Please visit the latest ICACCI2015 website

ICACCI 2014 has been indexed in Scopus

ICACCI-2014 Delhi Photos available online

International Workshop on Cloud Security and Cryptography (CloudCrypto’14)

http://icacci-conference.org/website/CloudCrypto2014

Cloud computing becomes the next generation architecture of IT Enterprise. Security has emerged as the most important obstacle to faster and more widespread adoption of cloud computing. International Workshop on Cloud Security and Cryptography (CloudCrypto’14) aims to bring together researchers and practitioners in all security aspects of cloud computing. We encourage submissions on all theoretical and practical aspects, as well as experimental studies of deployed systems.

Topics of interests include, but are not limited to the following:

  • Accountability for Cloud Computing
  • Availability, Recovery and Auditing
  • Cloud Access Control and Key Management
  • Cloud-Centric Threat Models
  • Coding and Cryptography for Secure Cloud
  • Parallel and Dynamic Searchable Symmetric Encryption
  • Attribute-Based Encryption
  • Multi-Party Computation with Low Communication
  • Homomorphic Encryption
  • Cryptographic Cloud Storage
  • Randomness Testing of Modern Encryption Techniques
  • Evolution of Cloud Security Measures
  • Failure Detection and Prediction
  • Cloud Forensics
  • Identity Management in the Cloud
  • Integrity and Verifiable Computation
  • Privacy Preserving Technologies in Cloud Computing
  • Proofs of Storage
  • Remote Attestation Mechanisms in Clouds
  • Scalability of Security in Global-Size Clouds
  • Secure Cloud Architecture
  • Secure Computation Outsourcing
  • Secure Data Management
  • Secure Management of Virtualized Resources
  • Secure Mobile Cloud
  • Security for Emerging Cloud Programming Models
  • Secured Searching in Cloud Data
  • Trust and Policy Management in Clouds
  • Continuous Security Monitoring
  • New Cloud-Aware Web Service Security Paradigms and Mechanisms
  • Business and Security Risk Models and Clouds
  • Case Studies and Experimental Implementations

 

Authors should submit their papers online via EDAS. Unregistered authors should first create an account on EDAS to log on. Further guidelines for submission are posted at: http://icacci-conference.org/website/call-papers

All submissions will be thoroughly peer-reviewed by experts in the field based on originality, significance and clarity, only papers presenting novel research results or successful innovative applications are considered for publication in the conference proceedings. The accepted and presented papers will be published in the conference proceedings and submitted to IEEE Xplore as well as other Abstracting and Indexing (A&I) databases. Independently of the presentation type, all papers are included in the proceedings.

 

Technical Program Committee

 

Program Chair(s)

Eric Renault, Institut Mines-Telecom -- Telecom SudParis, France
 

TPC Members

Abdellah Jamali, Hassan 1st University-Settat, Morocco
Abdullahi Arabo, University of West England, United Kingdom
Aditi Sharma, MBM Engineering College Jodhpur, India
Ahmed Khamis, Carlow Institute Of Technology, Ireland
Alex Morgan, PN University of Tehran, Central Organization, Iran
Anala Pandit, Veermata Jijabai Technological Institute, India
Ang Li, Duke University, USA
Carlos Becker Westphall, Federal University of Santa Catarina, Brazil
Charalampos Patrikakis, Technological Educational Institute of Piraeus, Greece
Chen Liu, UtopiaCompression Corporation, USA
Chien-Ming Cheng, National Chiao Tung University, Taiwan
Christoph Meinel, Hasso Plattner Institute, University of Potsdam, Germany
Chung-Hua Chu, National Taichung Institute of Technology, Taiwan
David Nguyen, College of William and Mary, USA
Faqir Yousaf, NEC Laboratories, Europe, Germany
Fei Ge, Central China Normal University, P.R. China
Francesco Tusa, University College London, Italy
Hemant Mehta, Devi Ahilya University, India
Herath M Nelanga Bandara, University of Moratuwa, Sri Lanka
Hongfang Yu, University of Electronic Science and Technology of China, P.R. China
Íñigo Goiri, Universitat Politecnica de Catalunya, Spain
Iweha Onyedikachi, Kogi State Polytechnic Lokoja, Kogi State, Nigeria
Jamalul-lail Ab Manan, MIMOS Berhad, Malaysia
Jeremie Leguay, Thales Communications & Security, France
Jinrui Huang, National Laboratory, USA
Jitendra Patel, KDPolytechnic Patan, India
Jonathan Tate, Private Sector, United Kingdom
Lisandro Granville, Federal University of Rio Grande do Sul, Brazil
Marcel Kunze, Karlsruhe Institute of Technology (KIT), Germany
Maurice Khabbaz, Notre-Dame University, Lebanon
Mehdi Bahrami, University of California, Merced, USA
Mehmet Tahir Sandikkaya, Istanbul Technical University, Turkey
Mohamed Faten Zhani, University of Waterloo - Canada, Canada
Mohammad Rahman, University of Asia Pacific, Bangladesh
Munivel E, Scientist/Engineer 'B', NIELIT Calicut, India
Nikolaos Bardis, Hellenic Army Academy, Greece
Otávio Gomes, Instituto Federal de Minas Gerais, Brazil
Philippe Merle, Inria Lille - Nord Europe, France
Qi Wang, University of the West of Scotland, United Kingdom
Qinyin Chen, Glyndwr University, United Kingdom
Quamar Niyaz, University of Toledo, USA
Rajneesh Talwar, PunjabTechnicalUniversity, India
Ramin Yahyapour, GWDG - University Göttingen, Germany
Saad Darwish, University of Alexandria, Egypt
Salahideen AlHaj, Arab American University, Jordan
Stan Kurkovsky, Central Connecticut State University, USA
Stefano Giordano, University of Pisa, Italy
Tuan-Minh Pham, HNUE, Vietnam
Vishrut Sharma, Accenture Services Pvt. Ltd., India
Vydeki Dharmar, Easwari Engineering College, India
Wei-Chih Ting, Industrial Technology Research Institute, Taiwan
Weidong (Larry) Shi, University of Houston, USA
Wenping Liu, Huazhong University of Science and Technology, P.R. China
Xianghui Cao, Illinois Institute of Technology, USA
Xiangzhou Zhang, Sun Yat-sen University, P.R. China
Yang Song, IBM Research, USA
Yoshiaki Kiriha, NEC, Japan

 

Accepted Papers

Design and Implementation ofForensic Framework for Cloud in Open Stack Cloud Platform (Regular paper)
Saibharath. S and Geethakumari. G

A Case for CDN–as–a–Service in the Cloud: A Mobile Cloud Networking Argument (Regular paper)
Florian Dudouet, Piyush Harsh, Santiago Ruiz, Andre Gomes and Thomas Michael Bohnert

Study and Analysis of Various Task Scheduling Algorithms in the Cloud Computing Environment (Regular paper)
Teena Mathew, K. Chandra Sekaran and John Jose

A Robust Scheme on Proof of Data Retrievability in Cloud (Regular paper)
Nitin Singh Chauhan and Ashutosh Saxena

Biometrics Template Security on Cloud Computing (Short paper)
Heba M.Sabri, Kareem Kamal A.Ghany, Hesham A.Hefny and Nashaat Elkhameesy

A Review of Adaptive Approaches to Map Reduce Scheduling in Heterogeneous Environments (Short paper)
Nenavath Srinivas Naik, Atul Negi and V. N.Sastry

Key Dates

 Paper Submission Ends

June 25, 2014

 Acceptance Notification

July 20, 2014

 Final Paper Deadline

August 20, 2014

 Author Registration Closes

August 22, 2014

 Conference

24 – 27 September 2014