Call for paper

The 1st International Workshop on Trust in Cloud Computing (IWTCC2014)

Collocated with 7th IEEE/ACM International Conference on Utility and Cloud Computing -

UCC 2014

December 10,2014

London, UK

Workshop program


Trust is a key requirement for the successful uptake and operation of Utility and Cloud Computing (UCC). Service consumers must have belief that their data is safe and protected and service providers must provide sufficient assurances to satisfy these beliefs. However many challenges need to be overcome before this is possible. A myriad of trust relationships can arise between the different players in the UCC service delivery chain and these need to be understood and described as do the consequential assurance approaches that may be required. Complex, and varying, UCC service delivery environments may require very different and context dependent mechanisms to provide the assurances needed. This workshop aims to explore approaches to the definition and establishment of trust relationships in a dynamic and evolving UCC service environment and to investigate mechanisms, methodologies and technologies to enable the provision of assurances that are needed to fulfil users trust beliefs.

The IWTCC will be held in London, UK, December, 2014. It provides a forum for researchers world-wide to present their latest work in privacy, security and trust in the cloud, and to show how this research can be used to enable innovation.

IWTCC is organized by the Irish centre for Cloud computing and Commerce (IC4) and by The Distributed and intelligent systems (DISYS) research team at the University of Derby. 


We encourage submissions on theoretical as well as experimental studies related to all aspects of trust and security and privacy in the cloud. Topics of interests include, but are NOT limited to, the following categories:
  • Trust models in UCC.
  • Cryptographic techniques for privacy preservation
  • Identity, Authentication and key management
  • Formal verification for cloud architecture
  • Practical cryptographic protocols for cloud security
  • Intrusion Detection Technologies for cloud contexts
  • SDN Security
  • Provenance and digital forensics
  • Monitoring systems in the cloud
  • Remote attestation mechanisms in clouds
  • Trusted computing technology and clouds
  • Cloud Integrity and Audit
  • Privacy and security in Vehicular cloud
  • Multi-tenancy and trust in cloud computing

Important dates

Paper Submissions Due:                15 August, 2014 (Extended Deadline)

Notification of Acceptance:           15 September, 2014

Early Registration Deadline:          29 September, 2014

Workshop will take place on December -, 2014