posted by organizer: vkumar || 13790 views || tracked by 11 users: [display]

DataSecCloudBook 2017 : Call for Book Chapters: Data Security in Cloud Computing - 2017

FacebookTwitterLinkedInGoogle

Link: https://crow.org.nz/CFCP-DataSecCloudBook.pdf
 
When Mar 13, 2016 - Mar 13, 2016
Where IET
Abstract Registration Due Mar 13, 2016
Submission Deadline Jul 31, 2016
Notification Due Sep 19, 2016
Categories    security   cloud computing   cyber security   information security
 

Call For Papers

** Data Security in Cloud Computing **

Call for Book Chapter Proposals
========================================

Cloud computing is transforming the way we view and perform computing. Many organizations have already embraced this paradigm of a centralized cloud, due to its benefits of economy, reliability, scalability and guaranteed quality of service among others. These benefits however are traded with the control of data, since data is stored, computed upon and accessed on the cloud, away from the premises of the data owner and the data user. This loss of control of data gives rise to a number of challenging data security issues, ranging from accountability, to data provenance, to identity and risk management among others. These issues have the capability to determine how effective and widespread cloud computing of the next generation is going to be and their solutions can push us into the right direction.
The book intends to provide the reader with a coverage of a wide range of issues on data security in cloud computing. It will cover issues directly related to various aspects of data security in cloud computing, along with a selection of topics on emerging technologies. The book will be published by Institute of Engineering and Technology (IET).

Topics of interest include but are not limited to:
Section 1: Data-at-Rest
1. Secure data sharing in cloud
2. Remote data integrity check for auditing in cloud
3. Data leakage in cloud
4. Data loss/resilience in cloud
5. Access control of encrypted data in cloud

Section 2: Data-in-Transit
6. Secure information flow in and out of clouds
7. Emerging cloud encryption technologies

Section 3: Data-in-Processing
8. Accountability of data in cloud
9. Secure and privacy preserving computation in cloud
10. Secure virtual environments

Section 4: Data Provenance
11. Provenance of data in cloud
12. Security attribution in and across clouds
13. Identity management in federated clouds



Section 5: Governance, Risk, Compliance
14. Risk management in clouds
15. Cloud data governance
16. Data privacy legislation and integration with technologies

Section 6: Data Security Challenges in Emerging Technologies
17. Bring your own device
18. Internet of Things
19. Cyber-physical systems
20. Vehicular ad hoc networks


BOOK CHAPTER SUBMISSION AND AUTHOR INFORMATION

Chapter Proposals
-------------------
Prospective authors must submit their chapter proposals in pdf format to https://easychair.org/conferences/?conf=dataseccloudbook2016 with the following information:
1. Chapter Title
2. Author Names, Affiliations
3. Author Emails
4. Book Section/ Topic Addressed (If this is not in the list above, please suggest)
5. Chapter Extended Abstract (300 words maximum)
6. Chapter Sections/ Chapter Outline (in bullet-point form)
7. Author Biography and Relevant Experience (100 words maximum)
While this is a call for proposals, completed chapter manuscripts are also welcome.
Submission of Manuscripts for Approved Proposals

After their proposals are approved, prospective authors will be invited to submit their manuscripts electronically. Submitted manuscripts will undergo a single-blind peer-review process. To ensure the quality of accepted manuscripts, each manuscript is typically reviewed by at least two independent expert reviewers. Only accepted peer-reviewed manuscripts will be published.

Submitted manuscripts should conform to the standard guidelines of the IET book chapter format, which can be downloaded from here. Manuscripts that do not follow the formatting rules will be ignored. Manuscripts should also be written in a way that it is teaching a topic, and not just pure academic reports of research work or proposals. Vendor neutrality must be observed in the manuscripts. Survey papers of the above topics are welcome.


IMPORTANT DATES
* Chapter proposal due: 13 March 2016
* Book chapter submission: 31 July 2016
* Author's notification: 19 September 2016
* Chapter Camera ready version: December 2016
* Estimated publication: September 2017


BOOK EDITORS

Dr. Vimal Kumar
University of Waikato, New Zealand
vkumar@waikato.ac.nz
http://www.cms.waikato.ac.nz/people/vkumar

Dr Ryan Ko
University of Waikato, New Zealand
ryan@waikato.ac.nz
http://ryanko.org

Dr. Sivadon Chaisiri
University of Waikato, New Zealand
chaisiri@waikato.ac.nz
http://www.cms.waikato.ac.nz/people/chaisiri

Related Resources

IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
BDE 2025   2025 7th International Conference on Big Data Engineering (BDE 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CETA--EI 2025   2025 4th International Conference on Computer Engineering, Technologies and Applications (CETA 2025)
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
The Mississippi River: A Cultural Artery 2025   Call for Papers: The Mississippi: Soundings on America’s Arterial River
MLSC 2025   6th International Conference on Machine Learning and Soft Computing
Book 2025   Call for book Chapters Mitigating the Risks of AI Deepfakes