Ieee Research Papers On Cloud Computing 2013 Corvette

Aims and Scope

Cloud computing reflects the latest trends in business to deliver software and services over the Internet. Gartner predicts that the bulk of new IT spending by 2016 will be for cloud computing platforms and applications with nearly half of large enterprises having cloud deployments by the end of 2017. Worldwide spending on public IT cloud services is expected to be more than $107 billion in 2017, according to a forecast from International Data Corporation (IDC) in 2013. Over the 2013-2017 forecast period, public IT cloud services are estimated to have a compound annual growth rate (CAGR) of 23.5%, five times that of the IT industry as a whole.

However, practical adoption of cloud technologies may be greatly impeded if security and privacy issues are not adequately addressed. As the cloud is an open platform, it can be subjected to malicious attacks from both insiders and outsiders; the need to protect the security and privacy of the data in the cloud becomes a critical issue. Although recent advances in cryptography, such as fully homomorphic encryption and secure multiparty computation, are promising, more work is still needed to transform theoretical techniques into practical solutions that can be efficiently implemented in the cloud.

This special issue is intended to focus on practical aspects of security and privacy in cloud computing. Original and unpublished contributions on novel attacks, defences and security applications in cloud computing are solicited. Research works that are motivated by tackling real-world security problems in the cloud are especially encouraged. Theoretical works that have clear intention for practical applications in the cloud are also invited.

Topics of Interest

Areas of interest for the special issue include, but are not limited to:  

  • Access control mechanisms for clouds
  • Security architectures for cloud computing
  • Security protocols for cloud computing
  • Privacy-preserving data mining for clouds
  • Identity management for cloud services
  • Information sharing and data protection in the cloud
  • Cryptographic protocols against internal attacks in clouds
  • Risk management in cloud computing environments
  • Privacy protection in cloud platforms
  • Privacy policy framework for clouds 
  • Mechanisms to enforce privacy and trust
  • Energy/cost/efficiency of security in clouds
  • Trust models for cloud services

Important Dates

Paper submission due: May 1, 2015
First-round acceptance notification: Aug 1, 2015
Revision: Sep 1, 2015
Final decision: Nov 15, 2015
Submission of final paper: Dec 1, 2015
Publication date: February, 2016

Submission Guideline

Paper submissions for the special issue should follow the submission format and guidelines for regular Elsevier Journal of Information Security and Applications (JISA) papers. Author guidelines can be found here. All the papers will be peer-reviewed following the JISA reviewing procedures. Guest editors will make an initial determination of the suitability and scope of all submissions. Papers that either lack originality, clarity in presentation or fall outside the scope of the special issue will not be sent for review and the authors will be promptly informed in such cases.

Guest Editors

Feng Hao, Newcastle University, UK (

Xun Yi, RMIT University, Australia (

Elisa Bertino, Purdue University, USA (

Short Biographies of Guest Editors

Dr Feng Hao is a reader in security engineering at the School of Computing Science, Newcastle University, UK. He received his PhD in Computer Security from the University of Cambridge in 2007 and since then spent several years working in security industry until 2010 when he joined Newcastle University as a faculty member. His research interests include biometrics, applied cryptography and fuzzy database search. Together with colleagues, he invented several cryptographic protocols, some of which have been used in practical applications.  In 2012, he received a European Research Council (ERC) Starting Grant (2013-2018) to investigate the next-generation electronic voting for future elections. Currently, he is serving in the editorial board for the Journal of Information Security and Application and the IEEE Security & Privacy magazine.

Dr. Xun Yi is a professor with the School of Computer Science and Information Technology, RMIT University, Australia. His research interests include database security, computer and network security, mobile and wireless communication security, private information retrieval, privacy-preserving data mining, secure electronic commerce and applied cryptography. He has published more than 150 research papers in international journals, such as IEEE Trans. Knowledge and Data Engineering, IEEE Trans. Wireless Communication, IEEE Trans. Dependable and Secure Computing, IEEE Trans. Circuit and Systems, IEEE Trans. Vehicular Technologies, IEEE Communication Letters, IEE Electronic Letters, and conference proceedings. He has led several ARC projects. Currently, he serves as an Associate Editor for IEEE Transactions on Dependable and Secure Computing.

Dr Elisa Bertino is professor of computer science at Purdue University, and serves as Director of Purdue Cyber Center and Research Director of the Center for Information and Research in Information Assurance and Security (CERIAS). She is also an adjunct professor of Computer Science & Info tech at RMIT. Prior to joining Purdue in 2004, she was a professor and department head at the Department of Computer Science and Communication of the University of Milan. She has been a visiting researcher at the IBM Research Laboratory (now Almaden) in San Jose, at the Microelectronics and Computer Technology Corporation, at Rutgers University, at Telcordia Technologies. Her recent research focuses on database security, digital identity management, policy systems, and security for web services. She is a Fellow of ACM and of IEEE. She received the IEEE Computer Society 2002 Technical Achievement Award and the IEEE Computer Society 2005 Kanai Award. She is currently serving as EiC of IEEE Transactions on Dependable and Secure Computing.

Сьюзан постаралась сохранить спокойствие. - Сегодня суббота, Грег. Могу задать тебе точно такой же вопрос.

0 thoughts on “Ieee Research Papers On Cloud Computing 2013 Corvette

Leave a Reply

Your email address will not be published. Required fields are marked *