posted by organizer: vkumar || 10275 views || tracked by 10 users: [display]

DataSecCloudBook 2017 : Call for Book Chapters: Data Security in Cloud Computing - 2017


When Mar 13, 2016 - Mar 13, 2016
Where IET
Abstract Registration Due Mar 13, 2016
Submission Deadline Jul 31, 2016
Notification Due Sep 19, 2016
Categories    security   cloud computing   cyber security   information security

Call For Papers

** Data Security in Cloud Computing **

Call for Book Chapter Proposals

Cloud computing is transforming the way we view and perform computing. Many organizations have already embraced this paradigm of a centralized cloud, due to its benefits of economy, reliability, scalability and guaranteed quality of service among others. These benefits however are traded with the control of data, since data is stored, computed upon and accessed on the cloud, away from the premises of the data owner and the data user. This loss of control of data gives rise to a number of challenging data security issues, ranging from accountability, to data provenance, to identity and risk management among others. These issues have the capability to determine how effective and widespread cloud computing of the next generation is going to be and their solutions can push us into the right direction.
The book intends to provide the reader with a coverage of a wide range of issues on data security in cloud computing. It will cover issues directly related to various aspects of data security in cloud computing, along with a selection of topics on emerging technologies. The book will be published by Institute of Engineering and Technology (IET).

Topics of interest include but are not limited to:
Section 1: Data-at-Rest
1. Secure data sharing in cloud
2. Remote data integrity check for auditing in cloud
3. Data leakage in cloud
4. Data loss/resilience in cloud
5. Access control of encrypted data in cloud

Section 2: Data-in-Transit
6. Secure information flow in and out of clouds
7. Emerging cloud encryption technologies

Section 3: Data-in-Processing
8. Accountability of data in cloud
9. Secure and privacy preserving computation in cloud
10. Secure virtual environments

Section 4: Data Provenance
11. Provenance of data in cloud
12. Security attribution in and across clouds
13. Identity management in federated clouds

Section 5: Governance, Risk, Compliance
14. Risk management in clouds
15. Cloud data governance
16. Data privacy legislation and integration with technologies

Section 6: Data Security Challenges in Emerging Technologies
17. Bring your own device
18. Internet of Things
19. Cyber-physical systems
20. Vehicular ad hoc networks


Chapter Proposals
Prospective authors must submit their chapter proposals in pdf format to with the following information:
1. Chapter Title
2. Author Names, Affiliations
3. Author Emails
4. Book Section/ Topic Addressed (If this is not in the list above, please suggest)
5. Chapter Extended Abstract (300 words maximum)
6. Chapter Sections/ Chapter Outline (in bullet-point form)
7. Author Biography and Relevant Experience (100 words maximum)
While this is a call for proposals, completed chapter manuscripts are also welcome.
Submission of Manuscripts for Approved Proposals

After their proposals are approved, prospective authors will be invited to submit their manuscripts electronically. Submitted manuscripts will undergo a single-blind peer-review process. To ensure the quality of accepted manuscripts, each manuscript is typically reviewed by at least two independent expert reviewers. Only accepted peer-reviewed manuscripts will be published.

Submitted manuscripts should conform to the standard guidelines of the IET book chapter format, which can be downloaded from here. Manuscripts that do not follow the formatting rules will be ignored. Manuscripts should also be written in a way that it is teaching a topic, and not just pure academic reports of research work or proposals. Vendor neutrality must be observed in the manuscripts. Survey papers of the above topics are welcome.

* Chapter proposal due: 13 March 2016
* Book chapter submission: 31 July 2016
* Author's notification: 19 September 2016
* Chapter Camera ready version: December 2016
* Estimated publication: September 2017


Dr. Vimal Kumar
University of Waikato, New Zealand

Dr Ryan Ko
University of Waikato, New Zealand

Dr. Sivadon Chaisiri
University of Waikato, New Zealand

Related Resources

CloudCom 2018   The 10th IEEE International Conference on Cloud Computing Technology and Science
ACM CCS 2018   25th ACM Conference on Computer and Communications Security (ACM CCS)
DISP 2018   Special Issue on Data Intelligence in Security and Privacy, Journal of Information Security and Applications
ECTIJ 2018   Economics, Commerce and Trade Management: An International Journal
UCC 2018   11th IEEE/ACM International Conference on Utility and Cloud Computing
SciSec 2018   The 1st International Conference on Science of Cyber Security
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
CASCCIT 2018   On Context-Aware Security in Cloud Computing and Internet of Things 2018
ICNS--Ei and Scopus 2018   2018 The 3rd International Conference on Network Security (ICNS 2018)--Ei Compendex and Scopus
FSTJ 2018   Food Science and Technology: An International Journal (FSTJ)