Trust and security are the top concerns of cloud computing users and the key barrier to widespread uptake of cloud computing services across industries. The resistance towards cloud computing is especially experienced in industries handling sensitive data, such as healthcare, government, banking, etc.
While cloud computing brings about several conveniences for end-users, many new issues surfaced from cloud computing's promise of elasticity and availability. With these new issues, traditional security and trust techniques may not be able to fully resolve cloud computing's trust and security problems. Some of these new constraints include definition of data ownership, massive virtualization, multi-tenancy, elasticity, and cross-geographical server environments. There is a need for researchers to consolidate, discuss and bring forward this emerging and important field to the next level.
This special issue focuses on the research challenges and issues in trust and security in cloud computing. It aims to collect contributions by researchers from both academia and industry, show the latest research results and methodologies addressing top concerns in trust and security in cloud computing, and provide valuable information to researchers as well as practitioners, standards developers and policymakers.
Topics of interest include, but are not limited to:
Malware detection in cloud computing
Cryptography and encryption techniques for cloud computing
Privacy in cloud computing
Data obfuscation for cloud computing
Accountability in cloud computing
Security in virtualized environments
Governance, regulation and compliance in cloud computing
Data analytics for security in cloud computing
Visualization for security in cloud computing
Cloud computing threat detection techniques
Trust in cloud services
Trust reputation systems for cloud computing
Reports on critical, real-life security and trust use cases in cloud computing
Secure and trusted workflows in cloud computing
Attacks and disaster preparation, recovery, and response
Application and practical experiences
Data security, privacy, retention and recovery
Position papers on issues in security and trust in cloud computing
Submitted papers should not be considered elsewhere for publication and the authors must follow the guidelines for preparation of the manuscripts. The language of the journal is English. 12-point type in one of the standard fonts, Times, Helvetica, or Courier is preferred. The paper length should not exceed 20 pages total including all figures and illustrations. It is not necessary for authors to double-line space their manuscript. Tables must be on separate pages after the reference list, and not be incorporated into the main text. Figures should be uploaded as separate figure files. For manuscript submission authors should follow the guidelines described in Section “For Authors” at wileyonlinelibrary.com/journal/security. Prospective authors should submit their paper online at mc.manuscriptcentral.com/scn. When submitting the papers, the authors should make sure to choose the Manuscript type as “Special Issue”, enter the “Running Head” and the “Special Issue title” as “SCN-SI-041” and “Trust and Security in Cloud Computing”, respectively.