Cloud computing provides a new paradigm to enable on-demand delivery of computing resources such as infrastructure, platforms and software as utilities to customers. When moving applications and/or data in the cloud, numerous challenges exist in leveraging the full potential that cloud computing promises. Despite what cloud computing promises, it is not secure by nature.
The security challenges related to cloud computing are worthy of close attention. In terms of security, cloud-based services must be managed and operated at equivalent levels to enterprise systems. Commercial enterprises often do not want to store their data in a cloud due to lack of trust and the risk of exposing their data in an untrusted environment. Cloud users typically have no control over the cloud storage servers used, and there is an inherent risk of data exposure to third parties in the cloud or to the cloud provider itself. The data must be properly encrypted both in motion and at rest.
In addition, companies and government agencies are often bound by law to host their applications and/or data within specific geographic boundaries. This calls for hybrid cloud environments that can seamlessly work together, where part of the application/data can be hosted in a public cloud, and other parts such as commercial sensitive data are hosted on premises. In this context, a key challenge is the provision of secure and trusted applications/data that can be operated in a hybrid cloud environment.
This special issue aims at compiling technologies for enhancing and provisioning security, privacy and trust in cloud computing environments based on QoS requirements.
Topics of interest include but are not limited to:
- Cloud security architecture and protocol
- Secured cloud management services
- Secured information sharing and data protection in the cloud
- QoS-based trust models and QoS monitoring mechanisms
- Cryptography and crypto-protocols for cloud computing systems
- Security and virtualisation
- Risk management in cloud computing environments
- Privacy protection in cloud platforms and operations
- Autonomic security in cloud computing
- Intra- and inter-cloud security issues and considerations
- Access control mechanisms
- Mechanisms to enforce privacy and trust
- Energy/cost/efficiency of security in clouds
- Trust models for cloud services
Submission due: 15 August, 2011
Acceptance notification: 15 October, 2011
Final submission: 15 November, 2011