¡¡

The 3rd International Symposium on Privacy and Security in Cloud and Big Data (PriSec 2014)

3-5 December 2014, Sydney, Australia

 http://www.swinflow.org/confs/prisec2014

co-located with The 4th IEEE International Conference on Big Data and Cloud Computing (BdCloud2014)

Sponsored by IEEE TCSC Technical Area on Privacy and Security in Cloud and Big Data

 

Cloud Computing and Big Data are two emerging paradigms in the recent developments of information technology. Cloud Computing enables computing resources to be provided as IT services in a pay-as-you-go fashion with high efficiency and effectiveness. Big data is an emerging paradigm applied to datasets whose size is beyond the ability of commonly used software tools to capture, manage, and process the data within a tolerable elapsed time. With Variety/Volume/Velocity/Value/Veracity/, Big Data such as medical records need to be protected in an scalable and efficient way.

Information privacy and security is one of most concerned issues for Cloud Computing due to its open environment with very limited user-side control. It is also an important challenge for Big Data as estimated by IDC. In addition, Cloud Computing and Big Data are coming together in practice. As estimated by IDC, by 2020, about 40% data globally would be touched with Cloud Computing. Cloud Computing provides strong storage, computation and distributed capability in support of Big Data processing. As such, there is a strong demand to investigate information privacy and security challenges in both Cloud Computing and Big Data. This symposium aims at providing such forum for researchers, practitioners and developers from different background areas such as distributed computing, cloud computing, big data, database, data mining, information security and privacy protection areas to exchange the latest experience, research ideas and synergic research and development on fundamental issues and applications about security and privacy issues in cloud and big data environments. The symposium solicits high quality research results in all related areas.

This is the third instalment of the symposium, following the successful events of 2013 (Karlsruhe, Germany) and 2012 (Xiangtan, China).

Topics

The objective of this symposium is to invite authors to submit original manuscripts that demonstrate and explore current advances in all aspects of security and privacy in cloud computing environments. The  symposium solicits novel papers on a broad range of topics, including but not limited to:  

Track 1: Privacy and Security in Cloud

¡¤ Privacy modelling in cloud computing
¡¤ Privacy correlation between multiple services in cloud computing
¡¤ Trust based privacy protection in cloud computing
¡¤ Privacy categorisation in cloud computing
¡¤ Privacy models for outsourcing
¡¤ Privacy preserving data publishing on cloud
¡¤ User privacy, service providers privacy and cloud platform privacy
¡¤ Privacy requirements engineering on cloud
¡¤ Private information retrieval on cloud
¡¤ Privacy and security in personal health records on cloud
¡¤ Privacy mechanisms in cloud services
¡¤ Privacy aware scheduling in cloud
¡¤ Security models, levels and scenarios in cloud computing
¡¤ Secure identity management in clouds
¡¤ Secure data management in cloud computing
¡¤ Secure access to clouds
¡¤ Remote data integrity protection
¡¤ Securing distributed data storage in the cloud
¡¤ Data-centric security and data classification
¡¤ Cost and usability models related security issues in clouds
¡¤ Interaction security between usability models in cloud computing
¡¤ Secure Job deployment and scheduling on cloud
¡¤ Secure resource allocation and indexing
¡¤ User authentication and authorisation in cloud services
¡¤ Auditing in cloud computing
¡¤ Cloud threat models
¡¤ Multi-tenancy related security/privacy issues
¡¤ Security/privacy/trust issues in SaaS/PaaS/IaaS
¡¤ Secure virtual machine mechanisms in cloud computing
¡¤ Vulnerabilities in cloud infrastructure
¡¤ Vulnerabilities in MapReduce
¡¤ Fault tolerance, exception handling and reliability issues in cloud
¡¤ Application programming environment

Track 2: Privacy and Security in Big Data

¡¤ Secure quantum communications
¡¤ Privacy in Big Data applications and services
¡¤ Privacy in Big Data end-point input validation and filtering
¡¤ Privacy in Big Data integration and transformation
¡¤ Privacy in parallel and distributed computation
¡¤ Privacy in Big Data storage management
¡¤ Privacy in Big Data access control mechanisms
¡¤ Privacy in Big Data mining and analytics
¡¤ Privacy in Big Data sharing and visualization
¡¤ Big Data privacy policies and standards
¡¤ Security model and architecture for Big Data
¡¤ Data mining security for Big Data
¡¤ Software and system security for Big Data
¡¤ Cryptography in Big Data
¡¤ Visualizing large scale security data
¡¤ Threat detection using Big Data analytics
¡¤ Human computer interaction challenges for Big Data security
¡¤ Data protection, integrity standards and policies
¡¤ Security and legislative impacts for Big Data
¡¤ Managing user access for Big Data
¡¤ Scalability and auditing for Big Data

Submission Requirements

Submit your papers in PDF file at the PriSec2014 submission site: https://www.easychair.org/conferences/?conf=prisec2014. Papers should be limited up to 8 pages in IEEE format. Templates can be downloaded here for Word or LATEX. All papers will be peer reviewed by two or three PC members. Submitting a paper to the workshop means that if the paper is accepted, at least one author should register to BdCloud2014 and attend the conference to present the paper.

Publication of Papers

All accepted papers will appear in the proceedings published by IEEE Computer Society. Selected papers will be invited to special issues of BdCloud 2014 in Concurrency and Computation: Practice and Experience, Journal of Network and Computer Applications, Journal of Computer and System Sciences, and IEEE Transactions on Cloud Computing.

Important Dates

Deadline for Paper Submission:           September 5, 2014 (extended, firm)

Notification of Acceptance:                  September 25, 2014

Camera Ready Copies:                        October 15, 2014

General Chairs:

Chita R. Das, Pennsylvania State University, USA
Vijay Varadharajan, Macquarie University, Australia

Program Committee Chairs:

Deepak Puthal, University of Technology, Sydney, Australia
Chang Liu, University of Technology, Sydney, Australia
Rajiv Ranjan, CSIRO, Australia
Jinjun Chen, University of Technology, Sydney, Australia

Program Committee:

Cristina Alcaraz, University of Malaga, Spain

Shlomi Dolev, Ben-Gurion University, Israel

Yevgeniy Vahlis, University of Toronto Canada

Guenther Pernul, University of Regensburg, Germany 

Charles Morisset, Newcastle University, UK 

David Naccache, ENS, France

Dieter Gollmann, TU Hamburg-Harburg, Germany

Yang Xiang, Deakin University, Australia

Bibhudatta Sahoo, NIT Rourkela, India

Kartik Gopalan, SUNY ¨C Binghamton, USA

Joanna Kolodziej, Cracow University of Technology, Poland

Yves-Alexandre de Montjoye, MIT, USA

Henrik Johnsson, Blekinge Institute of Technology, Sweden 

Ching-Hsien Hsu, Chung Hua University, Taiwan 

Biswapratap Singh Sahoo, National Central University, Taiwan

Zeeshan Hameed, QMIC, Qatar

Roberto Di Pietr, Bell Labs, France

Rino Falcone, ISTC-CNR, Italy

Stefano Guarino, Universit¨¤ degli Studi Roma Tr, Italy

Abhinav Srivastava, AT&T Labs, USA

Siani Pearson, HP Labs, UK

Changhoon Lee, Seoul National University of Science and Technology, Korea

Nour Ali, University of Brighton, UK

Wei Wei, Xi'an University of Technology, China

Sherman S. M. Chow, Chinese University of Hong Kong

Stefano Paraboschi, Universit¨¤ degli Studi di Bergamo, Italy

Ramlan Mahmood, University Putra Malaysia