scispace - formally typeset
Open AccessProceedings Article

Proceedings of the 2013 international workshop on Security in cloud computing

TLDR
This workshop aims to bring together the research efforts from both the academia and industry in all security aspects related to cloud computing, and has received 25 submissions from fourteen countries covering four continents.
Abstract
It is our great pleasure to welcome you to the 2014 International Workshop on Security in Cloud Computing (SCC). Cloud computing has emerged as today's most exciting computing paradigm shift in information technology, since it promises numerous benefits, including lower costs, rapid scaling, easier maintenance, and ubiquitous availability. Meanwhile, cloud computing also raises many security and privacy challenges such as data protection, recovery, privacy, access control, trusted computing, as well as legal issues in areas such as regulatory compliance, auditing, and many others. This workshop aims to bring together the research efforts from both the academia and industry in all security aspects related to cloud computing. This is the second year for our SCC workshop. We received 21 submissions from nine countries covering four continents, including Canada, China, Egypt, France, India, Oman, Sudan, Sweden, and United States. The submissions were reviewed by a technical program committee of 48 experts. The final program contains 9 papers, representing an acceptance rate of 43%. Our program also features a keynote speech "On the Security of Cloud Data Storage and Sharing" by Dr. Jianying Zhou from Infocomm Security Department at Institute for Infocomm Research, Singapore.

read more

Citations
More filters
Proceedings ArticleDOI

Optimizing homomorphic evaluation circuits by program synthesis and term rewriting

TL;DR: A method for automatically learning and using optimization rules for FHE circuits by combining program synthesis and term rewriting, which maximally generalizes the learned rules based on the equational matching and its soundness and termination properties are formally proven.
Journal ArticleDOI

Security Data Auditing based on Multifunction Digital Watermark for Multimedia File in Cloud Storage

TL;DR: This paper defines specially a provable data possession model for multimedia file, and presents a framework based on digital watermarking for multimedia data storages audit service, in which the security features of audit service for multimediaData outsourcing and the corresponding properties of digitalWatermarking are analyzed.
Related Papers (5)