posted by user: Fallujah9 || 818 views || tracked by 1 users: [display]

Book Chapter 2019 : Security Advancements in Cryptographic Cloud Computing Environments

FacebookTwitterLinkedInGoogle

Link: https://www.igi-global.com/publish/call-for-papers/call-details/3893
 
When N/A
Where USA
Submission Deadline Jul 8, 2019
Notification Due Oct 16, 2019
Categories    - cloud computing security   - cryptographic algorithms   - biometric authentication in   - cloud key management
 

Call For Papers

Cloud computing is a modern emerging trend in the distributed computing technology that is rapidly gaining popularity in the network communication field. Such network communication is an Internet-based computing, where shared resources, software, and information are provided with computers and devices on-demand. They guarantee a way to share distributed resources and services that belong to different organizations. The concept of “cloud computing” is not new, it is undisputable that they have proven a major commercial success over recent times. Cloud computing is the delivery of computing services by shared resources, software and information over the internet (public) or intranet (private). The virtual environment of cloud computing allows users to access computing device that exceed their own physical worlds. In order to enter this virtual environment, cloud users must transfer data throughout the open environment (cloud). However, the improvement of cloud computing is reinforced by the improvement of the security concerns like data security and privacy. Nowadays, data security and privacy in cloud computing have emerged as a significantly important research field that has attracted increasing attention from the industrial companies, academia, and scientific research centers. Consequently, several data security and integrity concerns have arisen, such as key management, access control, cryptographic process, remote integrity checks and proof of ownership in the cloud. Accordingly, various modern encryption algorithms have been developed

Related Resources

CyberS_DL 2022   Intersecting Privacy, Deep Learning, and Reinforcement Learning in Cybersecurity
CTE 2022   10th Workshop on Cloud Technologies in Education
ICFEC 2022   The 6th IEEE International Conference on Fog and Edge Computing
AIDTEV 2022   AI based Digital twin technology for Electric Vehicles
ASIP--Ei Compendex and Scopus 2022   2022 4th Asia Symposium on Image Processing (ASIP 2022)--EI Compendex, Scopus
ITCC--Ei Compendex and Scopus 2022   2022 4th International Conference on Information Technology and Computer Communications (ITCC 2022)--EI Compendex, Scopus
BIOTC--EI, Scopus 2022   2022 4th Blockchain and Internet of Things Conference (BIOTC 2022)--EI Compendex, Scopus
ICCIA--IEEE, Ei, Scopus 2022   IEEE--2022 7th International Conference on Computational Intelligence and Applications (ICCIA 2022)--EI Compendex, Scopus
ICHMI--ACM, Ei, Scopus 2022   ACM--2022 2nd International Conference on Human–Machine Interaction (ICHMI 2022)--EI Compendex, Scopus
IEEE SEAI--EI, Scopus 2022   2022 2nd IEEE International Conference on Software Engineering and Artificial Intelligence (SEAI 2022)--EI Compendex, Scopus