Data Security 2017 - Call for Book Chapter proposal - Data Security in Cloud Computing
Topics/Call fo Papers
Cloud computing is transforming the way we view and perform computing. Many organizations have already embraced this paradigm of a centralized cloud, due to its benefits of economy, reliability, scalability and guaranteed quality of service among others. These benefits however are traded with the control of data, since data is stored, computed upon and accessed on the cloud, away from the premises of the data owner and the data user. This loss of control of data gives rise to a number of challenging data security issues, ranging from accountability, to data provenance, to identity and risk management among others. These issues have the capability to determine how effective and widespread cloud computing of the next generation is going to be and their solutions can push us into the right direction.
The book intends to provide the reader with a coverage of a wide range of issues on data security in cloud computing. It will cover issues directly related to various aspects of data security in cloud computing, along with a selection of topics on emerging technologies. The book will be published by Institute of Engineering and Technology (IET).
Topics of interest include but are not limited to:
Section 1: Data-AT-Rest
1. Secure data sharing in cloud
2. Remote data integrity check for auditing in cloud
3. Data leakage in cloud
4. Data loss/resilience in cloud
5. Access control of encrypted data in cloud
Section 2: Data-in-Transit
6. Secure information flow in and out of clouds
7. Emerging cloud encryption technologies
Section 3: Data-in-Processing
8. Accountability of data in cloud
9. Secure and privacy preserving computation in cloud
10. Secure virtual environments
Section 4: Data Provenance
11. Provenance of data in cloud
12. Security attribution in and across clouds
13. Identity management in federated clouds
Section 5: Governance, Risk, Compliance
14. Risk management in clouds
15. Cloud data governance
16. Data privacy legislation and integration with technologies
Section 6: Data Security Challenges in Emerging Technologies
17. Bring your own device
18. Internet of Things
19. Cyber-physical systems
20. Vehicular ad hoc networks
BOOK CHAPTER SUBMISSION AND AUTHOR INFORMATION
Chapter Proposals
Prospective authors must submit their chapter proposals in pdf format to https://edas.info/newPaper.php?c=22439 with the following information:
1. Chapter Title
2. Author Names, Affiliations
3. Author Emails
4. Book Section/ Topic Addressed (If this is not in the list above, please suggest)
5. Chapter Extended Abstract (300 words maximum)
6. Chapter Sections/ Chapter Outline (in bullet-point form)
7. Author Biography and Relevant Experience (100 words maximum)
While this is a call for proposals, completed chapter manuscripts are also welcome.
Submission of Manuscripts for Approved Proposals
After their proposals are approved, prospective authors will be invited to submit their manuscripts electronically. Submitted manuscripts will undergo a single-blind peer-review process. To ensure the quality of accepted manuscripts, each manuscript is typically reviewed by at least two independent expert reviewers. Only accepted peer-reviewed manuscripts will be published.
Submitted manuscripts should conform to the standard guidelines of the IET book chapter format, which can be downloaded from here (http://www.theiet.org/resources/author-hub/guides-...). Manuscripts that do not follow the formatting rules will be ignored. Manuscripts should also be written in a way that it is teaching a topic, and not just pure academic reports of research work or proposals. Vendor neutrality must be observed in the manuscripts. Survey papers of the above topics are welcome.
IMPORTANT DATES
* Chapter proposal due: 27 March 2016
* Book chapter submission: 28 August 2016
* Authors' notification: 3 October 2016
* Chapter Camera ready version: December 2016
* Estimated publication: September 2017
BOOK EDITORS
Dr. Vimal Kumar
University of Waikato, New Zealand
vkumar-AT-waikato.ac.nz
http://www.cms.waikato.ac.nz/people/vkumar
Dr Ryan Ko
University of Waikato, New Zealand
ryan-AT-waikato.ac.nz
http://ryanko.org
Dr. Sivadon Chaisiri
University of Waikato, New Zealand
chaisiri-AT-waikato.ac.nz
http://www.cms.waikato.ac.nz/people/chaisiri.
The book intends to provide the reader with a coverage of a wide range of issues on data security in cloud computing. It will cover issues directly related to various aspects of data security in cloud computing, along with a selection of topics on emerging technologies. The book will be published by Institute of Engineering and Technology (IET).
Topics of interest include but are not limited to:
Section 1: Data-AT-Rest
1. Secure data sharing in cloud
2. Remote data integrity check for auditing in cloud
3. Data leakage in cloud
4. Data loss/resilience in cloud
5. Access control of encrypted data in cloud
Section 2: Data-in-Transit
6. Secure information flow in and out of clouds
7. Emerging cloud encryption technologies
Section 3: Data-in-Processing
8. Accountability of data in cloud
9. Secure and privacy preserving computation in cloud
10. Secure virtual environments
Section 4: Data Provenance
11. Provenance of data in cloud
12. Security attribution in and across clouds
13. Identity management in federated clouds
Section 5: Governance, Risk, Compliance
14. Risk management in clouds
15. Cloud data governance
16. Data privacy legislation and integration with technologies
Section 6: Data Security Challenges in Emerging Technologies
17. Bring your own device
18. Internet of Things
19. Cyber-physical systems
20. Vehicular ad hoc networks
BOOK CHAPTER SUBMISSION AND AUTHOR INFORMATION
Chapter Proposals
Prospective authors must submit their chapter proposals in pdf format to https://edas.info/newPaper.php?c=22439 with the following information:
1. Chapter Title
2. Author Names, Affiliations
3. Author Emails
4. Book Section/ Topic Addressed (If this is not in the list above, please suggest)
5. Chapter Extended Abstract (300 words maximum)
6. Chapter Sections/ Chapter Outline (in bullet-point form)
7. Author Biography and Relevant Experience (100 words maximum)
While this is a call for proposals, completed chapter manuscripts are also welcome.
Submission of Manuscripts for Approved Proposals
After their proposals are approved, prospective authors will be invited to submit their manuscripts electronically. Submitted manuscripts will undergo a single-blind peer-review process. To ensure the quality of accepted manuscripts, each manuscript is typically reviewed by at least two independent expert reviewers. Only accepted peer-reviewed manuscripts will be published.
Submitted manuscripts should conform to the standard guidelines of the IET book chapter format, which can be downloaded from here (http://www.theiet.org/resources/author-hub/guides-...). Manuscripts that do not follow the formatting rules will be ignored. Manuscripts should also be written in a way that it is teaching a topic, and not just pure academic reports of research work or proposals. Vendor neutrality must be observed in the manuscripts. Survey papers of the above topics are welcome.
IMPORTANT DATES
* Chapter proposal due: 27 March 2016
* Book chapter submission: 28 August 2016
* Authors' notification: 3 October 2016
* Chapter Camera ready version: December 2016
* Estimated publication: September 2017
BOOK EDITORS
Dr. Vimal Kumar
University of Waikato, New Zealand
vkumar-AT-waikato.ac.nz
http://www.cms.waikato.ac.nz/people/vkumar
Dr Ryan Ko
University of Waikato, New Zealand
ryan-AT-waikato.ac.nz
http://ryanko.org
Dr. Sivadon Chaisiri
University of Waikato, New Zealand
chaisiri-AT-waikato.ac.nz
http://www.cms.waikato.ac.nz/people/chaisiri.
Other CFPs
- 1st International Workshop on Cyber Healthcare (CyberCare 2016)
- XIV-th International Conference Information Technologies and Software Engineering
- 2016 International Symposium on Advanced Big Data and Applications
- Research in Adaptive and Convergent Systems (RACS 2016)
- 2nd International Workshop on Reengineering for Parallelism in Heterogeneous Parallel Platforms
Last modified: 2016-03-14 22:19:04