CCSW 2013: The ACM Cloud Computing Security Workshop
in conjunction with the ACM Conference on Computer and Communications Security (CCS)
8 November 2013, Berlin.

Notwithstanding the latest buzzword (grid, cloud, utility computing, SaaS, etc.), large-scale computing and cloud-like infrastructures are here to stay. How exactly they will look like tomorrow is still for the markets to decide, yet one thing is certain: clouds bring with them new untested deployment and associated adversarial models and vulnerabilities. It is essential that our community becomes involved at this early stage. The CCSW workshop aims to bring together researchers and practitioners in all security aspects of cloud-centric and outsourced computing, including:
  • practical cryptographic protocols for cloud security
  • secure cloud resource virtualization mechanisms
  • secure data management outsourcing (e.g., database as a service)
  • practical privacy and integrity mechanisms for outsourcing
  • foundations of cloud-centric threat models
  • secure computation outsourcing
  • remote attestation mechanisms in clouds
  • sandboxing and VM-based enforcements
  • trust and policy management in clouds
  • secure identity management mechanisms
  • new cloud-aware web service security paradigms and mechanisms
  • cloud-centric regulatory compliance issues and mechanisms
  • business and security risk models and clouds
  • cost and usability models and their interaction with security in clouds
  • scalability of security in global-size clouds
  • trusted computing technology and clouds
  • binary analysis of software for remote attestation and cloud protection
  • network security (DOS, IDS etc.) mechanisms for cloud contexts
  • security for emerging cloud programming models
  • energy/cost/efficiency of security in clouds
We would like to especially encourage novel paradigms and controversial ideas that are not on the above list. The workshop is to act as a fertile ground for creative debate and interaction in security-sensitive areas of computing impacted by clouds.

CCSW has had a significant impact in our research community. As of September 2013, in the new Google Scholar Metrics entry for CCS (which encompasses CCSW), 4 of the top 20 cited papers of the past five years come from CCSW. One way to look at it is that you're as likely or perhaps more likely to have a top-20 paper publishing in CCSW than in CCS! (thanks to Ari Juels for noticing this)

Student Stipends
Student stipends are available to attend CCSW. Please apply on the CCS website and mention CCSW as your target workshop. We plan on awarding several student travel grants (a function also of the quality of the applications). Don't forget to mention CCSW as your workshop of choice if you'd like to be considered by us. Also please explain why you are a good fit to attend the workshop.

Important Dates (tentative)
Submissions due: extended to July 26, 2013 (midnight anywhere in the world)
Author notification: August 23, 2013
Camera-ready: extended to September 5, 2013
Workshop: November 8, 2013 (all talks in room C01)

CCSW is soliciting full papers of 8-12 pages which will be judged based on the quality per page. Thus, shorter, high-quality papers are encouraged, and papers may be perceived as too long if they are repetitive or verbose. Submissions must use the ACM SIG Proceedings Templates (available at the
ACM website) in double-column format with a font no smaller than 9 point. Only PDF files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Accepted papers will be published by the ACM Press and/or the ACM Digital Library.

Submissions must be anonymous, and authors should refer to their previous work in the third-person. Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Each accepted paper must be presented by one registered author. Submissions not meeting these guidelines risk immediate rejection. For questions about these policies, please contact the chairs at

Keynote Speakers

Dr. Marnix Dekker, Security expert and Information Security Officer, European Network and Information Security Agency (ENISA)
Dr. Marnix Dekker is Security Expert and Information Security Officer at ENISA (the European Network and Information Security Agency). Marnix works in the area of secure services and critical information infrastructures. He focuses on cloud security, smartphone security and also leads the Agency's work on the implementation of EU-wide security regulation for telco's (Article 13a).

Slava Kavsan, Partner Security Development Manager (Azure), Microsoft
Slava Kavsan is leading Windows Azure Security Architecture efforts in Microsoft. In his prior role of managing Windows Core OS Security team in Microsoft, he led architecture and development efforts encompassing Windows 7 and Windows 8 core security and identity features, such as platform integrity, data protection (BitLocker), encryption, strong authentication and dynamic access control. Since joining Microsoft in 2006, Slava has worked on defining architecture and technical strategy for Security, Identity and Access Management. Slava has more than 25 years of high-tech leadership, combining extensive engineering management background with technical expertise in the areas of Security, PKI, Authentication and Advanced Network Protocols. Prior to coming to Microsoft, Slava was VP of Engineering and CTO at RSA Security, where he led research and development projects for a variety of Security and Identity Management solutions.

Dr. Jesus Luna, Research Director EMEA, Cloud Security Alliance
Before joining CSA EMEA, Jesus worked in the ICT security field for more than 17 years with both industry and academia in Germany, Spain, Greece, Cyprus and Mexico. Jesus is founding member of the Spanish and German chapters of the CSA and, is also affiliated with the CS department of the Technical University of Darmstadt. Jesus obtained his PhD degree (Cum-Laude) in Computer Architecture from the "Technical University of Catalonia" (2008), and has published more than 30 scientific papers in ICT security conferences and journals, including a recently granted US patent in the field of cyber security. His main research interests are security quantification, applied cryptography, and security monitoring.

Program (all talks in room C01)
  07:30 Breakfast
  08:25 Welcome
The Organizers
  Session: Code Execution   Chair: Ahmad-Reza Sadeghi  
  08:30-09:30 A Versatile Code Execution Isolation Framework with Security First
Johannes Krude; Ulrike Meyer
  An Architecture for Concurrent Execution of Secure Environments in Clouds
Ramya Jayaram Masti; Claudio Marforio; Srdjan Capkun
  Generalized External Interaction with Tamper-Resistant Hardware with Bounded Information
Xiangyao Yu; Christopher Fletcher; Ling Ren; Marten Van Dijk; Srini Devadas
  Keynote I     
  9:30-10:30 Challenges of Transforming Swamps Into Clouds, Slava Kavsan (Microsoft)
  10:30-11:00 Coffee Break
  Session: Storage    Chair: Srdjan Capkun  
 11:00-11:40Authenticated Storage Using Small Trusted Hardware
Hsin-Jung Yang; Victor Costan; Nickolai Zeldovich; Srini Devadas
 Cloudsweeper: Enabling Data-Centric Document Management for Secure Cloud Archives
Chris Kanich; Peter Snyder
  Keynote II     
  11:40-12:40 Cloud Security, Dr. Marnix Dekker (ENISA)
Abstract: Cloud computing is becoming the backbone of our digital society. ENISA has frequently underlined the security opportunities in cloud computing. But customers in surveys continue to cite information security issues as a barrier to adoption. The EC recently deployed a number of initiatives under the EU Cloud strategy. In this talk I will summarize ENISA's past cloud work - highlighting some key risks for customers and more in general the pros and cons of large-scale computing infrastructure. I will also summarize the more recent activities under the cloud strategy ENISA is involved in. And I will conclude with an overview of some upcoming EU regulations on information security and how they might impact cloud computing.
  12:40-2:00 Lunch
  Session: Cryptographic Protocols    Chair: Elaine Shi   
 2:00-3:20On the (Im)possibility of Privately Outsourcing Linear Programming
Peeter Laud; Alisa Pankova
 Secure Pattern Matching using Somewhat Homomorphic Encryption
Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama and Takeshi Koshiba
 Supporting Complex Queries and Access Policies for Multi-user Encrypted Databases
Muhammad Rizwan Asghar; Giovanni Russello; Bruno Crispo
 Beyond the Ideal Object: Towards Disclosure-Resilient Order-Preserving Encryption Schemes
Sander Wozniak; Michael Rossberg; Sascha Grau; Ali Alshawish; Guenter Schaefer
  3:20-4:00 Coffee Break
  Keynote III     
  4:00-5:00 Accountability in the Cloud: research challenges and opportunities, Dr. Jesus Luna (CSA EMEA)
Abstract: Cloud service providers should act as responsible stewards for the data of their customers and users. However the current absence of accountability frameworks for distributed IT services (Cloud included) makes it difficult for users to understand, influence and determine how their service providers honour their obligations. This talk will present some current research directions in Cloud accountability, based on early results from the EU project A4Cloud and CSA initiatives like the "Cloud Trust Protocol" and the "Open Certification Framework".
  Session: Infrastructure    Chair: Tom Ristenpart   
 5:00-5:40Structural Cloud Audits that Protect Private Information
Hongda Xiao; Bryan Ford; Joan Feigenbaum
 Cloudoscopy: Services Discovery and Topology Mapping
Amir Herzberg; Haya Shulman; Johanna Ullrich; Edgar Weippl

Please register
here on the main CCS website.



Ari Juels, RSA Labs
Bryan Parno, Microsoft Research


Giuseppe Ateniese, Johns Hopkins University
Kevin Bowers, RSA Laboratories
Srdjan Capkun, ETH-Zurich
Melissa Chase, Microsoft Research
Haibo Chen, Shanghai Jiao Tong University
George Danezis, Microsoft Research
Anupam Datta, Carnegie Mellon University
David Evans, University of Virginia
Roxana Geambasu, Columbia University
Andreas Haeberlen, University of Pennsylvania
Amir Herzberg, Bar Ilan University
Giles Hogben, Cloud Security Alliance
Trent Jaeger, The Pennsylvania State University
Xuxian Jiang, North Carolina State University
Seny Kamara, Microsoft Research
Farinaz Koushanfar, Rice University
Andres Lagar-Cavilla, GridCentric Inc.
Ruby Lee, Princeton University
David Lie, University of Toronto
Petros Maniatis, Intel Labs
Cristina Nita-Rotaru, Purdue University
Alina Oprea, RSA Labs
Mariana Raykova, IBM Research
Thomas Ristenpart, University of Wisconsin
Ahmad-Reza Sadeghi, TU Darmstadt
Pierangela Samarati, Universita` degli Studi di Milano
Matthias Schunter, Intel Labs
Elaine Shi, University of Maryland
Nigel Smart, University of Bristol, UK
Sean Smith, Dartmouth College
Leendert van Doorn, AMD, Inc.
Yinglian Xie, Microsoft Research Silicon Valley
Dongyan Xu, Purdue University

Kristin Lauter, Microsoft
Adrian Perrig, ETH Zurich
Radu Sion, Stony Brook (chair)
Gene Tsudik, UC Irvine
Moti Yung, Google Inc.

Ahmad-Reza Sadeghi, TU Darmstadt | CASED

Interested in sponsoring CCSW (this or next year)? Please
contact us directly.

Previous Workshops
CCSW 2009, CCSW 2010, CCSW 2011. CCSW 2012.

Updated: November 6, 2013

© 2009-2013 NSAC Lab.

All Rights Reserved.