TRUSTWORTHY AND SECURE CLOUD SERVICES (TSCS)

GENERAL CHAIRS
Farag Azzedin, King Fahd University of Petroleum and Minerals (KFUPM), Saudi Arabia, Email: fazzedin@kfupm.edu.sa
Mohammad Hammoudeh, Saudi Aramco Cybersecurity Chair Professor (KFUPM), Saudi Arabia, Email: mohammad.hammoudeh@kfupm.edu.sa

Submit a Paper

WORKSHOP DESCRIPTION

Trust and security are essential components of cloud technological frameworks. The field of cloud trust and security is constantly changing influenced by new technologies and evolving threats. This workshop brings together researchers and practitioners from industry and academia to discuss upcoming trends and advancements in cloud trust and security that will impact how organizations trust cloud services to secure their data and applications in the Cloud. One major trend is the growing popularity of multi-cloud and hybrid cloud environments, where organizations utilize multiple cloud providers and combine on-premises infrastructure with cloud services for improved flexibility and scalability. However, this shift poses new trust and security challenges that demand innovative solutions. Another important trend is the emphasis on data privacy and compliance, as regulations such as HIPAA and GDPR require organizations to prioritize data protection and demonstrate compliance through encryption, data classification, and other privacy-enhancing technologies. The future of cloud security also involves the adoption of a zero-trust architecture, moving away from traditional perimeter defense models towards continuously verifying user identities and device integrity for better protection against advanced cyber threats. Additionally, AI and ML technologies are expected to play a significant role in enhancing threat detection, analyzing user behavior, and automating incident response for faster and more efficient trust and security operations. Cloud Trusted Execution Environments (TEEs) are also increasingly popular in cloud computing as a way to provide a secure and isolated environment for running sensitive workloads. TEEs use hardware-based security features to protect data and code from unauthorized access, ensuring that the integrity and confidentiality of the workload are maintained. This workshop provides researchers and practitioners an opportunity to showcase and discuss their contributions to trustworthy and secure cloud services. Authors are expected to share their new ideas, latest findings and results in the following topics but not limited to:

SUBMISSION INFORMATION

Submitted manuscripts must represent original unpublished research that is not currently under review for any other conference or journal. Manuscripts are submitted in PDF format and may not exceed six (6) IEEE-formatted *double-column* pages, including figures, tables, and references. All manuscripts undergo a double-blind peer-review process and will be reviewed and judged on correctness, originality, technical strength, rigor in analysis, quality of results, quality of presentation, and interest and relevance to the conference attendees. Your submission is subject to a determination that you are not under any sanctions by IEEE.

At least one author of each paper must be registered for the conference in order for the paper to be published in the proceedings. The conference proceedings will be published by the ACM and made available online via the IEEE Xplore Digital Library and ACM Digital Library.

IMPORTANT DATES

WORKSHOP PROGRAM COMMITTEE