, developers, and practitioners in security, privacy and mobile computing communities. We encourage submissions on all theoretical and practical aspects, as well as experimental studies of deployed systems. Topics of interests include (but are not limited to) the following subject categories
Authors are invited to submit either Research Papers or Position Papers or both. Position Papers that define new problems in cloud computing security or provide visions and clarifications of cloud computing security are solicited. Regular Research Papers that present novel research results on security and privacy in cloud computing are also welcome.
Submissions must be written in English with at most 8 pages including the bibliography and appendices. Submissions must be in double-column ACM format with a font no smaller than 9 point. Please use the ACM SIG Proceedings Templates (download here). Only PDF files will be accepted. Accepted papers will be published by ACM Press as conference proceedings in USB thumb drives and in the ACM DigitalLibrary.
Electronic submission site: https://easychair.org/conferences/?conf=asiaccsscc2017.
|09:00 - 09:10||Welcome Message|
|09:10 - 10:10||Cloud Data Analytics for Security: Applications, Challenges, and Opportunities [slides]
Dr. Danfeng (Daphne) Yao, Virginia Tech, USA.
|10:10 - 10:30||Coffee Break|
|Technical Session I (Session Chair: Lihua Wang, National Institute of Information and Communications Technology, Japan)|
|10:30 - 10:55||
To Cheat or Not to Cheat - A Game-Theoretic Analysis of Outsourced Computation Verification
Balázs Pejó (University of Luxembourg); Qiang Tang (Luxembourg Institute of Science and Technology).
|10:55 - 11:20||
Reconciling Security and Functional Requirements in Multi-tenant Clouds
Ghassan Karame (NEC Laboratories Europe); Matthias Neugschwandtner (IBM Research Zurich); Melek Önen (EURECOM); Hubert Ritzdorf (ETH Zurich).
|11:20 - 11:45||
Cloud Storage File Recoverability
Christian A. Gorke (Uni Mannheim); Christian Janson (Technische Universität Darmstadt); Frederik Armknecht (Uni Mannheim); Carlos Cid (Royal Holloway, University of London).
|11:45 - 12:10||
A Secure Algorithm for Outsourcing Matrix Multiplication Computation in the Cloud
Shaojing Fu (National university of defense technology); Yunpeng Yu (National university of defense technology); Ming Xu (National university of defense technology).
|12:10 - 13:30||Lunch Break|
|Technical Session II (Session Chair: Cong Wang, City University of Hong Kong, China)|
|13:30 - 13:55||
Efficient Key-Rotatable and Security-Updatable Homomorphic Encryption
Yoshinori Aono (National Institute of Information and Communications Technology); Takuya Hayashi (National Institute of Information and Communications Technology); Le Trieu Phong (National Institute of Information and Communications Technology); Lihua Wang (National Institute of Information and Communications Technology).
|13:55 - 14:20||
Security of Okamoto Identification Scheme in Practice - a Defense against Ephemeral Key Leakage and Setup
Lukasz Krzywiecki (Wroclaw University of Technology); Miroslaw Kutylowski (Wroclaw University of Technology).
|14:20 - 14:45||
Enabling Privacy-assured Mobile Advertisement Targeting and Dissemination
Zhenkui Shi (City University of Hong Kong); Xiaoning Liu (City University of Hong Kong); Xingliang Yuan (City University of Hong Kong).
|14:45 - 15:10||
Privacy-preserving Hybrid Recommender System
Qiang Tang (Luxembourg Institute of Science and Technology); Husen Wang (Luxembourg Institute of Science and Technology).
|15:10 - 15:30||Coffee Break|
|Technical Session III (Session Chair: Xingliang Yuan, City University of Hong Kong, China)|
|15:30 - 15:55||
Efficient implementation of a proxy-based protocol for data sharing on the cloud
Maryam Sepehri (Milan University); Stelvio Cimato (Milan University); Ernesto Damiani (Khalifa University of Science, Technology and Research).
|15:55 - 16:20||
Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM
Jun Zhang (The University of Hong Kong); Xin Wang (The University of Hong Kong); Siu Ming Yiu (The University of Hong Kong); Zoe Jiang (Harbin Institute of Technology, Shenzhen); Jin Li (Guangzhou University).
|16:20 - 16:45||
A Privacy-Preserving and Vessel Authentication Scheme Using Automatic Identification System
Pengchuan Su (Beijing Institute of Technology); Nan Sun (Beijing Institute of Technology); Liehuang Zhu (Beijing Institute of Technology); Yandong Li (Beijing Institute of Technology); Meng Li (Beijing Institute of Technology); Zijian Zhang (Beijing Institute of Technology).