<div dir="ltr"><p class="MsoNormal" align="center" style="text-align:center"><b>***Call for Papers***</b></p><p class="MsoNormal" align="center" style="text-align:center"><b><br></b></p>

<p class="MsoNormal" align="center" style="text-align:center"><b><span style="font-size:14pt;line-height:115%">Security and Privacy
Protection on Clouds</span></b></p><p class="MsoNormal" align="center" style="text-align:center"><b><span style="font-size:14pt;line-height:115%"><br></span></b></p>

<p class="MsoNormal" align="center" style="text-align:center">&nbsp;Special Issue in <b>IEEE Transactions on Cloud
Computing</b></p><p class="MsoNormal" align="center" style="text-align:center"><br></p>

<p class="MsoNormal" style="text-align:justify"><span style="font-size:10pt;line-height:115%;font-family:&#39;Times New Roman&#39;,serif;color:black">The emerging paradigm of cloud computing provides a new way to
address the constraints of limited energy, capabilities, and resources.
Researchers and practitioners have embraced cloud computing as a new approach
that has the potential for a profound impact in our daily life and world
economy. However, security and privacy protection is a critical concern in the
development and adoption of cloud computing. To avoid system fragility and
defend against vulnerabilities exploration from cyber attacker, various cyber
security techniques and tools have been developed for cloud systems. &nbsp;This
special issue will focus on the challenging topic&mdash;&ldquo;Security and Privacy
Protection on Clouds&rdquo; and invites the state-of-the-art research results to be
submitted here. </span></p>

<p class=""><b><span style="font-size:10pt">Topics </span></b><span style="font-size:10pt"></span></p>

<p class="MsoNormal" style="text-align:justify"><span style="font-size:10pt;line-height:115%;font-family:&#39;Times New Roman&#39;,serif;color:black">This special issue calls for original, high-quality, high-impact
research papers related to the following broad topics, but are not limited to:</span></p>

<p class="" style="margin-left:50.25pt"><span style="font-size:10pt;line-height:115%;font-family:Symbol">·<span style="font-size:7pt;line-height:normal;font-family:&#39;Times New Roman&#39;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><span style="font-size:10pt;line-height:115%;font-family:&#39;Times New Roman&#39;,serif">Cloud Security in New Paradigms</span></p>

<p class="" style="margin-left:50.25pt"><span style="font-size:10pt;line-height:115%;font-family:Symbol">·<span style="font-size:7pt;line-height:normal;font-family:&#39;Times New Roman&#39;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><span style="font-size:10pt;line-height:115%;font-family:&#39;Times New Roman&#39;,serif">Mobile cloud security</span></p>

<p class="" style="margin-left:50.25pt"><span style="font-size:10pt;line-height:115%;font-family:Symbol">·<span style="font-size:7pt;line-height:normal;font-family:&#39;Times New Roman&#39;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><span style="font-size:10pt;line-height:115%;font-family:&#39;Times New Roman&#39;,serif">Mobile cloud privacy protection</span></p>

<p class="" style="margin-left:50.25pt"><span style="font-size:10pt;line-height:115%;font-family:Symbol">·<span style="font-size:7pt;line-height:normal;font-family:&#39;Times New Roman&#39;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><span style="font-size:10pt;line-height:115%;font-family:&#39;Times New Roman&#39;,serif">Cloud hacking and virus protection</span></p>

<p class="" style="margin-left:50.25pt"><span style="font-size:10pt;line-height:115%;font-family:Symbol">·<span style="font-size:7pt;line-height:normal;font-family:&#39;Times New Roman&#39;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><span style="font-size:10pt;line-height:115%;font-family:&#39;Times New Roman&#39;,serif">Cloud browser security</span></p>

<p class="" style="margin-left:50.25pt"><span style="font-size:10pt;line-height:115%;font-family:Symbol">·<span style="font-size:7pt;line-height:normal;font-family:&#39;Times New Roman&#39;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><span style="font-size:10pt;line-height:115%;font-family:&#39;Times New Roman&#39;,serif">Next generation fire wall for clouds</span></p>

<p class="" style="margin-left:50.25pt"><span style="font-size:10pt;line-height:115%;font-family:Symbol">·<span style="font-size:7pt;line-height:normal;font-family:&#39;Times New Roman&#39;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><span style="font-size:10pt;line-height:115%;font-family:&#39;Times New Roman&#39;,serif">Cloud monitoring</span></p>

<p class="" style="margin-left:50.25pt"><span style="font-size:10pt;line-height:115%;font-family:Symbol">·<span style="font-size:7pt;line-height:normal;font-family:&#39;Times New Roman&#39;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><span style="font-size:10pt;line-height:115%;font-family:&#39;Times New Roman&#39;,serif">Cloud incident response</span></p>

<p class="" style="margin-left:50.25pt"><span style="font-size:10pt;line-height:115%;font-family:Symbol">·<span style="font-size:7pt;line-height:normal;font-family:&#39;Times New Roman&#39;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><span style="font-size:10pt;line-height:115%;font-family:&#39;Times New Roman&#39;,serif">Digital forensics in clouds</span></p>

<p class="" style="margin-left:50.25pt"><span style="font-size:10pt;line-height:115%;font-family:Symbol">·<span style="font-size:7pt;line-height:normal;font-family:&#39;Times New Roman&#39;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><span style="font-size:10pt;line-height:115%;font-family:&#39;Times New Roman&#39;,serif">Big data security in clouds</span></p>

<p class="" style="margin-left:50.25pt"><span style="font-size:10pt;line-height:115%;font-family:Symbol">·<span style="font-size:7pt;line-height:normal;font-family:&#39;Times New Roman&#39;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><span style="font-size:10pt;line-height:115%;font-family:&#39;Times New Roman&#39;,serif">Cloud data center security</span></p>

<p class="" style="margin-left:50.25pt"><span style="font-size:10pt;line-height:115%;font-family:Symbol">·<span style="font-size:7pt;line-height:normal;font-family:&#39;Times New Roman&#39;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><span style="font-size:10pt;line-height:115%;font-family:&#39;Times New Roman&#39;,serif">Database security for cloud systems</span></p>

<p class="" style="margin-left:50.25pt"><span style="font-size:10pt;line-height:115%;font-family:Symbol">·<span style="font-size:7pt;line-height:normal;font-family:&#39;Times New Roman&#39;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><span style="font-size:10pt;line-height:115%;font-family:&#39;Times New Roman&#39;,serif">Social engineering in clouds</span></p>

<p class="" style="margin-left:50.25pt"><span style="font-size:10pt;line-height:115%;font-family:Symbol">·<span style="font-size:7pt;line-height:normal;font-family:&#39;Times New Roman&#39;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><span style="font-size:10pt;line-height:115%;font-family:&#39;Times New Roman&#39;,serif">Insider threats and models in clouds</span></p>

<p class="" style="margin-left:50.25pt"><span style="font-size:10pt;line-height:115%;font-family:Symbol">·<span style="font-size:7pt;line-height:normal;font-family:&#39;Times New Roman&#39;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><span style="font-size:10pt;line-height:115%;font-family:&#39;Times New Roman&#39;,serif">Advance spear phishing in clouds</span></p>

<p class="" style="margin-left:50.25pt"><span style="font-size:10pt;line-height:115%;font-family:Symbol">·<span style="font-size:7pt;line-height:normal;font-family:&#39;Times New Roman&#39;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><span style="font-size:10pt;line-height:115%;font-family:&#39;Times New Roman&#39;,serif">Cloud threat intelligence for cloud
systems</span></p>

<p class="" style="margin-left:50.25pt"><span style="font-size:10pt;line-height:115%;font-family:Symbol">·<span style="font-size:7pt;line-height:normal;font-family:&#39;Times New Roman&#39;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><span style="font-size:10pt;line-height:115%;font-family:&#39;Times New Roman&#39;,serif">Reliability and fault tolerance for cloud
systems</span></p>

<p class="" style="margin-left:50.25pt"><span style="font-size:10pt;line-height:115%;font-family:Symbol">·<span style="font-size:7pt;line-height:normal;font-family:&#39;Times New Roman&#39;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><span style="font-size:10pt;line-height:115%;font-family:&#39;Times New Roman&#39;,serif">Cloud-based tele-health and medical security
and privacy protection</span></p>

<p class="" style="margin-left:50.25pt"><span style="font-size:10pt;line-height:115%;font-family:Symbol">·<span style="font-size:7pt;line-height:normal;font-family:&#39;Times New Roman&#39;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><span style="font-size:10pt;line-height:115%;font-family:&#39;Times New Roman&#39;,serif">Hardware-related security in clouds</span></p>

<p class="" style="margin-left:50.25pt"><span style="font-size:10pt;line-height:115%;font-family:Symbol">·<span style="font-size:7pt;line-height:normal;font-family:&#39;Times New Roman&#39;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><span style="font-size:10pt;line-height:115%;font-family:&#39;Times New Roman&#39;,serif">Security and performance trade-off</span></p>

<p class="" style="margin-left:50.25pt"><span style="font-size:10pt;line-height:115%;font-family:Symbol">·<span style="font-size:7pt;line-height:normal;font-family:&#39;Times New Roman&#39;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><span style="font-size:10pt;line-height:115%;font-family:&#39;Times New Roman&#39;,serif">Energy-aware security in clouds</span></p>

<p class="" style="margin-left:50.25pt"><span style="font-size:10pt;line-height:115%;font-family:Symbol">·<span style="font-size:7pt;line-height:normal;font-family:&#39;Times New Roman&#39;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><span style="font-size:10pt;line-height:115%;font-family:&#39;Times New Roman&#39;,serif">Infrastructure security for clouds</span></p>

<p class=""><b><span style="font-size:10pt">Schedule </span></b><span style="font-size:10pt"></span></p>

<p class=""><span style="font-size:10pt">Submission due date: Sep. 15,
2014 </span></p>

<p class=""><span style="font-size:10pt">Notification of acceptance:
Dec. 15, 2015 </span></p>

<p class=""><span style="font-size:10pt">Submission of final manuscript:
Feb. 15, 2015 </span></p>

<p class="MsoNormal"><span style="font-size:10pt;line-height:115%">Publication
date: 2nd Quarter, 2015 (Tentative)</span></p>

<p class="">&nbsp;</p>

<p class=""><b><span style="font-size:10pt">Submission &amp; Major
Guidelines </span></b><span style="font-size:10pt"></span></p>

<p class="" style="text-align:justify"><span style="font-size:10pt">The special issue invites original research manuscripts
which have significant contributions to the various topics in &ldquo;Security and
Privacy Protection on Cloud&rdquo;. The manuscripts submitted first time are
encouraged and they must not have been previously published or submitted for
journal or conference elsewhere. Extended work must have significant number of
&quot;new and original&quot; ideas/contributions along with more than 49% brand
&quot;new&quot; material. Every submitted paper will receive at least three
reviews. The editorial review committee will include well known experts in the
area. Submissions must be directly submitted via the IEEE TCC submission web
site at <i><a href="https://mc.manuscriptcentral.com/tcc-cs">https://mc.manuscriptcentral.com/tcc-cs</a></i>,
and must follow instructions for formatting and length listed there. </span></p>

<p class=""><span style="font-size:10pt">&nbsp;</span></p>

<p class="MsoNormal"><span style="font-size:10pt;line-height:115%">For
additional information, please contact Meikang Qiu, qiumeikang<i>@<a href="http://gmail.com">gmail.com</a>.</i></span></p>

<p class=""><b><span style="font-size:10pt">Selection and Evaluation
Criteria </span></b><span style="font-size:10pt"></span></p>

<p class=""><span style="font-size:10pt">- Relevance to the topics of
this special issue </span></p>

<p class=""><span style="font-size:10pt">- Significance to the areas of
IEEE Transactions on Cloud Computing</span></p>

<p class=""><span style="font-size:10pt">- Novelty, new techniques, and
impact of the research</span></p>

<p class=""><span style="font-size:10pt">- Quality of the contents</span></p>

<p class=""><span style="font-size:10pt">- Readability of the article</span></p>

<p class=""><span style="font-size:10pt">- Sufficiency of references and
related work </span></p>

<p class=""><span style="font-size:10pt">- New and original work, first
submission </span></p>

<p class=""><span style="font-size:10pt">&nbsp;</span></p>

<p class=""><b><span style="font-size:10pt">Editor-in-Chief </span></b><span style="font-size:10pt"></span></p>

<p class=""><span style="font-size:9pt">Rajkumar Buyya, The University
of Melbourne, Australia </span></p>

<p class=""><span style="font-size:9pt">&nbsp;</span></p>

<p class=""><b><span style="font-size:10pt">Guest Editors </span></b><span style="font-size:10pt"></span></p>

<p class=""><span style="font-size:10pt">Meikang Qiu,
<a href="mailto:meikang.qiu@sjsu.edu">meikang.qiu@sjsu.edu</a>, San Jose State University, California, USA </span></p>

<p class=""><span style="font-size:10pt">Sun-Yuan Kung, </span><a href="mailto:kung@Princeton."><span style="font-size:10pt;color:black;text-decoration:none">kung@Princeton.</span></a><span style="font-size:10pt">edu, Princeton University, USA</span></p>
</div>