IJCC 2011 - Security, Privacy and Trust in Cloud Systems Special Issue of International Journal of Cloud Computing (IJCC)
Topics/Call fo Papers
Security, Privacy and Trust in Cloud Systems
Special Issue of International Journal of Cloud Computing (IJCC)
Inderscience Publishers
Cloud computing provides a new paradigm to enable on-demand delivery of computing resources such as infrastructure, platform, and software to customers as utilities. When moving applications and/or data in the cloud, numerous challenges exist to leverage the full potential that cloud computing promises. Despite what cloud computing promises, it is not secure by nature. The security challenges related to Cloud computing are worth of a deeper attention. In terms of security, Cloud based services must be managed and operated at equivalent levels to enterprise systems. Commercial enterprises often do not want to store their data in the cloud due to the lack of trust and the risk of exposing their data in an untrusted environment. Cloud users typically have no control over the Cloud storage servers used and there is an inherent risk of data exposure to third parties on the Cloud or the Cloud provider itself. The data must be properly encrypted both in motion and at rest. In addition, companies and government agencies are often bound by law to host their application and/or data within specific geographic boundaries. This calls for hybrid cloud environments that can seamlessly work together, where part of the application/data can be hosted in a public cloud and other part such as commercial sensitive data is hosted on premises. In this context, a key challenge is the provisioning of a secure and trusted application/data that can be operated in a hybrid cloud environment. This special issue aims at compiling technologies for enhancing and provisioning security, privacy and trust in cloud computing environment based on QoS requirements. The topics of interest include, but are not limited to:
- Cloud Security Architecture and Protocol
- Secured Cloud Management Service
- Secured Information Sharing and Data Protection in the Cloud
- QoS-based Trust Model and QoS Monitoring Mechanism
- Cryptography and Crypto-Protocols for Cloud Computing Systems
- Security and Virtualization
- Risk Management in Cloud Computing Environments
- Privacy Protection in Cloud Platforms and Operations
- Autonomic Security in Cloud Computing
- Intra and Inter-cloud Security Issues and Considerations
- Privacy Policy Framework for Clouds
- Access Control Mechanisms
- Mechanisms to Enforce Privacy and Trust
- Energy/Cost/Efficiency of Security in Clouds
- Trust Models for Cloud Services
Guest Editors:
Surya Nepal - CSIRO, Australia
surya.nepal-AT-csiro.au
Mukaddim Pathan - CSIRO, Australia
mukaddim.pathan-AT-csiro.au
Submission Details:
Papers will be evaluated based on their originality, presentation, relevance and contribution to the field of Cloud computing, as well as their suitability to the special issue, and for their overall quality. Contributions are accepted for review on the understanding that the same work has not been published and that it is not being considered for publication elsewhere. Substantially revised (minimum 30% of new content) versions of papers published in conference proceedings can also be submitted. In this case, the original paper should also be enclosed.
Only electronic submissions are possible. Authors are required to prepare manuscript not exceeding 20 pages, following the guideline available here: http://www.inderscience.com/mapper.php?id=31. Papers should be submitted using the online system at: http://www.inderscience.com/mapper.php?id=35&jid=3.... The guest editors should be notified at the time of submission and the author is responsible for obtaining the necessary copyright releases for all copyrighted material.
Important Dates:
Submission Due: August 15, 2011
Acceptance Notification: October 15, 2011
Final Submission: November 15, 2011
Publication Date: TBA
--
Dr Mukaddim Pathan
Research Scientist, CSIRO ICT Center &
Lecturer (Adjunct), Australian National University
Room # S214, 108 North Road, Acton, ACT 2601, Australia
Contact: +61-2-6216 7097 (Office)
Email: mukaddim.pathan-AT-csiro.au
Web: www.ict.csiro.au/staff/mukaddim.pathan
http://cecs.anu.edu.au/~mukaddim.pathan
Special Issue of International Journal of Cloud Computing (IJCC)
Inderscience Publishers
Cloud computing provides a new paradigm to enable on-demand delivery of computing resources such as infrastructure, platform, and software to customers as utilities. When moving applications and/or data in the cloud, numerous challenges exist to leverage the full potential that cloud computing promises. Despite what cloud computing promises, it is not secure by nature. The security challenges related to Cloud computing are worth of a deeper attention. In terms of security, Cloud based services must be managed and operated at equivalent levels to enterprise systems. Commercial enterprises often do not want to store their data in the cloud due to the lack of trust and the risk of exposing their data in an untrusted environment. Cloud users typically have no control over the Cloud storage servers used and there is an inherent risk of data exposure to third parties on the Cloud or the Cloud provider itself. The data must be properly encrypted both in motion and at rest. In addition, companies and government agencies are often bound by law to host their application and/or data within specific geographic boundaries. This calls for hybrid cloud environments that can seamlessly work together, where part of the application/data can be hosted in a public cloud and other part such as commercial sensitive data is hosted on premises. In this context, a key challenge is the provisioning of a secure and trusted application/data that can be operated in a hybrid cloud environment. This special issue aims at compiling technologies for enhancing and provisioning security, privacy and trust in cloud computing environment based on QoS requirements. The topics of interest include, but are not limited to:
- Cloud Security Architecture and Protocol
- Secured Cloud Management Service
- Secured Information Sharing and Data Protection in the Cloud
- QoS-based Trust Model and QoS Monitoring Mechanism
- Cryptography and Crypto-Protocols for Cloud Computing Systems
- Security and Virtualization
- Risk Management in Cloud Computing Environments
- Privacy Protection in Cloud Platforms and Operations
- Autonomic Security in Cloud Computing
- Intra and Inter-cloud Security Issues and Considerations
- Privacy Policy Framework for Clouds
- Access Control Mechanisms
- Mechanisms to Enforce Privacy and Trust
- Energy/Cost/Efficiency of Security in Clouds
- Trust Models for Cloud Services
Guest Editors:
Surya Nepal - CSIRO, Australia
surya.nepal-AT-csiro.au
Mukaddim Pathan - CSIRO, Australia
mukaddim.pathan-AT-csiro.au
Submission Details:
Papers will be evaluated based on their originality, presentation, relevance and contribution to the field of Cloud computing, as well as their suitability to the special issue, and for their overall quality. Contributions are accepted for review on the understanding that the same work has not been published and that it is not being considered for publication elsewhere. Substantially revised (minimum 30% of new content) versions of papers published in conference proceedings can also be submitted. In this case, the original paper should also be enclosed.
Only electronic submissions are possible. Authors are required to prepare manuscript not exceeding 20 pages, following the guideline available here: http://www.inderscience.com/mapper.php?id=31. Papers should be submitted using the online system at: http://www.inderscience.com/mapper.php?id=35&jid=3.... The guest editors should be notified at the time of submission and the author is responsible for obtaining the necessary copyright releases for all copyrighted material.
Important Dates:
Submission Due: August 15, 2011
Acceptance Notification: October 15, 2011
Final Submission: November 15, 2011
Publication Date: TBA
--
Dr Mukaddim Pathan
Research Scientist, CSIRO ICT Center &
Lecturer (Adjunct), Australian National University
Room # S214, 108 North Road, Acton, ACT 2601, Australia
Contact: +61-2-6216 7097 (Office)
Email: mukaddim.pathan-AT-csiro.au
Web: www.ict.csiro.au/staff/mukaddim.pathan
http://cecs.anu.edu.au/~mukaddim.pathan
Other CFPs
- HIPAA Security Policies and Procedures: Making them useful and relevant as well as compliant - Webinar By GlobalCompliancePanel
- Mobile Payments & NFC Asia 2011
- 8th Bayesian Modeling Applications Workshop
- ECCB12 - European Conference on Computational Biology 2012
- IADIS International Workshop on Information Systems Research Trends, Approaches and Methodologies (ISRTAM)
Last modified: 2011-04-14 19:47:19