Skip to main content
  • Conference proceedings
  • © 2015

Cloud Computing and Security

First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9483)

Part of the book sub series: Information Systems and Applications, incl. Internet/Web, and HCI (LNISA)

Conference series link(s): ICAIS: International Conference on Artificial Intelligence and Security

Conference proceedings info: ICCCS 2015.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (47 papers)

  1. Front Matter

    Pages I-XII
  2. Data Security

    1. Front Matter

      Pages 1-1
    2. VH: A Lightweight Block Cipher Based on Dual Pseudo-random Transformation

      • Xuejun Dai, Yuhua Huang, Lu Chen, Tingting Lu, Fei Su
      Pages 3-13
    3. Privacy-Preserving Multidimensional Range Query on Real-Time Data

      • Zhong Ting, Han Xiao, Yang Yunshuo, Zhu Aixiang
      Pages 49-61
    4. ARM-Based Privacy Preserving for Medical Data Publishing

      • Zhang Fengli, Bai Yijing
      Pages 62-73
    5. Attribute-Based Encryption Without Key Escrow

      • Xing Zhang, Cancan Jin, Zilong Wen, Qingni Shen, Yuejian Fang, Zhonghai Wu
      Pages 74-87
    6. Complete Separable Reversible Data Hiding in Encrypted Image

      • Yin Zhaoxia, Wang Huabin, Zhao Haifeng, Luo Bin, Zhang Xinpeng
      Pages 101-110
    7. Coverless Image Steganography Without Embedding

      • Zhili Zhou, Huiyu Sun, Rohan Harit, Xianyi Chen, Xingming Sun
      Pages 123-132
    8. Coverless Information Hiding Method Based on the Chinese Mathematical Expression

      • Xianyi Chen, Huiyu Sun, Yoshito Tobe, Zhili Zhou, Xingming Sun
      Pages 133-143
  3. System Security

    1. Front Matter

      Pages 145-145
    2. A Lightweight and Dependable Trust Model for Clustered Wireless Sensor Networks

      • Nannan Shao, Zhiping Zhou, Ziwen Sun
      Pages 157-168
    3. The Optimization Model of Trust for White-Washing

      • Zhidan Wang, Jian Wang, Yanfei Zhao
      Pages 169-180
    4. Malware Clustering Based on SNN Density Using System Calls

      • Wang Shuwei, Wang Baosheng, Yong Tang, Yu Bo
      Pages 181-191

Other Volumes

  1. Cloud Computing and Security

About this book

This book constitutes the proceedings of the International Conference on Cloud Computing and Security (ICCCS 2015) will be held on August 13-15, 2015 in Nanjing, China. 
The objective of ICCCS 2015 is to provide a forum for researchers, academicians, engineers, industrial professionals, students and government officials involved in the general areas of information security and cloud computing.

Editors and Affiliations

  • Nanjing University of Aeronautics and As, Nanjing, China

    Zhiqiu Huang, Jian Wang

  • Nanjing University of Information Scienc, Nanjing, China

    Xingming Sun

  • Nanjing, China

    Junzhou Luo

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access