Welcome to ESP-DGC 2015
Cloud computing can be thought of as being in its infancy, since it is possible to find widely
varying opinions for how it will shape up in the following decade. In theory, data acquired from
distributed sensors, combined with the flexibility of cloud computing using distributed
computational and storage sources should allow an exciting new set of applications.
Unfortunately, this naive view is quickly interrupted, since the very flexibility that opens
the door to a set of new applications also extends to parties with malicious intent. Therefore,
the fight for securing the data privacy should be a part of the applications. Securing the data,
or the code can be achieved by software, as well as dedicated hardware.
Emerging technologies in Security and Privacy of Distributed, Grid and Cloud Computing systems
(ESP-DGC) workshop welcomes novel papers that propose to improve the information privacy at the
acquisition point, during storage, during communication, or during computation. Potential information
privacy advances can be the result of novel algorithmic approaches, or straightforward novel
implementation of existing techniques, as well as novel hardware technologies.
These categories which ESP-DGC welcomes are listed below, but not limited to:
| |
CLOUD SECURITY | COMMUNICATIONS |
Secure Cloud Streaming | Distributed secure communication algorithms |
Program Obfuscation | Protocol-level improvements for security |
Privacy Preserving Data Mining | Privacy-preserving networking methodologies |
Cloud security architecture and protocols | Distributed secure mobile/sensory communication |
Verifiable Outsourcing | |
Secure Multi-party communication | |
Scalable security in Clouds | HARDWARE |
Side Channel Attacks | Novel secure FPGA, GPU, ASIC, APU-based designs |
Intrusion Detection | Privacy-preserving distributed data acquisition |
Privacy Preserving Cloud Computing | Datacenter hardware improvements for better security |
Fully homomorphic Encryption & applications | |
Storage Privacy | |
Privacy-sensitive cloud applications | SURVEYS |
Workload profiling for secure cloud applications | Any surveys are welcome on one of these topics |
Private Information Retrieval | |
Mobile-Cloud Computing security | |
Distributed and secure "as a Service" alternatives | |
|