posted by user: lamri || 11935 views || tracked by 6 users: [display]

MEDES 2016 : Special Track: Secure Cloud Computing

FacebookTwitterLinkedInGoogle

Link: http://medes.sigappfr.org/16/2-uncategorised/38-special-tracks-3
 
When Nov 1, 2016 - Nov 4, 2016
Where Biarritz, France
Submission Deadline Aug 25, 2016
Notification Due Sep 15, 2016
Final Version Due Sep 25, 2016
Categories    cloud computing   security   watermarking   risk management
 

Call For Papers

Description and Objectives

The digital revolution and the migration to cloud computing technology seems inevitable, information has become one of the main assets of the institution, provided to should be mastered, that is to say, collected, validated, stored , secured, easily accessible for only the concerned persons, processed and aggregated for informed decision-making. Protecting this information is the main institutional concerns. It is an issue in itself, because of the structured and unstructured data growing, and strengthening regulatory constraints. The specific context of the cloud; where data is hosted outside the institution, exacerbated this concern. Moreover, the institutions experience feedback shows that the existing current cloud do not provide a satisfactory level of security to protect the confidential or personal data.

For this purpose, migrating to cloud computing require a rigorous approach to risk management of technical, contractual and legal security. Indeed, the institution intends to use a cloud service provider should ensure that it is able to implement appropriate security measures to be safe against risks specific to the cloud, related to traditional computer processing and those particularly relevant to the protection of personal data. We can cite the main risks identified in this regard as: the technological dependence regarding the cloud computing supplier, for example, the risk of losing data when migrating to another provider or when implementing an internal solution; a gap in data isolation, that is to say, the risk that the data hosted on a system (virtualized) are no longer isolated and can be modified or made accessible to unauthorized third parties, following a failure or poor management of the provider; the non-compliance of the conservation rules and destruction of data issued by the institution as an ineffective destruction or unsecure data; the access rights management issues; etc.

This track will focus on proposing new solutions and alternatives to protect and secure data through a public cloud computing. The objective is to target researchers interested in all aspects of protection techniques to ensure high information security and privacy. We are also interested in applications and case studies of data security in different practical domains. This track will be of interest to researchers and leading edge practitioners in academia, industry, and government agencies concerned with computer and network security.

Topics

Topics of interest may include, but are in no way limited, to:

Copyright and ownership
The APT parasite
Integrity, confidentiality and authenticity
Lightweight security techniques
Vulnerability analysis and assessment
Attacks tracking
Data hiding, tamper detection and recovery techniques
Security of e- healthcare systems and applications
Steganography, watermarking, and forensic techniques in multimedia content processing
Encryption and Homomorphic approaches
Data breaches
Permanent data loss
Intelligent secure algorithms
Privacy and access control
Evidentiary aspects of digital forensics
DoS attacks
Hacked interfaces and APIs
Exploited system vulnerabilities
Shared technology, shared dangers
Malicious insiders
Cloud service abuses
Compromised credentials and broken authentication
Account hijacking
Inadequate diligence
Paper Submission

The submitted paper should be at most 8 ACM single-space printed pages. Please use the following templates to generate your PDF: MS Word and Latex.

Papers that fail to comply with length limit will be rejected. Submissions will be peer-reviewed by at least 3 peer reviewers. After the preliminary notification date, authors rebut by evidence and arguments all reviewer inquiries and their comments. Based on the rebuttal feedback, reviewers notify authors with the final decision. Selection criteria will include: relevance, significance, impact, originality, technical soundness, and quality of presentation. Preference will be given to submissions that take strong or challenging positions on important emergent topics related to Digital Ecosystems. At least one author should attend the conference to present the paper.

The conference Proceedings will be published by ACM and indexed by the ACM Digital Library and DBLP.



Paper submission is available online via: EasyChair for MEDES 2016 website.

Important Dates

- Paper Submission: August 25, 2016
- Notification by a shepherd: September 15, 2016
- Camera Ready: September 25th, 2016

Committees

Track Chair

Lamri Laouamer, Qassim University, KSA (laoamr@qu.edu.sa)
Adel Alti, University of Setif II, Algeria

Related Resources

ICBICC 2024   2024 International Conference on Big Data, IoT, and Cloud Computing (ICBICC 2024)
IEEE COINS 2024   IEEE COINS 2024 - London, UK - July 29-31 - Hybrid (In-Person & Virtual)
UCC 2024   The IEEE/ACM International Conference on Utility and Cloud Computing
CTISC 2024   2024 6th International Conference on Advances in Computer Technology, Information Science and Communications (CTISC 2024) -EI Compendex
ADMIT 2024   2024 3rd International Conference on Algorithms, Data Mining, and Information Technology (ADMIT 2024)
IOTCB 2024   3rd International Conference on IOT, Cloud and Big Data
PCDS 2024   The 1st International Symposium on Parallel Computing and Distributed Systems
CSW 2024   2024 3rd International Conference on Cyber Security
AICCC 2024   ACM--2024 7th Artificial Intelligence and Cloud Computing Conference (AICCC 2024)
ACM AICCC 2024   ACM--2024 7th Artificial Intelligence and Cloud Computing Conference (AICCC 2024)