The Eighth International Workshop on Security in Blockchain and Cloud Computing (SBC)

To be held in conjunction with the 15th ACM Asia Conference on Computer and Communications Security (ASIACCS)
October 6, 2020, Virtual Online Conference (GMT+8)

Virtual Conference Notice

Due to persisting concerns over travel safety in the wake of COVID-19, the SBC workshop will take place as a virtual event, as part of the AsiaCCS 2020 main conference. For more information on registration and participation, please click and

Call for Papers

Cloud computing has emerged as today's most exciting computing paradigm shift in information technology. With the efficient sharing of abundant computing resources in the cloud, users can economically enjoy the on-demand high quality cloud applications and services without committing large capital outlays locally. While the cloud benefits are compelling, its unique attributes also raise many security and privacy challenges in areas such as data security, recovery, privacy, access control, trusted computing, as well as legal issues in areas such as regulatory compliance, auditing, and many others. To implement secure and privacy-aware environments which can provide on-demand computing and high-quality service for cloud users is extremely urgent. Blockchain is another paradigm shift and drew a lot of recent attentions from both academia and industry. Moreover, blockchain and cloud have many interplays.

Building on the success of 7 versions of the International Workshop on Security in Cloud Computing (SCC), held often with ACM AsiaCCS, we plan this year to rebrand it to include blockchain as well and organize this workshop again for the eighth edition. This workshop is intended to bring together researchers, developers, and practitioners in security, privacy and mobile computing communities. We will encourage submissions on all theoretical and practical aspects, as well as experimental studies of deployed systems.

Topics of interests include (but are not limited to) the following subject categories:

Important Dates

Paper Submission Due: January 30, 2020 February 6, 2020 (Extended)
Acceptance Notification: February 29, 2020
Camera-Ready Due: March 10, 2020
Workshop: October 6, 2020


Submissions must be written in English with at most 6 pages plus up to 2 pages of appendices. Submissions must be in double-column ACM format with a font no smaller than 9 point. Please use the ACM SIG Proceedings Templates (download here). Only PDF files will be accepted. Accepted papers will be published by ACM Press as conference proceedings in USB thumb drives and in the ACM DigitalLibrary.

Electronic submission site:

Previous Editions


To be updated

Program at a Glance

October 6, 2020, GMT+8

Invited Talk1
9:00 - 10:00

This talk highlights challenges and opportunities for trustworthy AI with a focus on privacy attacks and countermeasures. AI and machine learning have no future if their privacy and security concerns are not addressed. Machine learning models could hide malicious code or backdoors, and leak private information about users. We will explore inference attacks against machine learning models and frameworks (e.g., federated learning), and set out the requirements for privacy-preserving AI systems.


Giuseppe Ateniese is the Farber Endowed Chair in Computer Science and department chair at Stevens Institute of Technology. He was with Sapienza-University of Rome (Italy) and Assistant/Associate Professor at Johns Hopkins University (USA), and one of the founders of the JHU Information Security Institute. He was a researcher at IBM Zurich Research lab (Switzerland) and scientist at the Infor- mation Sciences Institute of the University of Southern California (USA). He also briefly worked as visiting professor at Microsoft in Redmond (USA). He received the NSF CAREER Award for his research in privacy and security, and the Google Faculty Research Award, the IBM Faculty Award, and the IEEE CISTC Technical Recognition Award for his research on cloud security. He has contributed to areas such as proxy re-cryptography, anonymous communication, two-party computation, secure storage, and provable data possession. He is currently working on cloud security and machine learning applied to security and intelligence issues for which he received an IBM SUR Award. He is also investigating new security applications for decentralized computing based on the blockchain/bitcoin technology.

Invited Talk2
10:00 - 11:00

We increasingly live in a software-defined world where systems that were once implemented as rigid control capabilities or fixed function hardware systems are now highly programmable through software interfaces that decouple underlying details and offer remote control and centralized management. Blockchain and cloud computing systems are early examples of embracing software-defined system designs.

We argue that we should further leverage software-defined principles to make security programmable, thus also make this software-defined world more secure. We will use two case studies to demonstrate how programmable security can be achieved on software-defined networking (SDN) and blockchain systems, respectively.


Dr. Guofei Gu is a professor in the Department of Computer Science & Engineering at Texas A&M University (TAMU). Before coming to Texas A&M, he received his Ph.D. degree in Computer Science from the College of Computing, Georgia Institute of Technology. His research interests are in network and systems security.

Dr. Gu is a recipient of 2010 NSF CAREER Award, 2013 AFOSR Young Investigator Award, 2010 IEEE S&P Best Student Paper Award, 2015 ICDCS Best Paper Award, Texas A&M Dean of Engineering Excellence Award, and Presidential Impact Fellow Award. He is an active member of the security research community and has pioneered several new research directions such as botnet detection/defense and SDN security. Dr. Gu has frequently served on the program committees of top-tier security conferences such as IEEE S&P, ACM CCS, USENIX Security, and NDSS. He is an IEEE Fellow, an ACM Distinguished Member, an Associate Editor for IEEE Transactions on Information Forensics and Security (T-IFS), and the Steering Committee co-chair for SecureComm. He recently co-chaired the 2018 NSF Workshop on Programmable System Security in a Software Defined World. He is currently directing the SUCCESS Lab at TAMU.

Paper Session
11:00 - 11:20
Defense against N-pixel Attacks based on Image Reconstruction
Zi-Yuan Liu, Peter Shaojui Wang, Shou-Ching Hsiao and Raylin Tso.
11:20 - 11:40
SAFE: A Secure and Efficient Long-Term Distributed Storage System
Johannes Buchmann, Ghada Dessouky, Tommaso Frassetto, Ágnes Kiss,
Ahmad-Reza Sadeghi, Thomas Schneider, Giulia Traverso and Shaza Zeitouni.
11:40 - 12:00
SoK: A Systematic Study of Attacks in Efficient Encrypted Cloud Data Search
Jing Yao, Yifeng Zheng, Yu Guo and Cong Wang.
12:00 - 12:20
Runtime Hook on Blockchain and Smart Contract Systems
Wei Ting Lin, Shun-Wen Hsiao and Fang Yu.


To be updated


Program Co-Chairs

Hsu-Chun Hsiao, National Taiwan University
Qiang Tang, New Jersey Institute of Technology

Steering Committee

Kui Ren, Zhejiang University
Elaine Shi, Cornell University
Robert Deng, Singapore Management University

Publicity Chair

Cong Wang, City University of Hong Kong

TPC Members

Man Ho Au, The Hong Kong Polytechnic University
Angelo De Caro, IBM Research, Zurich
Long Chen, New Jersey Institute of Technology
Yu-Chi Chen, Yuan Ze University
Yueqiang Cheng, Baidu USA XLab
Sherman Chow, Chinese University of Hong Kong
Bernado David, IT University of Copenhagen
Xiong Fan, University of Maryland, College Park
Peter Gazi, IOHK Research
Ghassan O. Karame, NEC Laboratories Europe
Kartik Nayak, Duke University
Fenghao Liu, Florida Atlantic University
Peeter Laud, Cybernetica AS
Roman Oliynykov, IOHK Research
Miyako Ohkubo, National Institute of Information and Communications Technology
Dimitris Papadopolous, Hong Kong University of Science and Technology
Daniel Slamanig, Austrian Institute of Technology
Alessandro Sorniotti, IBM Research, Zurich
Paweł Szałachowski, Singapore University of Technology and Design
Raylin Tso, National Chengchi University
Cong Wang, City University of Hong Kong
Shucheng Yu, Stevens Institute of Technology
Haibin Zhang, University of Maryland, Baltimore County
Hong-Sheng Zhou, Virginia Commonwealth University
Yajin Zhou, Zhejiang University