It is our great pleasure to welcome you to the Fifth International Workshop on Security in Cloud Computing (SCC'17). This year's workshop continues its tradition of being the premier forum for the presentation of research results and experience reports on leading edge issues and challenges of cloud computing security. The mission of the workshop is to share novel solutions that fulfill the needs of secure and privacy-preserving cloud applications and services, and identify new directions for future research and development. SCC'17 gives researchers and practitioners a unique opportunity to share their perspectives with others interested in the topics of cloud security and privacy such as secure cloud architecture, cloud storage security, cloud cryptography, cloud access control and key management, identification and privacy in cloud, secure computation outsourcing, trusted computing, and many others.
The call for papers attracted 27 submissions from total 22 countries and regions. Those submissions were reviewed by 63 program committee members from 16 countries and regions. The program committee reviewed and accepted 11.
We also encourage attendees to attend the keynote talk. The valuable and insightful talk will guide us to a better understanding on the promise of big data analytics in cyber security:
Cloud Data Analytics for Security: Applications, Challenges, and Opportunities, Dr. Danfeng (Daphne) Yao (who is currently an associate professor of computer science at Virginia Tech)
Proceeding Downloads
Cloud Data Analytics for Security: Applications, Challenges, and Opportunities
In this keynote, I describe the emerging need of cloud data analytics for security and call for the security community to devote to closing the gap between research innovation and practical deployment. Cloud data analytics refer to cloud platforms that ...
To Cheat or Not to Cheat: A Game-Theoretic Analysis of Outsourced Computation Verification
In the cloud computing era, in order to avoid computational burdens, many organizations tend to outsource their computations to third-party cloud servers. In order to protect service quality, the integrity of computation results need to be guaranteed. ...
Reconciling Security and Functional Requirements in Multi-tenant Clouds
End-to-end security in the cloud has gained even more importance after the outbreak of data breaches and massive surveillance programs around the globe last year. While the community features a number of cloud-based security mechanisms, existing ...
Cloud Storage File Recoverability
Data loss is perceived as one of the major threats for cloud storage. Consequently, the security community developed several challenge-response protocols that allow a user to remotely verify whether an outsourced file is still intact. However, two ...
A Secure Algorithm for Outsourcing Matrix Multiplication Computation in the Cloud
Matrix multiplication computation (MMC) is a common scientific and engineering computational task. But such computation involves enormous computing resources for large matrices, which is burdensome for the resource-limited clients. Cloud computing ...
Efficient Key-Rotatable and Security-Updatable Homomorphic Encryption
In this paper we presents the notion of key-rotatable and security-updatable homomorphic encryption (KR-SU-HE) scheme, which is a class of public-key homomorphic encryption in which the keys and the security of any ciphertext can be rotated and updated ...
Security of Okamoto Identification Scheme: a Defense against Ephemeral Key Leakage and Setup
We consider the situation, where an adversary may learn the ephemeral values used by the prover within an identification protocol, aiming to get the secret keys of the user, or just to impersonate the prover subsequently. Unfortunately, most classical ...
Enabling Privacy-assured Mobile Advertisement Targeting and Dissemination
With the fast growing market of mobile applications, mobile advertising attracts wide attention from both business and research communities in recent years. Targeted mobile advertising aims to analyze user profile and explore user interests so as to ...
Privacy-preserving Hybrid Recommender System
Privacy issues in recommender systems have attracted the attention of researchers for many years. So far, a number of solutions have been proposed. Unfortunately, most of them are far from practical as they either downgrade the utility or are very ...
Efficient Implementation of a Proxy-based Protocol for Data Sharing on the Cloud
In this paper, we provide a secure and efficient outsourcing scheme for multi-owner data sharing on the cloud. More in detail we consider the scenario where multiple data owners outsource their data to an untrusted cloud provider, and allow authorized ...
Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM
It is getting popular for users to outsource their data to a cloud system as well as leverage the high-speed computing power of this third-party platform to process the data. For the sake of data privacy, outsourced data from different users is usually ...
A Privacy-Preserving and Vessel Authentication Scheme Using Automatic Identification System
Automatic Identification System (AIS) has been widely used in smart vessel transportation aiding collision avoidance, search, rescue and traffic monitoring nowadays. AIS transceiver adopts a unique Maritime Mobile Service Identity (MMSI) to identify a ...
Index Terms
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing




