Over the last few years, the computing paradigm has experienced a massive shift from local to cloud-based applications. As a result, users and organizations do no longer have full control over their data and services, but they rely on third-party cloud providers.
This development poses various challenges concerning the integrity and confidentiality of data as well as the privacy of users of such systems. Currently, no satisfactory solutions to these challenges exist, which is a roadblock for the large-scale deployment of cloud-based applications handling sensitive data such as electronic health records.
The aim of this symposium is to provide a platform to discuss innovative ideas related to the following questions:
* How can cloud services be made more trustworthy?
* How can we build distributed systems without single point of failure or trust?
* How to design end-to-end secure services in an untrusted environment?
* Which methodologies and technologies are required to integrate security and privacy by design?
* Is it possible to give back users full control over their data, i.e. let them decide when and to whom they are revealed?
Next to the regular session with peer-reviewed research papers, an invited talk will be given by a representative of the H2020 project SAFECLOUD.
The ambition of PRISMACLOUD is to develop and show-case cryptographic tools that protect the security and privacy of user data during its lifecycle in the cloud. In particular, the project focuses on the development of (information theoretically) secure storage solutions as well as efficient, privacy preserving yet verifiable computing on authenticated data.
Complementary to this, CREDENTIAL aims at developing privacy friendly means for storing and sharing personal data in the cloud, and at realizing an “identity and access management as a service” system supporting publicly certified identity data.
Topics of interest comprise but are not limited to:
*(Publicly) verifiable computing
* Malleable signatures
* Privacy-preserving authentication
* Proxy cryptography
* Format preserving encryption
* Order preserving encryption
* Secret sharing
* Security and privacy in web services
* Security and privacy in cloud scenarios
* Secure distributed systems
* Fault tolerance in distributed systems
* Auditing of cloud based systems
* Transparency-enhancing technologies
* Identity management
We are happy to welcome papers from people in academia, industry and the public sector, who would like to share their results, knowledge and experience. Questions about submission can be sent at email@example.com or firstname.lastname@example.org
- Submission Deadline: April 4, 2016
- Author Notification: May 30, 2016
- Proceedings Version: June 20, 2016
- Conference August 31 – September 2, 2016
The full CFP is located at:
Research Papers shall be submitted via the main ARES submission site:
cryptography, identity management, security, privacy, cloud computing