Cloud Security and Data Privacy by Design (CloudSPD’16) as part of CloudCom 2016, Luxembourg, December 12, 2016.
Enterprises increasingly recognize the compelling economic and operational benefits of Cloud Computing. Virtualizing and pooling IT resources in the cloud enables organizations to realize significant cost savings and accelerates deployment of new applications, simultaneously transforming business and government at an unprecedented pace. However, those valuable business benefits cannot be unlocked without addressing new data security challenges posed by Cloud Computing.
Deploying confidential information and critical IT resources in the Cloud raises concerns about vulnerability to attack, especially because of the anonymous, multi-tenant nature of cloud computing. Applications and storage volumes often reside next to potentially hostile virtual environments, leaving information at risk to theft, unauthorized exposure or malicious manipulation. Governmental regulation of data privacy and location presents the additional concern of significant legal and financial consequences if data confidentiality is breached, or if Cloud providers inadvertently move regulated data across international borders.
This workshop aims to provide a fertile ground for creative debate and presentation of research results, practical experiences, and innovative ideas in all security aspects related to cloud computing. CloudSPD’16 focuses on Cloud Computing security, and invites research efforts from both the academia and industry in order to facilitate the dissemination of research and development of the next generation cloud platforms, applications and methods that will lead to better and more secure by design cloud-based systems.
Topics of interest comprise, but are not limited to, the following categories:
- Cloud Security by design frameworks
- Intra- and inter-cloud security issues
- Privacy policies for clouds
- Secure management of virtualized resources
- Privacy Enforcement for cloud applications and platforms
- Trusted computing technology
- Cloud access control and key management
- Computation over encrypted data
- Secure cloud architecture
- Data protection and secured information sharing in the cloud
|Notification of acceptance|
Submitted manuscripts should be structured as technical papers and may not exceed six (6) single-spaced double-column pages using 10-point size font on 8.5×11 inch pages (IEEE conference style), including figures, tables, and references. Templates can be found here.
Electronic submissions must be in the form of a readable PDF file.
Manuscripts must be received by 15 September, 2016. All manuscripts will be blind peer reviewed by the Program Committee and evaluated on originality, relevance of the problem to the conference theme, technical strength, rigor in analysis, quality of results, and organization and clarity of presentation of the paper.
Submissions will be done electronically through EasyChair: https://easychair.org/conferences/?conf=cloudspd16
At least one author of each accepted paper must be registered for the CloudCom 2016 conference and present the paper in order to be published in the proceedings.
|Gregoris Mentzas||National Technical University of Athens||Greece|
|Antonios Michalas||University of Westminster||UK|
|Yiannis Verginadis||National Technical University of Athens||Greece|
|Isaac Agudo||University of Malaga||Spain|
|Jens-Matthias Bohli||Hochschule Mannheim||Germany|
|Simone Braun||CAS Software AG||Germany|
|George Dimitrakopoulos||Harokopio University of Athens||Greece|
|Christos Douligeris||University of Piraeus||Greece|
|Nikos Komninos||City University||UK|
|George Moldovan||Siemens SRL||Romania|
|Septimiu Nechifor||Siemens SRL||Romania|
|Ioannis Patiniotakis||National Technical University of Athens||Greece|
|Andreas Schaad||Huawei Technologies||Germany|
|Antonia Schwichtenberg||CAS Software AG||Germany|