Abbrevation
SPCLOUD
City
Genoa
Country
Italy
Deadline Paper
Start Date
End Date
Abstract

Cloud computing is transforming the way large&#8211;scale computation is performed&#046; Dynamic scalability or &#8211;elasticity&#8211; provided by the cloud make high&#8211;performance computing accessible to everyone&#046; However, cloud computing introduces new challenges with respect to security and privacy&#046; Although virtualization addresses some of these concerns, it has a significant impact on performance: the actual gains in performance depend heavily on the predictability of physical and virtualized resources&#046; Consequently, the balancing of performance against security and the adaptation of HPC or VLDB techniques to cloud computing are of strategic importance and will have long&#8211;lasting scientific impact&#046;<br>The 7th SPCLOUD workshop brings together researchers and IT practitioners, to present new results and ongoing work on the themes of security, privacy, and performance in the cloud&#046;<br>The SPCLOUD Workshop topics of interest include (but are not limited to) the following:<br>&#8211; Secure Mobile Clouds<br>&#8211; Reliability and Security of Cloud Environments<br>&#8211; Monitoring for Cloud&#8211;Based Applications<br>&#8211; Cryptography and Crypto&#8211;Protocols for Cloud Computing Systems<br>&#8211; Parallel Computing With Cloud&#8211;Based Systems<br>&#8211; Very Large Databases In The Cloud: Transactions, Backup, Security, Scalability<br>&#8211; Security and Virtualization<br>&#8211; Risk Management in Cloud Computing Environments<br>&#8211; Usability and Human Centered Security for Clouds<br>&#8211; Trusted Data Sharing and Shared Technology Issues<br>&#8211; Untrusted Cloud Servers and Networks<br>&#8211; Privacy Protection in Cloud Platforms and Operations<br>&#8211; Autonomic Security in Cloud Computing<br>&#8211; Intercloud Security Issues and Considerations<br>&#8211; Insecure Interfaces and APIs<br>&#8211; Insiders Threats<br>&#8211; Security Models for New Services<br>&#8211; Services Hijacking<br>&#8211; Interoperable Identity Management<br>&#8211; Information Hiding in Cloud Computing<br>&#8211; Forensics in the Clouds<br>&#8211; Cloud Infrastructure Security<br>&#8211; Use of Cloud Systems for Scalable High&#8211;performance Computing<br>&#8211; Performance Overhead of Virtualization<br>&#8211; Monitoring of Cloud Systems, Alerts for Resource Consumption<br>&#8211; Identification and Privacy in Clouds<br>&#8211; Secure Mobile Clouds and Privacy Management<br>