ICCCS 2018

Welcome to ICCCS2018

The 4th International Conference on Cloud Computing and Security (ICCCS 2018) will be held in Haikou, China, from 8-10, June 2018. The objective of ICCCS 2018 is to provide a forum for researchers, academicians, engineers, industrial professionals, students and government officials involved in the general areas of information security and cloud computing, etc. to disseminate their latest research results and exchange views on the future research directions of these fields.

We sincerely expect you would join us in June 2018 in Haikou, China at the 4th International Conference on Cloud Computing and Security (ICCCS 2018).


Up to now, the ICCCS 2018 can invite 200 outstanding papers for possible publication in 16 SCI-indexed journals.

Outstanding papers will be invited for possible publication in SCI-indexed journals.

The Call for workshop proposals has been released.

Important Dates

Paper submission deadline March 25, 2018
Author notification April 20, 2018
Final manuscript and Registration due April 30, 2018
Conference date June 8-10, 2018

Call for papers

The conference focuses on all aspects of cloud computing and security. The topics of interests include, but not limited to:
1. Cloud Computing
Cloud Computing Architecture and Systems
Cloud Computing Models, Simulations, Designs, and Paradigms
Cloud Management and Operations
Dynamic Resource Provision and Consuming
Cloud Computing Technologies, Services and Applications
2. Cloud Security
Security Evaluation and Benchmarks Based on Cloud
Security Policy, Security Theory and Models Based on Big Data
Authentication, Authorization and Reliability Issues in Cloud
Security and Privacy in Cloud Computing
Information Security and Risks Management
Machine Learning for Security
3. Information Hiding
Coverless Information Hiding
Steganography and Steganalysis
Digital Watermarking, Fingerprinting and Forensics
Multimedia Authentication and Encryption
Covert/Subliminal Channels
4. IoT Security
Data Security and Privacy in the IoT
Attacks and Countermeasures on IoT Systems
Trust Model, Data Aggregation and Information Sharing
Secure Hardware and Software for IoT
Application Security for IoT
5. Multimedia Forensics
Active and Passive Forensics
Big Data Forensics
Portable electronic device forensics
Network Forensics
6. Encryption
Measurements for Cybersecurity
Post Quantum Cybersecurity
Visualization for Security
Applied Cryptography
Language-based Security


Outstanding papers will be invited for possible publication in the following SCI-indexed journals:
Ad hoc networks
Computers, Materials & Continua
Computer Modeling in Engineering & Sciences
EURASIP Journal on Wireless Communications and Networking
IEEE Access
IETE Technical Review
International Journal of Sensor Networks
Journal of Internet Technology
Journal of network and computer applications
Multimedia Tools and Applications
Neural Computing and Applications
Soft Computing
Wireless Communications and Mobile Computing
World Wide Web

All the accepted papers will be published as a post-proceedings in Springer-Verlag's Lecture Notes in Computer Science (LNCS) series and indexed by EI.

SCI Indexed Journals

5. IEEE Access
ISSN: 2169-3536
6. IETE Technical Review
ISSN: 0256-4602
13. Sensors
ISSN: 1424-8220
14. Soft Computing
ISSN: 1432-7643
16. World Wide Web
ISSN: 1386-145X