Eng · 繁體 · 简体

Dr WANG, Cong 王聰

BEng MEng Wuhan, PhD Illinois Inst. Tech., MACM, MIEEE

Assistant Professor

Dr WANG, Cong

Contact Information

Office: AC1-Y6425
Phone: +(852)-3442-2010
Fax: +(852)-3442-0503
Email: congwang@cityu.edu.hk
Web: Personal Homepage

Research Interests

  • Cloud Computing
  • Data and Computation Outsourcing Security
  • Access Control
  • Computer and Mobile Networks

My primary research interests are in the areas of cloud computing and network security, with current focus on securing the data and computation outsourced into the cloud. I obtained my Bachelor and Master degree from Wuhan University, and PhD degree from Illinois Institute of Technology. I was a member of UbiSeC Lab at IIT from 2008 to 2012, and worked at Palo Alto Research Center in the summer of 2011.

I am looking for self-motivated students to work with me on the exciting area of cloud computing and security. Please contact me if you are interested. You can find more details of my current research here.

My Google Scholar Author Profile

Publications

Journal and Magazine Articles

  • Cong Wang, Sherman S.M. Chow, Qian Wang, Kui Ren, and Wenjing Lou, "Privacy-Preserving Public Auditing for Secure Cloud Storage", IEEE Transactions on Computers (TC), 2011 (Accepted for publication).
  • Cong Wang, Ning Cao, Kui Ren, and Wenjing Lou, "Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data", IEEE Transactions on Parallel and Distributed Systems (TPDS), 2011 (Accepted for publication).
  • Cong Wang, Qian Wang, Kui Ren and Wenjing Lou, "Towards Secure and Dependable Storage Services in Cloud Computing", IEEE Transactions on Service Computing (TSC), 2011 (Accepted for publication).
  • Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, and Jin Li, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing", IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol. 22, No. 5, pp. 847-859, May, 2011. (#1 top accessed IEEE TPDS article in IEEE Xplore as of January 2012)
  • Kui Ren, Cong Wang, and Qian Wang, "Security Challenges for the Public Cloud", IEEE Internet Computing, 2012. (Invited Paper) (#1 top accessed IEEE Internet Computing article in IEEE Xplore as of January 2012)
  • Cong Wang, Kui Ren, Wenjing Lou, and Jin Li, "Towards Publicly Auditable Secure Cloud Data Storage Services", IEEE Network Magazine, Vol. 24, No. 4, pp. 19-24, July/August 2010.
  • Jin Li, Qian Wang, Cong Wang, and Kui Ren, "Enhancing Attribute-based Encryption with Attribute Hierarchy", ACM Mobile Networks and Applications (MONET), Vol. 16, pp. 553-561, 2011.

Conference and Workshop Papers

  • Cong Wang, Kui Ren, Shucheng Yu, Karthik Mahendra Raje Urs, "Achieving Usable and Privacy-assured Similarity Search over Outsourced Cloud Data", In the 31st IEEE Conference on Computer Communications (INFOCOM'12), Orlando, Florida, March 25-30, 2012 (Acceptance ratio = 278/1547 = 18%)
  • Cong Wang, Qian Wang, and Kui Ren, "Towards Secure and Effective Utilization over Encrypted Cloud Data", In the 2nd International Workshop on Security and Privacy in Cloud Computing (SPCC), co-held with the 31st International Conference on Distributed Computing Systems (ICDCS'11), Minneapolis, MN, June 20-24, 2011, pp. 282-286.
  • Cong Wang, Kui Ren, Jia Wang, and Karthik Mahendra Raje Urs, "Harnessing the Cloud for Securely Solving Large Systems of Linear Equations", In the 31st International Conference on Distributed Computing Systems (ICDCS'11), Minneapolis, MN, June 20-24, 2011, pp. 549-558. (Acceptance ratio = 10/76 = 13% for the track of security and privacy)
  • Ning Cao, Zhenyu Yang, Cong Wang, Kui Ren, and Wenjing Lou, "Privacy-perserving Query over Encrypted Graph-Structured Data in Cloud Computing", In the 31st International Conference on Distributed Computing Systems (ICDCS'11), Minneapolis, MN, June 20-24, 2011. (Acceptance ratio = 10/76 = 13% for the track of security and privacy)
  • Cong Wang, Kui Ren, and Jia Wang, "Secure and Practical Outsourcing of Linear Programming in Cloud Computing", In the 30th IEEE Conference on Computer Communications (INFOCOM'11), Shanghai, China, April 10-15, 2011. (Acceptance ratio = 291/1823 < 16%, #1 top accessed INFOCOM'11 article in IEEE Xplore as of January 2012)
  • Ning Cao, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou, "Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data", In the 30th IEEE Conference on Computer Communications (INFOCOM'11), Shanghai, China, April 10-15, 2011. (Acceptance ratio = 291/1823 < 16%)
  • Cong Wang, Ning Cao, Jin Li, Kui Ren, and Wenjing Lou, "Secure Ranked Keyword Search over Encrypted Cloud Data", In the 30th International Conference on Distributed Computing Systems (ICDCS'10), Genoa, Italy, June 21-25, 2010. (Acceptance ratio = 84/585 = 14%, #1 top accessed ICDCS'10 article in IEEE Xplore as of January 2012)
  • Shucheng Yu, Cong Wang, Kui Ren, and Wenjing Lou, "Attribute Based Data Sharing with Attribute Revocation", In the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS'10), Beijing, China, April 13-16, 2010. (Acceptance ratio = 25/166 = 15%)
  • Cong Wang, Qian Wang, Kui Ren, and Wenjing Lou, "Privacy-preserving Public Auditing for Data Storage Security in Cloud Computing", In the 29th IEEE Conference on Computer Communications (INFOCOM'10), San Diego, CA, March 15-19, 2010. (Acceptance ratio = 276/1575 = 17.5%, #1 top accessed INFOCOM'10 article in IEEE Xplore as of January 2012)
    Note: A complete rewrite of this preliminary work with significantly improved constructions and extensions is available as ePrint Tech Report, collaborated with Sherman Chow, April 2010
  • Shucheng Yu, Cong Wang, Kui Ren, and Wenjing Lou, "Achieving Secure, Scalable, and Fine-grained Data Dccess Control in Cloud Computing", In the 29th IEEE Conference on Computer Communications (INFOCOM'10), San Diego, CA, March 15-19, 2010. (Acceptance ratio = 276/1575 = 17.5%, #2 top accessed INFOCOM'10 article in IEEE Xplore as of January 2012)
  • Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, and Wenjing Lou, "Fuzzy Keyword Search over Encrypted Data in Cloud Computing", In the 29th IEEE Conference on Computer Communications (INFOCOM'10), mini-conference, San Diego, CA, March 15-19, 2010.
  • Qian Wang, Cong Wang, Jin Li, Kui Ren, and Wenjing Lou, "Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing", In the 14th European Symposium on Research in Computer Security (ESORICS'09), Saint Malo, France, September 21-23, 2009. (Acceptance ratio = 42/220 = 19%)
  • Jin Li, Qian Wang, Cong Wang, and Kui Ren, "Enhancing Attribute-based Encryption with Attribute Hierarchy", In the 4th International Conference on Communications and Networking in China (ChinaCom'09), Xi'an, China, August 26-28, 2009. Best Paper Award.
  • Cong Wang, Qian Wang, Kui Ren, and Wenjing Lou, "Ensuring Data Storage Security in Cloud Computing", In the 17th IEEE International Workshop on Quality of Service (IWQoS'09), Charleston, South Carolina, July 13-15, 2009.
  • Qian Wang, Kui Ren, Cong Wang, and Wenjing Lou, "Efficient Fine-grained Data Access Control in Wireless Sensor Networks", In the 28th International Conference for Military Communications (MILCOM'09), Boston, MA, October 18-21, 2009. Invited.

Patents

  • Kurt Partridge, Ersin Uzun, Cong Wang, and Manas Pathak, "Privacy-Preserving Behavior Targeting for Digital Coupons", US patent filed in December 2011.
  • Manas Pathak, Richard Chow, Elaine Shi, and Cong Wang, "Privacy-preserving Collaborative Filtering", filed on December 8th, 2011, US Patent Application No. 13/314,748.

Professional Activities

Some Useful Links