spacer

Call for Papers
Time Table | Technical Program | Committee

Cloud computing has recently emerged as a new information technology infrastructure. Cloud computing has unique attributes that raise many security and privacy challenges in areas such as data security, recovery, and privacy, as well as legal issues in areas such as regulatory compliance and auditing. In contrast to traditional enterprise IT solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the servers in large data centers on the Internet, where the management of the data and services are not fully trustworthy. When clients store their data on the server without themselves possessing a copy of it, how the integrity of the data can be ensured if the server is not fully trustworthy? Will encryption solve the data confidentiality problem of sensitive data? How will encryption affect dynamic data operations such as query, insertion, modification, and deletion? Data in the cloud is typically in a shared environment alongside data from other clients. How the data segregation should be done, while data are stored, transmitted, and processed? Due to the fundamental paradigm shift in cloud computing, many security concerns have to be better understood, unanticipated vulnerabilities identified, and viable solutions to critical threats devised, before the wide deployment of cloud computing techniques can take place.

We are soliciting both full papers that present relatively complete and mature research results and short position papers that report work-in-progress but inspiring and intriguing new ideas. Topics of interests include (but are not limited to) the following subject categories:

  • Secure cloud architecture
  • Cloud access control and key management
  • Identification and privacy in cloud
  • Remote data integrity protection
  • Dynamic data operation security
  • Software and data segregation security
  • Secure management of virtualized resources
  • Joint security and privacy aware protocol design
  • Failure detection and prediction
  • Secure data management within and across data centers
  • Availability, recovery and auditing
  • Secure wireless cloud

Authors are invited to submit either Research Papers or Position Papers or both. Position Papers that define new problems in cloud computing security or provide visions and clarifications of cloud computing security are solicited. Regular Research Papers that present novel research results on security and privacy in cloud computing, and Short Research Papers that describe work-in-progress ideas are also welcome. Research Papers and Position Papers will be reviewed separately.

Time Table

Manuscript submission: January 29, 2012 (extended deadline)
Acceptance notification: February 22, 2012 March 10, 2012
Final Manuscript due: March 14, 2012
Workshop Date: June 18th, 2012

Paper Submission

Final Submission Instruction: Final Paper Formatting and Submission Instructions Webpage (Online Author Kit).

Form of Manucript: All paper submissions should follow the IEEE 8.5" x 11" Two-Column Format. Regular Research Paper submission can have 10 pages plus up to 2 over-length pages. If the paper is accepted for publication, an over-length fee will be charged to each of the over-length pages, at $200 per page in the final camera-ready version. Position Papers and Short Research Papers, on the other hand, are allowed to be up to 5 pages.

Electronic Submission: https://www.easychair.org/conferences/?conf=icdcsspcc12.

Technical Program


08:20 - 08:30 Welcome
08:30 - 10:00 Technical Session I
 
Traceback Attacks in Cloud – Pebbletrace Botnet
Wenjie Lin, The Ohio State University, David Lee, HP Laboratories, USA
 
On-Demand VPC Topology Construction for Virtual Perimeter Defense in Public Clouds
Xiaoxin Wu and Donghui Wang, Huawei Technologies Co., Ltd., China
 
GeoProof: Proofs of Geographic Location for Cloud Computing Environment
Aiiad Albeshri, Colin Boyd, and Juan Gonzalez Nieto, Queensland University of Technology, Australia
10:00 - 10:30 Coffee Break
10:30 - 12:00 Technical Session II
 
Flow Inspection Router Assignment (FIRA) in Access/Aggregation Network Clouds
Jianping Wang, City University of Hong Kong, Chunming Qiao, State University of New York at Buffalo, Raghuram Sudhaakar, Sateesh Addepalli, Cisco, Yaohui Jin, Shanghai Jiaotong University, and Pablo Argibay-Losada, University of Vigo, Spain
 
LiveSec: Towards Effective Security Management in Large-scale Production Networks
Kai Wang, Yaxuan Qi, Baohua Yang, Yibo Xue and Jun Li, Tsinghua University
 
SaaS Anonymous Cloud Service Consumption Structure
Vinícius Pacheco and Ricardo Puttini, University of Brasília, Brazil
12:00 - 13:30 Lunch Break
13:30 - 15:30 Technical Session III
 
The MEERKATS Cloud Security Architecture (Position Paper)
Angelos Keromytis, Roxana Geambasu, Simha Sethumadhavan, Salvatore Stolfo, Jufeng Yang, Columbia University, Azzedine Benameur, Marc Dacier, Matthew Elder, Darrell KienzleSymantec Research Labs, and Angelos Stavrou, George Mason University
 
Towards Privacy-Assured Cloud Data Services with Flexible Search Functionalities (Short Paper)
Ming Li, Utah State University, Shucheng Yu, University of Arkansas at Little Rock, Wenjing Lou, and Y. Thomas Hou, Virginia Polytechnic Institute and State University
 
Phrase Search over Encrypted Data with Symmetric Encryption Scheme
Yinqi Tang, Dawu Gu, Ning Ding, and Haining Lu, Shanghai Jiao Tong University
 
Multi-keyword Secure Data Retrieval Based on Dual Range Comparison
Yan Zhu, Arizona State University, Di Ma, University of Michigan-Dearborn, and Shanbiao Wang, Peking Univerisity
15:30 - 16:00 Coffee Break
16:00 - 17:30 Technical Session IV
 
Profiling-as-a-Service in Multi-Tenant Cloud Computing Environments (Position Paper)
Kuai Xu, Feng Wang, Arizona State University, and Lin Gu, Hong Kong University of Science and Technology
 
PDP: A Privacy-preserving Data Provenance Scheme (Short Paper)
Khalid Alharbi and Xiaodong Lin, University of Ontario Institute of Technology, Canada
 
Robust Dynamic Provable Data Possession
Bo Chen and Reza Curtmola, New Jersey Institute of Technology
 
Access Control as a Service for Public Cloud Storage
Yang Zhang and Jun-Liang Chen, Beijing University of Posts and Telecommunications, China

Organizing Committees

General Chair

Xiaohua Jia, City University of Hong Kong

Program Co-chairs

Moti Yung, Google Inc.
Kui Ren, Illinois Institute of Technology

Publicity Chair

Shucheng Yu, University of Arkansas at Little Rock

Technical Program Committee

Ahmed Azab, North Carolina State University
Jack Brassil, HP Laboratories
Charlie Catlett, Argonne National Laboratory
Sherman S.M. Chow, University of Waterloo
Xuhua Ding, Singapore Management University
Xinwen Fu, University of Massachusetts Lowell
Keesook Han, Air Force Research Laboratory
Xiaohua Jia, City University of Hong Kong
Xuxian Jiang, North Carolina State University
Zhenkai Liang, National University of Singapore
Xiaodong Lin, University of Ontario Institute of Technology
Wenjing Lou, Virginia Polytechnic Institute and State University
Di Ma, University of Michigan Dearborn
Peter Mueller, IBM Zurich Research
Peng Ning, North Carolina State University
Cristina Nita-Rotaru, Purdue University
Kui Ren, Illinois Institute of Technology
Pierangela Samarati, Università degli Studi di Milano
Cliff Wang, US Army Research Office
Sherry Wang, Johns Hopkins University/Applied Physics Laboratory
Xinyuan Wang, George Mason University
Zhi Wang, North Carolina State University
Moti Yung, Google Inc.
Xiaolan (Catherine) Zhang, IBM T.J. Watson Research

Steering Committee

Peng Ning, North Carolina State University, Raleigh
Jeffrey Chase, Duke University
David Du, University of Minnesota
Ari Juels, RSA Laboratories
Wenjing Lou, Virginia Polytechnic Institute and State University
Michael Reiter, University of North Carolina at Chapel Hill
Moti Yung, Google Inc.

Previous Edition

  • ICDCS-SPCC 2011 (the online proceedings)
  • ICDCS-SPCC 2010 (the online proceedings).
Webchair: Cong Wang; Updated: 05/19/2012; ©2012 UbiSeC Lab, All Rights Reserved




gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.