Calls for papers
International Journal of Cloud Computing
Special Issue on: "Security, Privacy and Trust in Cloud Systems"
Surya Nepal and Mukaddim Pathan, CSIRO, Australia
Cloud computing provides a new paradigm to enable on-demand delivery of computing resources such as infrastructure, platforms and software as utilities to customers. When moving applications and/or data in the cloud, numerous challenges exist in leveraging the full potential that cloud computing promises. Despite what cloud computing promises, it is not secure by nature.
The security challenges related to cloud computing are worthy of close attention. In terms of security, cloud-based services must be managed and operated at equivalent levels to enterprise systems. Commercial enterprises often do not want to store their data in a cloud due to lack of trust and the risk of exposing their data in an untrusted environment. Cloud users typically have no control over the cloud storage servers used, and there is an inherent risk of data exposure to third parties in the cloud or to the cloud provider itself. The data must be properly encrypted both in motion and at rest.
In addition, companies and government agencies are often bound by law to host their applications and/or data within specific geographic boundaries. This calls for hybrid cloud environments that can seamlessly work together, where part of the application/data can be hosted in a public cloud, and other parts such as commercial sensitive data are hosted on premises. In this context, a key challenge is the provision of secure and trusted applications/data that can be operated in a hybrid cloud environment.
This special issue aims at compiling technologies for enhancing and provisioning security, privacy and trust in cloud computing environments based on QoS requirements.Subject Coverage
Topics of interest include but are not limited to:
- Cloud security architecture and protocol
- Secured cloud management services
- Secured information sharing and data protection in the cloud
- QoS-based trust models and QoS monitoring mechanisms
- Cryptography and crypto-protocols for cloud computing systems
- Security and virtualisation
- Risk management in cloud computing environments
- Privacy protection in cloud platforms and operations
- Autonomic security in cloud computing
- Intra- and inter-cloud security issues and considerations
- Access control mechanisms
- Mechanisms to enforce privacy and trust
- Energy/cost/efficiency of security in clouds
- Trust models for cloud services
Notes for Prospective Authors
Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. Substantially revised (minimum 30% of new content) versions of papers published in conference proceedings can be submitted. In this case, the original paper should also be enclosed. The guest editors should be notified at the time of submission and the author is responsible for obtaining the necessary copyright releases for all copyrighted material.
All papers are refereed through a peer review process. A guide for authors, sample copies and other relevant information for submitting papers are available on the Author Guidelines page
Submission due: 31 August, 2011 (extended)
Acceptance notification: 15 October, 2011
Final submission: 15 November, 2011