skip to main content
10.1145/3201595acmconferencesBook PagePublication PagessccConference Proceedingsconference-collections
SCC '18: Proceedings of the 6th International Workshop on Security in Cloud Computing
ACM2018 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ASIA CCS '18: ACM Asia Conference on Computer and Communications Security Incheon Republic of Korea 4 June 2018
ISBN:
978-1-4503-5759-3
Published:
23 May 2018
Sponsors:

Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the Sixth International Workshop on Security in Cloud Computing (SCC'18). This year's workshop continues its tradition of being the premier forum for the presentation of research results and experience reports on leading edge issues and challenges of cloud computing security. The mission of the workshop is to share novel solutions that fulfill the needs of secure and privacy-preserving cloud applications and services, and identify new directions for future research and development. SCC'18 gives researchers and practitioners a unique opportunity to share their perspectives with others interested in the topics of cloud security and privacy such as secure cloud architecture, cloud cryptography, cloud access control and key management, identification and privacy in cloud, integrity assurance for data outsourcing, integrity and verifiable computation, computation over encrypted data, and many others.

The call for papers attracted 17 submissions from total 12 countries and regions, including Australia, China, France, Germany, Hong Kong, India, Italy, Norway, South Korea, Switzerland, United Arab Emirates, and United States. After a careful review by the program committee, 6 papers were selected for presentation at the workshop. The program committee reviewed and accepted the following: We also encourage attendees to attend the keynote talk. The valuable and insightful talk will guide us to a better understanding on secure truth discovery in mobile crowdsensing:

  • Privacy-Preserving Truth Discovery in Mobile Crowdsensing: Challenges, Solutions, and Opportunities, Cong Wang (who is currently an Associate Professor in the Department of Computer Science at City University of Hong Kong)

Skip Table Of Content Section
SESSION: Keynote Address
keynote
Privacy-Preserving Truth Discovery in Mobile Crowdsensing: Challenges, Solutions, and Opportunities

The ubiquity of sensor-rich mobile devices is pushing forward the paradigm of mobile crowdsensing, which facilitates convenient and cost-effective collection of large amounts of sensory data (e.g., traffic monitoring, environment monitoring, and mobile ...

SESSION: Searchable Encryption
research-article
Storage Efficient Substring Searchable Symmetric Encryption

We address the problem of substring searchable encryption. A single user produces a big stream of data and later on wants to learn the positions in the string that some patterns occur. Although current techniques exploit auxiliary data structures to ...

research-article
Secure and Scalable Multi-User Searchable Encryption

By allowing a large number of users to behave as readers or writers, Multi-User Searchable Encryption (MUSE) raises new security and performance challenges beyond the typical requirements of Symmetric Searchable Encryption (SSE). In this paper we ...

SESSION: Secure Cloud Storage
research-article
POROS: Proof of Data Reliability for Outsourced Storage

We introduce POROS that is a new solution for proof of data reliability. In addition to the integrity of the data outsourced to a cloud storage system, proof of data reliability assures the customers that the cloud storage provider (CSP) has provisioned ...

research-article
PROPYLA: Privacy Preserving Long-Term Secure Storage

The amount of electronically stored information increases rapidly. Sensitive information requires integrity and confidentiality protection, sometimes for decades or even centuries (e.g., health records or governmental documents). Commonly used ...

SESSION: Secure Cloud Applications
research-article
Enabling Secure and Dynamic Deep Packet Inspection in Outsourced Middleboxes

Outsourced middlebox services have been a natural trend in modern enterprise networks to handle advanced traffic processing such as deep packet inspection, traffic classification, and load balancing. However, traffic redirection to outsourced ...

research-article
Cryptographically Enforced Orthogonal Access Control at Scale

We propose a new approach to cryptographically enforced data access controls that uses public key cryptography to secure large numbers of documents with arbitrarily large numbers of authorized users. Our approach uses a proxy re-encryption (PRE) scheme ...

Contributors
  • University of Central Florida
  • Wuhan University
Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

SCC '18 Paper Acceptance Rate6of17submissions,35%Overall Acceptance Rate64of159submissions,40%
YearSubmittedAcceptedRate
SCC '19221255%
SCC '1816638%
SCC '1817635%
SCC '17271141%
SCC '16311239%
SCC '1525832%
SCC '1421943%
Overall1596440%