2010

Call for Papers

Cloud computing has recently emerged as a new information technology infrastructure. Cloud computing has unique attributes that raise many security and privacy challenges in areas such as data security, recovery, and privacy, as well as legal issues in areas such as regulatory compliance and auditing. In contrast to traditional enterprise IT solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the servers in large data centers on the Internet, where the management of the data and services are not fully trustworthy. When clients store their data on the server without themselves possessing a copy of it, how the integrity of the data can be ensured if the server is not fully trustworthy? Will encryption solve the data confidentiality problem of sensitive data? How will encryption affect dynamic data operations such as query, insertion, modification, and deletion? Data in the cloud is typically in a shared environment alongside data from other clients. How the data segregation should be done, while data are stored, transmitted, and processed? Due to the fundamental paradigm shift in cloud computing, many security concerns have to be better understood, unanticipated vulnerabilities identified, and viable solutions to critical threats devised, before the wide deployment of cloud computing techniques can take place.

We are soliciting both full papers that present relatively complete and mature research results and short position papers that report work-in-progress but inspiring and intriguing new ideas. Topics of interests include (but are not limited to) the following subject categories:

  • Secure cloud architecture
  • Cloud access control and key management
  • Identification and privacy in cloud
  • Remote data integrity protection
  • Dynamic data operation security
  • Software and data segregation security
  • Secure management of virtualized resources
  • Joint security and privacy aware protocol design
  • Failure detection and prediction
  • Secure data management within and across data centers
  • Availability, recovery and auditing
  • Secure wireless cloud

Authors are invited to submit either Research Papers or Position Papers or both. Position Papers that define new problems in cloud computing security or provide visions and clarifications of cloud computing security are solicited. Regular Research Papers that present novel research results on security and privacy in cloud computing, and Short Research Papers that describe work-in-progress ideas are also welcome. Research Papers and Position Papers will be reviewed separately.

Time Table

Manuscript submission: February 17, 2011, 11:59pm, EST, USA (extended deadline)
Acceptance notification: March 15, 2011
Final Manuscript due: March 30, 2011
Workshop Date: June 24, 2011

Paper Submission

Form of Manucript: All paper submissions should follow the IEEE 8.5" x 11" Two-Column Format. Regular Research Paper submission can have 10 pages plus up to 2 over-length pages. If the paper is accepted for publication, an over-length fee will be charged to each of the over-length pages, at $200 per page in the final camera-ready version. Position Papers and Short Research Papers, on the other hand, are allowed to be up to 5 pages.

Electronic Submission: http://www.easychair.org/conferences/?conf=icdcsspcc11.

Technical Program


09:00 - 09:40 Keynote, Prof. Zhi-Li Zhang, University of Minnesota
  Title: Know Your Enemy & Know Yourself: Traffic Behavior Profiling for Network Security Monitoring
The abstract and speaker's short bio is available here.
09:40 - 09:50 Break
09:50 - 11:20 Technical Session I (Chair: Kui Ren, Illinois Institute of Technology)
 
A Case for Hardware Protection of Guest VMs from Compromised Hypervisors in Cloud Computing
Jakub Szefer and Ruby B. Lee, Princeton University
 
Enforcing Policy and Data Consistency of Cloud Transactions
Marian K. Iskander, Dave W. Wilkinson, Adam J. Lee, and Panos K. Chrysanthis, University of Pittsburgh
 
Private Editing Using Untrusted Cloud Services
Yan Huang and David Evans, University of Virginia
11:20 - 11:30 Break
11:30 - 12:30 Technical Session II (Chair: Wenjing Lou, Virginia Tech)
 
Privacy-aware BedTree Based Solution for Fuzzy Multi-keyword Search over Encrypted Data
Mooi-Choo Chuah and Wei Hu, Lehigh University
 
Towards Secure and Effective Utilization over Encrypted Cloud Data
Cong Wang and Kui Ren, Illinois Institute of Technology

Organizing Committees

Program Co-chairs

Moti Yung, Google Inc.
Xuxian Jiang, North Carolina State University

Publicity Chair

Kui Ren, Illinois Institute of Technology

Technical Program Committee

Jack Brassil, HP Laboratories
Xuhua Ding, Singapore Management University
David Evans, University of Virginia
Xinwen Fu, UMass Lowell
Xuxian Jiang, North Carolina State University
Ruby B. Lee, Princeton University
Wenjing Lou, Worcester Polytechnic Institute
Di Ma, University of Michigan, Dearborn
Peter Mueller, IBM Zurich Research
Cristina Nita-Rotaru, Purdue University
Sergey Panasyuk, US Air Force Research Laboratory
Kui Ren, Illinois Institute of Technology
Paul Ruth, University of Mississippi
Pierangela Samarati, Università degli Studi di Milano
Chad Verbowski, eBay Inc.
Mladen Vouk, North Carolina State University
Cliff Wang, US Army Research Office
Xinyuan (Frank) Wang, George Mason University
Zhi Wang, North Carolina State University
Samuel Weber, National Science Foundation
Moti Yung, Google Inc.
Xiaolan (Catherine) Zhang, IBM T.J. Watson Research

Steering Committee

Peng Ning, North Carolina State University, Raleigh
Jeffrey Chase, Duke University
David Du, University of Minnesota
Ari Juels, RSA Laboratories
Wenjing Lou, Worcester Polytechnic Institute
Michael Reiter, University of North Carolina at Chapel Hill
Moti Yung, Google Inc.

Previous Edition: ICDCS-SPCC 2010 and the online proceedings.

Updated: 06/19/2011, ©2011 UbiSeC Lab, All Rights Reserved