2010

Call for Papers

Cloud computing represents today’s most exciting computing paradigm shift in information technology. By moving data and computing services to the large data centers, cloud promises to provide unprecedented benefits like ubiquitous network access, rapid resource elasticity, minimal management overhead, etc. However, its unique attributes also raise many security and privacy challenges in areas such as data security, privacy, recovery, access control, trusted computing, as well as legal issues like regulatory compliance and auditing, where the management of the data and services are not fully trustworthy. Due to the fundamental paradigm shift in cloud, many security concerns have to be better understood, unanticipated vulnerabilities identified, and viable solutions to critical threats devised, before the wide cloud deployment can take place. This workshop aims to bring together research efforts from both the academia and industry. We encourage submissions on theoretical, practical, as well as experimental studies related to all aspects of security and privacy in cloud computing. Topics of interests include (but are not limited to) the following topic categories:

  • Secure cloud architecture
  • Cloud access control and key management
  • Identification and privacy in cloud
  • Computation over encrypted data
  • Integrity assurance for data outsourcing
  • Software and data segregation security
  • Secure management of virtualized resources
  • Joint security and privacy aware protocol design
  • Failure detection and prediction
  • Secure data management within and across data centers
  • Trusted computing technology and clouds
  • Availability, recovery and auditing
  • Integrity and verifiable computation
  • Secure mobile cloud

Authors are invited to submit either Research Papers or Position Papers or both. Position Papers that define new problems in cloud computing security or provide visions and clarifications of cloud computing security are solicited. Regular Research Papers that present novel research results on security and privacy in cloud computing, and Short Research Papers that describe work-in-progress ideas are also welcome. Research Papers and Position Papers will be reviewed separately.

Time Table

Manuscript submission: Jul. 15th, 2013 (extended deadline)
Acceptance notification: Aug. 9th, 2013
Final Manuscript due: Aug. 16th, 2013
Workshop Date: Oct. 16, 2013

Paper Submission

Form of Manucript: All paper submissions should follow the IEEE 8.5" x 11" Two-Column Format. Regular Research Paper submission can have 10 pages plus up to 2 over-length pages. If the paper is accepted for publication, an over-length fee will be charged to each of the over-length pages, at $200 per page in the final camera-ready version. Position Papers and Short Research Papers, on the other hand, are allowed to be up to 5 pages.

Electronic Submission: http://edas.info/N14845

IEEE and IEEE Communications Society Policies: To ensure appropriate consideration of conflicts of interest during the review process, the ComSoc prohibits changes to the list of authors once a paper has been submitted for review during review, revision, or (if accepted) final publication. The author list may be changed only prior to the submission deadline.

Additional paper submittal instructions can be found on the conference web site http://www.ieee-cns.org/.

To be published in the IEEE CNS 2013 Conference Proceedings and submitted to IEEE Xplore®, an author of an accepted paper is required to register for the workshop at the full (member or non-member) rate and the paper must be presented by an author of that paper at the conference unless the Workshop Chair grants permission for a substitute presenter.

Non-refundable registration fees must be paid prior to uploading the final IEEE formatted, publication-ready version of the paper. For authors with multiple accepted papers, one full registration is valid for up to 3 papers. Accepted and presented papers will be published in the IEEE CNS 2013 conference proceedings and submitted to IEEE Xplore®.

Technical Program


Keynote I (Keynote Chair: Anna Squicciarini, Pennsylvania State University)
09:00 - 10:00 Experimental Research for Cloud Computing Security
Prof. Sonia Fahmy, Purdue University
10:00 - 10:30 Break
  Technical Session I (Session Chair: Shucheng Yu, University of Arkansas at Little Rock)
10:30 - 11:00
A Cloud Computing Based Architecture for Cyber Security Situation Awareness
Wei Yu, Guobin Xu, Zhijiang Chen, and Paul Moulema, Towson University
11:00 - 11:30
Looking at the Overheads of Transmitting Encrypted Data to the Cloud
Yufeng Wang and Chiu C. Tan, Temple University
11:30 - 12:00
Rootkit Detection on Virtual Machines through Deep Information Extraction at Hypervisor level
Xiongwei Xie and Weichao Wang, University of North Carolina at Charlotte
12:00 - 13:20 Lunch break
Keynote II (Keynote Chair: Kui Ren, State University of New York, Buffalo)
13:20 - 14:20 Exploring New Security Vulnerabilities inside the Cloud
Prof. Haining Wang, the College of William and Mary
  Technical Session II (Session Chair: Weichao Wang, University of North Carolina at Charlotte)
14:20 - 14:50
Computing Encrypted Cloud Data Efficiently under Multiple Keys
Boyang Wang, Xidian University, Ming Li, Utah State University, Sherman S. M. Chow, Chinese University of Hong Kong, and Hui Li, Xidian University
14:50 - 15:10
Towards Auditable Cloud-Assisted Access of Encrypted Health Data
Yue Tong, Jinyuan (Stella) Sun, University of Tennessee, Sherman S. M. Chow, Chinese University of Hong Kong, and Pan Li, Mississippi State University
15:10 - 15:30
Flexible and Publicly Verifiable Aggregation Query for Outsourced Databases in Cloud
Jiawei Yuan and Shucheng Yu, University of Arkansas at Little Rock

Organizing Committees

Program Co-chairs

Kui Ren, State University of New York, Buffalo
Anna Squicciarini, Pennsylvania State University

Web and Publicity Chair

Cong Wang, City University of Hong Kong

Technical Program Committee

Sherman S.M. Chow, The Chinese University of Hong Kong
Roberto Di Pietro, Università di Roma Tre
Sara Foresti, Università degli Studi di Milano
Florian Kerschbaum, SAP Research
Adam Lee, University of Pittsburgh
Ming Li, Utah State University
Dan Lin, Missouri University of Science and Technology
Di Ma, University of Michigan-Dearborn
Pierre Parrend, ECAM Strasbourg-Europe
Daniela Oliveira, Bowdoin College
Federica Paci, University of Trento
Jakub Szefer, Princeton University
Shambhu Upadhyaya, State University of New York, Buffalo
Cong Wang, City University of Hong Kong
Lingyu Wang, Concordia University
Shucheng Yu, University of Arkansas at Little Rock

Previous Edition

Updated: 09/13/2013