Skip to main content
  • Conference proceedings
  • © 2018

Cloud Computing and Security

4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part III

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 11065)

Part of the book sub series: Information Systems and Applications, incl. Internet/Web, and HCI (LNISA)

Conference series link(s): ICAIS: International Conference on Artificial Intelligence and Security

Conference proceedings info: ICCCS 2018.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (64 papers)

  1. Front Matter

    Pages I-XVIII
  2. Cloud Security

    1. Front Matter

      Pages 1-1
    2. Digital Continuity Guarantee Based on Data Consistency in Cloud Storage

      • Yongjun Ren, Yepeng Liu, Chengshan Qian
      Pages 3-11
    3. Dynamic Risk Access Control Model for Cloud Platform

      • Lixia Xie, Ruixin Wei, Yuguang Ning, Hongyu Yang
      Pages 12-22
    4. Efficient Multiparty Quantum Secret Sharing Scheme in High-Dimensional System

      • Ming-Ming Wang, Lu-Ting Tian, Zhi-Guo Qu
      Pages 23-31
    5. EkCRNN: A kNN Privacy Preserving Query Algorithm Based on Circular Region Extension

      • Honghao Zhou, Tinghuai Ma, Jing Jia, Yuan Tian, Mznah Al-Rodhaan
      Pages 32-43
    6. Fast Detection of Heavy Hitters in Software Defined Networking Using an Adaptive and Learning Method

      • Zhiliang Wang, Changping Zhou, Yang Yu, Xingang Shi, Xia Yin, Jiangyuan Yao
      Pages 44-55
    7. Focused Crawler Framework Based on Open Search Engine

      • Jiawei Liu, Yongfeng Huang
      Pages 56-68
    8. Identity Based Privacy Information Sharing with Similarity Test in Cloud Environment

      • Faguo Wu, Wang Yao, Xiao Zhang, Zhiming Zheng, Wenhua Wang
      Pages 69-78
    9. Image Encryption and Compression Based on a VAE Generative Model

      • Xintao Duan, Jingjing Liu, En Zhang, Haoxian Song, Kai Jia
      Pages 79-89
    10. Improved Two-Factor Authentication Protocol Based on Biometric Feature and Password for Cloud Service

      • Jian Song, Bo-ru Xu, Guo-chao Zhang, Guang-song Li, Chuan-gui Ma, Ai-jun Ge
      Pages 90-100
    11. Medical Information Access Control Method Based on Weighted Information Entropy

      • Lijuan Zheng, Linhao Zhang, Meng Cui, Jianyou Chen, Shaobo Yang, Zhaoxuan Li
      Pages 113-122
    12. Modeling and Analysis of a Hybrid Authentication Protocol for VANET

      • Yang Xu, Ziwang Wang, Lei Huang, Xiaoyao Xie
      Pages 123-137
    13. Modeling and Data Analysis of the Balise System

      • Shuai Zhang, Zhiwei Gao, Li Cui
      Pages 138-150
    14. Network Attack Prediction Method Based on Threat Intelligence

      • Junshe Wang, Yuzi Yi, Hongbin Zhang, Ning Cao
      Pages 151-160
    15. Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game Model

      • Jianyi Liu, Fangyu Weng, Ru Zhang, Yunbiao Guo
      Pages 161-173
    16. Privacy-Preserving Credit Scoring on Cloud

      • Jilin Wang, Yingzi Chen, Xiaoqing Feng
      Pages 195-205

About this book

This six volume set LNCS 11063 – 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics.

Editors and Affiliations

  • Nanjing University of Information Science and Technology, Nanjing, China

    Xingming Sun, Zhaoqing Pan

  • Department of Computer Science, Purdue University, West Lafayette, USA

    Elisa Bertino

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access