30 September 2012

Call for papers: Information Assurance and System Security in Cloud Computing

A special issue of International Journal of Cloud Computing

Cloud computing has been attracting interest from both industry and academia since 2007, and has been recognised as the new paradigm of the IT industry. Cloud computing provides users with flexible services in a transparent manner. Services are allocated in a “cloud”, which is a collection of devices and resources connected through the Internet. Before this paradigm can be widely accepted, the security, privacy and reliability provided by the services in the cloud must be well established.

This special issue seeks original unpublished papers focusing on various aspects of security issues in cloud computing environments. Aiming at presenting and discussing latest developments, this special issue welcomes papers addressing theoretical analysis, emerging applications, novel system architecture construction and design, experimental studies and social impacts of cloud computing. Both review/survey papers and technical papers are encouraged.

Suitable topics include but are not limited to:
  • Emerging threats to cloud-based services
  • Security models for new services
  • Security in cloud-aware web services
  • Information hiding/encryption in cloud computing
  • Copyright protection in the cloud
  • Securing distributed data storage in the cloud
  • Privacy and security in cloud computing
  • Forensics in cloud environments
  • Robust network architecture
  • Cloud infrastructure security
  • Intrusion detection/prevention
  • Denial-of-Service (DoS) attacks and defences
  • Robust job scheduling
  • Secure resource allocation and indexing
  • Secure payment for cloud-aware services
  • User authentication in cloud-aware services
  • Non-repudiation solutions in the cloud
  • Security for emerging cloud programming models
  • Performance evaluation for security solutions
  • Testbed/simulators for cloud security research
  • Security hardware, i.e. hardware for encryption, etc.
  • Detection and prevention of hardware trojans
Important Dates
First submission: 15 February, 2013 (extended)
Review feedback: 30 March, 2013
Revised version submission: 30 May, 2013
Acceptance notification: 30 June, 2013
Final paper submission: 30 July, 2013

No comments: