International Workshop on Cloud Security and Cryptography (CloudCrypto’14)
http://icacci-conference.org/website/CloudCrypto2014 [1]
Cloud computing becomes the next generation architecture of IT Enterprise. Security has emerged as the most important obstacle to faster and more widespread adoption of cloud computing. International Workshop on Cloud Security and Cryptography (CloudCrypto’14) aims to bring together researchers and practitioners in all security aspects of cloud computing. We encourage submissions on all theoretical and practical aspects, as well as experimental studies of deployed systems.
Topics of interests include, but are not limited to the following:
- Accountability for Cloud Computing
- Availability, Recovery and Auditing
- Cloud Access Control and Key Management
- Cloud-Centric Threat Models
- Coding and Cryptography for Secure Cloud
- Parallel and Dynamic Searchable Symmetric Encryption
- Attribute-Based Encryption
- Multi-Party Computation with Low Communication
- Homomorphic Encryption
- Cryptographic Cloud Storage
- Randomness Testing of Modern Encryption Techniques
- Evolution of Cloud Security Measures
- Failure Detection and Prediction
- Cloud Forensics
- Identity Management in the Cloud
- Integrity and Verifiable Computation
- Privacy Preserving Technologies in Cloud Computing
- Proofs of Storage
- Remote Attestation Mechanisms in Clouds
- Scalability of Security in Global-Size Clouds
- Secure Cloud Architecture
- Secure Computation Outsourcing
- Secure Data Management
- Secure Management of Virtualized Resources
- Secure Mobile Cloud
- Security for Emerging Cloud Programming Models
- Secured Searching in Cloud Data
- Trust and Policy Management in Clouds
- Continuous Security Monitoring
- New Cloud-Aware Web Service Security Paradigms and Mechanisms
- Business and Security Risk Models and Clouds
- Case Studies and Experimental Implementations
Authors should submit their papers online via EDAS. Unregistered authors should first create an account on EDAS to log on. Further guidelines for submission are posted at: http://icacci-conference.org/website/call-papers [2]
All submissions will be thoroughly peer-reviewed by experts in the field based on originality, significance and clarity, only papers presenting novel research results or successful innovative applications are considered for publication in the conference proceedings. The accepted and presented papers will be published in the conference proceedings and submitted to IEEE Xplore as well as other Abstracting and Indexing (A&I) databases. Independently of the presentation type, all papers are included in the proceedings.
Technical Program Committee
Program Chair(s)
TPC Members
Accepted Papers
Design and Implementation ofForensic Framework for Cloud in Open Stack Cloud Platform (Regular paper)
Saibharath. S and Geethakumari. G
A Case for CDN–as–a–Service in the Cloud: A Mobile Cloud Networking Argument (Regular paper)
Florian Dudouet, Piyush Harsh, Santiago Ruiz, Andre Gomes and Thomas Michael Bohnert
Study and Analysis of Various Task Scheduling Algorithms in the Cloud Computing Environment (Regular paper)
Teena Mathew, K. Chandra Sekaran and John Jose
A Robust Scheme on Proof of Data Retrievability in Cloud (Regular paper)
Nitin Singh Chauhan and Ashutosh Saxena
Biometrics Template Security on Cloud Computing (Short paper)
Heba M.Sabri, Kareem Kamal A.Ghany, Hesham A.Hefny and Nashaat Elkhameesy
A Review of Adaptive Approaches to Map Reduce Scheduling in Heterogeneous Environments (Short paper)
Nenavath Srinivas Naik, Atul Negi and V. N.Sastry
Key Dates
Paper Submission Ends |
June 25, 2014 |
Acceptance Notification |
July 20, 2014 |
Final Paper Deadline |
August 20, 2014 |
Author Registration Closes |
August 22, 2014 |
Conference |
24 – 27 September 2014 |