Call for Papers
|
Time
Table |
Technical Program | Committee
|
Cloud computing has recently emerged as a new
information technology infrastructure. Cloud
computing has unique attributes that raise many
security and privacy challenges in areas such as
data security, recovery, and privacy, as well as
legal issues in areas such as regulatory
compliance and auditing. In contrast to
traditional enterprise IT solutions, where the IT
services are under proper physical, logical and
personnel controls, cloud computing moves the
application software and databases to the servers
in large data centers on the Internet, where the
management of the data and services are not fully
trustworthy. When clients store their data on the
server without themselves possessing a copy of it,
how the integrity of the data can be ensured if
the server is not fully trustworthy? Will
encryption solve the data confidentiality problem
of sensitive data? How will encryption affect
dynamic data operations such as query, insertion,
modification, and deletion? Data in the cloud is
typically in a shared environment alongside data
from other clients. How the data segregation
should be done, while data are stored,
transmitted, and processed? Due to the fundamental
paradigm shift in cloud computing, many security
concerns have to be better understood,
unanticipated vulnerabilities identified, and
viable solutions to critical threats devised,
before the wide deployment of cloud computing
techniques can take place.
We are soliciting both full papers that present
relatively complete and mature research results
and short position papers that report
work-in-progress but inspiring and intriguing new
ideas. Topics of interests include (but are not
limited to) the following subject categories:
- Secure cloud architecture
- Cloud access control and key management
- Identification and privacy in cloud
- Remote data integrity protection
- Dynamic data operation security
- Software and data segregation security
- Secure management of virtualized resources
- Joint security and privacy aware protocol
design
- Failure detection and prediction
- Secure data management within and across data
centers
- Availability, recovery and auditing
- Secure wireless cloud
Authors are invited to submit either Research Papers
or Position
Papers or both. Position Papers
that define new problems in cloud computing
security or provide visions and clarifications of
cloud computing security are solicited. Regular Research
Papers that present novel research
results on security and privacy in cloud
computing, and Short
Research Papers that describe
work-in-progress ideas are also welcome. Research Papers
and Position
Papers will be reviewed separately.
Time Table
Manuscript submission: January
29, 2012 (extended deadline)
Acceptance notification: February 22, 2012
March
10, 2012
Final Manuscript due: March 14, 2012
Workshop Date: June 18th, 2012
Paper Submission
Final Submission Instruction: Final Paper Formatting and
Submission Instructions Webpage (Online Author
Kit).
Form of Manucript: All paper submissions should
follow the IEEE 8.5" x 11" Two-Column Format.
Regular Research
Paper submission can have 10 pages plus up
to 2 over-length pages. If the paper is accepted for
publication, an over-length fee will be charged to
each of the over-length pages, at $200 per page in
the final camera-ready version.
Position Papers
and
Short Research
Papers, on the other hand, are allowed to
be up to 5 pages.
Electronic Submission: https://www.easychair.org/conferences/?conf=icdcsspcc12.
Technical Program
08:20 - 08:30 |
Welcome |
08:30 - 10:00 |
Technical Session I |
|
Traceback Attacks
in Cloud – Pebbletrace Botnet
Wenjie Lin, The Ohio State University,
David Lee, HP Laboratories, USA
|
|
On-Demand VPC
Topology Construction for Virtual
Perimeter Defense in Public Clouds
Xiaoxin Wu and Donghui Wang, Huawei
Technologies Co., Ltd., China
|
|
GeoProof: Proofs
of Geographic Location for Cloud
Computing Environment
Aiiad Albeshri, Colin Boyd, and Juan
Gonzalez Nieto, Queensland University
of Technology, Australia
|
10:00 - 10:30 |
Coffee Break |
10:30 - 12:00 |
Technical Session II |
|
Flow Inspection
Router Assignment (FIRA) in
Access/Aggregation Network Clouds
Jianping Wang, City University of
Hong Kong, Chunming Qiao, State
University of New York at Buffalo,
Raghuram Sudhaakar, Sateesh Addepalli, Cisco,
Yaohui Jin, Shanghai Jiaotong
University, and Pablo
Argibay-Losada, University of Vigo,
Spain
|
|
LiveSec: Towards
Effective Security Management in
Large-scale Production Networks
Kai Wang, Yaxuan Qi, Baohua Yang, Yibo Xue
and Jun Li, Tsinghua University
|
|
SaaS Anonymous
Cloud Service Consumption Structure
Vinícius Pacheco and Ricardo Puttini, University
of Brasília, Brazil
|
12:00 - 13:30 |
Lunch Break |
13:30 - 15:30 |
Technical Session III |
|
The MEERKATS
Cloud Security Architecture (Position
Paper)
Angelos Keromytis, Roxana Geambasu, Simha
Sethumadhavan, Salvatore Stolfo, Jufeng
Yang, Columbia University,
Azzedine Benameur, Marc Dacier, Matthew
Elder, Darrell KienzleSymantec
Research Labs, and Angelos Stavrou,
George Mason University
|
|
Towards
Privacy-Assured Cloud Data Services with
Flexible Search Functionalities (Short
Paper)
Ming Li, Utah State University,
Shucheng Yu, University of Arkansas
at Little Rock, Wenjing Lou, and Y.
Thomas Hou, Virginia Polytechnic
Institute and State University
|
|
Phrase Search
over Encrypted Data with Symmetric
Encryption Scheme
Yinqi Tang, Dawu Gu, Ning Ding, and
Haining Lu, Shanghai Jiao Tong
University
|
|
Multi-keyword
Secure Data Retrieval Based on Dual
Range Comparison
Yan Zhu, Arizona State University,
Di Ma, University of
Michigan-Dearborn, and Shanbiao
Wang, Peking Univerisity
|
15:30 - 16:00 |
Coffee Break |
16:00 - 17:30 |
Technical Session IV |
|
Profiling-as-a-Service
in Multi-Tenant Cloud Computing
Environments (Position Paper)
Kuai Xu, Feng Wang, Arizona State
University, and Lin Gu, Hong
Kong University of Science and
Technology
|
|
PDP: A
Privacy-preserving Data Provenance
Scheme (Short Paper)
Khalid Alharbi and Xiaodong Lin, University
of Ontario Institute of Technology,
Canada
|
|
Robust Dynamic
Provable Data Possession
Bo Chen and Reza Curtmola, New Jersey
Institute of Technology
|
|
Access Control as
a Service for Public Cloud Storage
Yang Zhang and Jun-Liang Chen, Beijing
University of Posts and
Telecommunications, China
|
Organizing Committees
General Chair
Xiaohua
Jia, City University of Hong Kong
Program
Co-chairs
Moti
Yung, Google Inc.
Kui Ren,
Illinois Institute of Technology
Publicity Chair
Shucheng Yu,
University of Arkansas at Little Rock
Technical
Program Committee
Ahmed Azab, North Carolina State University
Jack Brassil, HP Laboratories
Charlie Catlett, Argonne National Laboratory
Sherman S.M. Chow, University of Waterloo
Xuhua Ding, Singapore Management University
Xinwen Fu, University of Massachusetts Lowell
Keesook Han, Air Force Research Laboratory
Xiaohua Jia, City University of Hong Kong
Xuxian Jiang, North Carolina State University
Zhenkai Liang, National University of Singapore
Xiaodong Lin, University of Ontario Institute of
Technology
Wenjing Lou, Virginia Polytechnic Institute and
State University
Di Ma, University of Michigan Dearborn
Peter Mueller, IBM Zurich Research
Peng Ning, North Carolina State University
Cristina Nita-Rotaru, Purdue University
Kui Ren, Illinois Institute of Technology
Pierangela Samarati, Università degli Studi di
Milano
Cliff Wang, US Army Research Office
Sherry Wang, Johns Hopkins University/Applied
Physics Laboratory
Xinyuan Wang, George Mason University
Zhi Wang, North Carolina State University
Moti Yung, Google Inc.
Xiaolan (Catherine) Zhang, IBM T.J. Watson Research
Steering
Committee
Peng Ning,
North Carolina State University, Raleigh
Jeffrey
Chase, Duke University
David
Du, University of Minnesota
Ari
Juels, RSA Laboratories
Wenjing Lou,
Virginia Polytechnic Institute and State University
Michael
Reiter, University of North Carolina at Chapel
Hill
Moti
Yung, Google Inc.
Previous Edition
- ICDCS-SPCC
2011 (the
online proceedings)
- ICDCS-SPCC
2010 (the
online proceedings).
Webchair: Cong
Wang; Updated: 05/19/2012; ©2012 UbiSeC
Lab, All Rights Reserved |