posted by user: nardyen || 11167 views || tracked by 15 users: [display]

IS-CDSCC 2016 : Information Sciences: Special Issue On Cryptography and Data Security in Cloud Computing

FacebookTwitterLinkedInGoogle

Link: http://www.journals.elsevier.com/information-sciences/call-for-papers/special-issue-on-cryptography-and-data-security-in-cloud-com/
 
When N/A
Where N/A
Submission Deadline Jan 1, 2016
Notification Due Apr 1, 2016
Final Version Due Jun 1, 2016
Categories    security   cloud computing   cryptography
 

Call For Papers

Cloud computing offers a new way of services by re-arranging various resources and providing them to users based on their demands. It also plays an important role in the next generation mobile networks and services (5G) and Cyber-Physical and Social Computing (CPSC). Storing data in the cloud greatly reduces storage burden of users and brings them access convenience, thus it has become one of the most important cloud services.

However, cloud data security, privacy and trust become a crucial issue that impacts the success of cloud computing. Cloud data storage increases the risk of data leakage and unauthorized access. Cloud data management cannot be fully trusted by data owners. Cloud data process and computation could disclose the privacy of data owners or related entities to unauthorized parities. For overcoming the above problems, cryptography has been widely applied to ensure data security, privacy and trust in cloud computing, but existing solutions are still imperfect. Computation efficiency, key management, verifiable data computing are key challenges. Cryptography in cloud computing promises many novel solutions but at the same time, many challenges are yet to be overcome.

This special issue aims to bring together researchers and practitioners to discuss various aspects of cryptography and data security in cloud computing, explore key theories, investigate technology enablers, develop significant applications and innovate new solutions for overcoming major challenges in this exciting research area.

Topics of interest include, but are not limited to:

Cryptography for cloud data trust management
Cryptography for cloud data access control
Cryptography for privacy preserving data analytics and mining
Cryptography for auditing on cloud data management
Cryptography for verifiable computing
Cryptography for cloud data authentication and authorization
Cryptography for secure cloud data storage and deduplication
Cryptography for secure and privacy enhanced cloud data search and query
Cryptography for data security and privacy in CPSC
Cryptography for secure IoT data process at cloud
Instructions for Manuscripts
Papers will be evaluated based on their originality, presentation, relevance and contributions, as well as their suitability to the special issue. The submitted papers must be written in excellent English and describe original research that has not been published nor currently under review by other venues. Previously published conference papers should be clearly identified by the authors at the submission stage and an explanation should be provided about how such papers have been extended to be considered for this special issue. Extended conference contributions must have at least 50% difference from the original works (the authors must indicate the conference name and make a reference to the base conference paper). Guest editors will make an initial determination on the suitability and scope of all submissions. Papers that either lack originality, clarity in presentation or fall outside the scope of the special issue will not be sent for review and the authors will be promptly informed in such cases.

The submitted papers will be reviewed by at least three independent reviewers. Final decisions on accepted papers will be based on their qualities and their relevance to the theme of this special issue and should be approved by the journal editors. Manuscripts must be prepared for publication according to the journal’s Author Guidelines available at: http://ees.elsevier.com/ins/. Submissions must conform to the layout, format and page limit in the guidelines. The authors must select “SI: Cloud-Data-Security” when they reach the “Article Type” step in the submission process.

Important Dates
Paper submission due: January 1st, 2016
Notification of decision: April 1st, 2016
Revision due: June 1st, 2016
Acceptance notification: August 1st, 2016
Approximate publication date: Late 2016, subject to journal publication schedules

Guest Editors
Zheng Yan (corresponding editor)
Xidian University, China & Aalto University, Finland
Email: zhengyan.pz@gmail.com

Robert H. Deng
Singapore Management University, Singapore
Email: robertdeng@smu.edu.sg

Vijay Varadharajan
Macquarie University, Australia
Email: vijay.varadharajan@mq.edu.au

Related Resources

BDE 2025   2025 7th International Conference on Big Data Engineering (BDE 2025)
IEEE-Ei/Scopus-ACEPE 2024   2024 IEEE Asia Conference on Advances in Electrical and Power Engineering (ACEPE 2024) -Ei Compendex
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
ICIME--EI 2025   2025 13th International Conference on Information Management and Engineering (ICIME 2025)
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus