skip to main content
10.1145/3055259acmconferencesBook PagePublication PagessccConference Proceedingsconference-collections
SCC '17: Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing
ACM2017 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ASIA CCS '17: ACM Asia Conference on Computer and Communications Security Abu Dhabi United Arab Emirates 2 April 2017
ISBN:
978-1-4503-4970-3
Published:
02 April 2017
Sponsors:

Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the Fifth International Workshop on Security in Cloud Computing (SCC'17). This year's workshop continues its tradition of being the premier forum for the presentation of research results and experience reports on leading edge issues and challenges of cloud computing security. The mission of the workshop is to share novel solutions that fulfill the needs of secure and privacy-preserving cloud applications and services, and identify new directions for future research and development. SCC'17 gives researchers and practitioners a unique opportunity to share their perspectives with others interested in the topics of cloud security and privacy such as secure cloud architecture, cloud storage security, cloud cryptography, cloud access control and key management, identification and privacy in cloud, secure computation outsourcing, trusted computing, and many others.

The call for papers attracted 27 submissions from total 22 countries and regions. Those submissions were reviewed by 63 program committee members from 16 countries and regions. The program committee reviewed and accepted 11.

We also encourage attendees to attend the keynote talk. The valuable and insightful talk will guide us to a better understanding on the promise of big data analytics in cyber security:

  • Cloud Data Analytics for Security: Applications, Challenges, and Opportunities, Dr. Danfeng (Daphne) Yao (who is currently an associate professor of computer science at Virginia Tech)

Skip Table Of Content Section
SESSION: Keynote Address
invited-talk
Cloud Data Analytics for Security: Applications, Challenges, and Opportunities

In this keynote, I describe the emerging need of cloud data analytics for security and call for the security community to devote to closing the gap between research innovation and practical deployment. Cloud data analytics refer to cloud platforms that ...

SESSION: PAPER SESSION 1
research-article
To Cheat or Not to Cheat: A Game-Theoretic Analysis of Outsourced Computation Verification

In the cloud computing era, in order to avoid computational burdens, many organizations tend to outsource their computations to third-party cloud servers. In order to protect service quality, the integrity of computation results need to be guaranteed. ...

research-article
Reconciling Security and Functional Requirements in Multi-tenant Clouds

End-to-end security in the cloud has gained even more importance after the outbreak of data breaches and massive surveillance programs around the globe last year. While the community features a number of cloud-based security mechanisms, existing ...

research-article
Cloud Storage File Recoverability

Data loss is perceived as one of the major threats for cloud storage. Consequently, the security community developed several challenge-response protocols that allow a user to remotely verify whether an outsourced file is still intact. However, two ...

research-article
A Secure Algorithm for Outsourcing Matrix Multiplication Computation in the Cloud

Matrix multiplication computation (MMC) is a common scientific and engineering computational task. But such computation involves enormous computing resources for large matrices, which is burdensome for the resource-limited clients. Cloud computing ...

SESSION: PAPER SESSION 2
research-article
Efficient Key-Rotatable and Security-Updatable Homomorphic Encryption

In this paper we presents the notion of key-rotatable and security-updatable homomorphic encryption (KR-SU-HE) scheme, which is a class of public-key homomorphic encryption in which the keys and the security of any ciphertext can be rotated and updated ...

research-article
Security of Okamoto Identification Scheme: a Defense against Ephemeral Key Leakage and Setup

We consider the situation, where an adversary may learn the ephemeral values used by the prover within an identification protocol, aiming to get the secret keys of the user, or just to impersonate the prover subsequently. Unfortunately, most classical ...

research-article
Enabling Privacy-assured Mobile Advertisement Targeting and Dissemination

With the fast growing market of mobile applications, mobile advertising attracts wide attention from both business and research communities in recent years. Targeted mobile advertising aims to analyze user profile and explore user interests so as to ...

research-article
Privacy-preserving Hybrid Recommender System

Privacy issues in recommender systems have attracted the attention of researchers for many years. So far, a number of solutions have been proposed. Unfortunately, most of them are far from practical as they either downgrade the utility or are very ...

SESSION: PAPER SESSION 3
research-article
Efficient Implementation of a Proxy-based Protocol for Data Sharing on the Cloud

In this paper, we provide a secure and efficient outsourcing scheme for multi-owner data sharing on the cloud. More in detail we consider the scenario where multiple data owners outsource their data to an untrusted cloud provider, and allow authorized ...

research-article
Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM

It is getting popular for users to outsource their data to a cloud system as well as leverage the high-speed computing power of this third-party platform to process the data. For the sake of data privacy, outsourced data from different users is usually ...

research-article
A Privacy-Preserving and Vessel Authentication Scheme Using Automatic Identification System

Automatic Identification System (AIS) has been widely used in smart vessel transportation aiding collision avoidance, search, rescue and traffic monitoring nowadays. AIS transceiver adopts a unique Maritime Mobile Service Identity (MMSI) to identify a ...

Contributors
  • City University of Hong Kong
  • The University of Texas at Dallas

Recommendations

Acceptance Rates

SCC '17 Paper Acceptance Rate11of27submissions,41%Overall Acceptance Rate64of159submissions,40%
YearSubmittedAcceptedRate
SCC '19221255%
SCC '1816638%
SCC '1817635%
SCC '17271141%
SCC '16311239%
SCC '1525832%
SCC '1421943%
Overall1596440%