Calls for papers

 

International Journal of Cloud Computing
International Journal of Cloud Computing

 

Special Issue on: "Information Assurance and System Security in Cloud Computing"


Guest Editors:
Dr. Yu Chen and Dr. Douglas Summerville, Binghamton University, USA
Dr. Wei-Shinn Ku, Auburn University, USA
Dr. Kai Hwang, University of Southern California, USA


Cloud computing has been attracting interest from both industry and academia since 2007, and has been recognised as the new paradigm of the IT industry. Cloud computing provides users with flexible services in a transparent manner. Services are allocated in a “cloud”, which is a collection of devices and resources connected through the Internet. Before this paradigm can be widely accepted, the security, privacy and reliability provided by the services in the cloud must be well established.

This special issue seeks original unpublished papers focusing on various aspects of security issues in cloud computing environments. Aiming at presenting and discussing latest developments, this special issue welcomes papers addressing theoretical analysis, emerging applications, novel system architecture construction and design, experimental studies and social impacts of cloud computing. Both review/survey papers and technical papers are encouraged.

Subject Coverage
Suitable topics include but are not limited to:

  • Emerging threats to cloud-based services
  • Security models for new services
  • Security in cloud-aware web services
  • Information hiding/encryption in cloud computing
  • Copyright protection in the cloud
  • Securing distributed data storage in the cloud
  • Privacy and security in cloud computing
  • Forensics in cloud environments
  • Robust network architecture
  • Cloud infrastructure security
  • Intrusion detection/prevention
  • Denial-of-Service (DoS) attacks and defences
  • Robust job scheduling
  • Secure resource allocation and indexing
  • Secure payment for cloud-aware services
  • User authentication in cloud-aware services
  • Non-repudiation solutions in the cloud
  • Security for emerging cloud programming models
  • Performance evaluation for security solutions
  • Testbed/simulators for cloud security research
  • Security hardware, i.e. hardware for encryption, etc.
  • Detection and prevention of hardware trojans

Notes for Prospective Authors

Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. (N.B. Conference papers may only be submitted if the paper was not originally copyrighted and if it has been completely re-written).

All papers are refereed through a peer review process. A guide for authors, sample copies and other relevant information for submitting papers are available on the Author Guidelines page.


Important Dates

First submission: 15 February, 2013

Review feedback: 30 March, 2013

Revised version submission: 30 May, 2013

Acceptance notification: 30 June, 2013

Final paper submission: 30 July, 2013