ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

CloudSPD 2016 - Second International Workshop on Cloud Security and Data Privacy by Design (CloudSPD’16)

Date2016-12-12 - 2016-12-15

Deadline2016-08-22

VenueLuxembourg, Luxembourg Luxembourg

Keywords

Websitehttps://2016cloudcom.ux.uis.no/conf/work...

Topics/Call fo Papers

Enterprises increasingly recognize the compelling economic and operational benefits of Cloud Computing. Virtualizing and pooling IT resources in the cloud enables organizations to realize significant cost savings and accelerates deployment of new applications, simultaneously transforming business and government at an unprecedented pace. However, those valuable business benefits cannot be unlocked without addressing new data security challenges posed by Cloud Computing.
Deploying confidential information and critical IT resources in the Cloud raises concerns about vulnerability to attack, especially because of the anonymous, multi-tenant nature of cloud computing. Applications and storage volumes often reside next to potentially hostile virtual environments, leaving information at risk to theft, unauthorized exposure or malicious manipulation. Governmental regulation of data privacy and location presents the additional concern of significant legal and financial consequences if data confidentiality is breached, or if Cloud providers inadvertently move regulated data across international borders.
This workshop aims to provide a fertile ground for creative debate and presentation of research results, practical experiences, and innovative ideas in all security aspects related to cloud computing. CloudSPD’16 focuses on Cloud Computing security, and invites research efforts from both the academia and industry in order to facilitate the dissemination of research and development of the next generation cloud platforms, applications and methods that will lead to better and more secure by design cloud-based systems.
Topics
Topics of interest comprise, but are not limited to, the following categories:
Cloud Security by design frameworks
Intra- and inter-cloud security issues
Privacy policies for clouds
Secure management of virtualized resources
Privacy Enforcement for cloud applications and platforms
Trusted computing technology
Cloud access control and key management
Computation over encrypted data
Secure cloud architecture
Data protection and secured information sharing in the cloud

Last modified: 2016-08-15 23:53:00