The 6th IEEE International Conference on Cyber Security and Cloud Computing

CSCloud 2019


Architecture Computing Systems



The increasing demands of Cloud-based technologies have deeply changed people’s daily life, from various kinds of mobile applications to big data based services.One of the most promising trends is the Cloud-based solutions for small enterprises to deploy their business on Cloud servers. However, privacy and security issues along with the widely developed Cloud-based services are always becoming an obstacle for the usage of the Cloud services. IEEE CSCloud 2019 focuses on these two aspects and aims to gather recent achievements in cyber security and cloud computing fields. The conference invites those papers that concentrate on new paradigms, algorithms, and applications in cyber security or cloud computing. We also encourage researchers and practitioners to build up the connections between academia and industry. We aim to collect the latest achievements and exchange research ideas in the domains of intelligent data and security at this academic event.
Topics of particular interest include, but are not limited to:
Big data security issues and cyber crime
Social engineering, insider threats, advance spear phishing
Security and fault tolerance for embedded or ubiquitous systems
Security of Web-based applications and services
Cloud users’ privacy information protection
Critical infrastructure protection in cloud/fog/edge computing
Cyber issues and solutions in fog/edge computing
Reinforcement learning-based security mechanism
Secure methods for heterogeneous cloud resource sharing
Green cloud computing mechanisms
Cloud-based audio/video streaming techniques
New attack methods and applications
Reinforcement learning-based intelligent agent in cloud computing
Trust management in cloud/fog/edge computing
Trust and reputation systems for cloud-based applications
Emerging attack methods in cloud/fog/edge computing
Digital forensics and privacy issues in cloud computing
Anti-Forensics and Anti-Anti-Forensics Techniques
Cyber monitoring approaches
Data leakage, data protection and database forensics
Identity management and fraud management
Critical issues and solutions of Cyber security in tele-health
Cyber security in mobile embedded systems
New security cloud computing model, framework, and application
Heterogeneous clouds and vulnerabilities