IEEE Transactions on Cloud Computing, Special Issue on "Cloud Security
(Due 31 March 2015)
Editors: Kim-Kwang Raymond Choo, University of South Australia
(Australia); Omer Rana, Cardiff University (UK); Muttukrishnan
Rajarajan, City University London (UK)

As the use of cloud computing grows throughout society in general, it
is essential that cloud service providers and cloud service users
ensure that security and privacy safeguards are in place. There is,
however, no perfect security and when a cybersecurity incident occurs,
digital investigation will require the identification, preservation
and analysis of evidential data.

This special issue is dedicated to the identification of techniques
that enable security mechanisms to be engineered and implemented in
Cloud-based systems. A key focus will be on the integration of
theoretical foundations with practical deployment of security
strategies that make Cloud systems more secure for both end users and
providers - enabling end users to increase the level of trust they
have in Cloud providers - and conversely for Cloud service providers
to provide greater guarantees to end users about the security of their
services and data. Significant effort has been invested in performance
engineering of Cloud-based systems, with a variety of research-based
and commercial tools that enable autoscaling of Cloud systems,
mechanisms for supporting Service Level Agreement-based provisioning
and adaptation and more recently for supporting energy management of
large scale data centres. This special issue will be devoted to
understanding whether a similar engineering philosophy can be extended
to support security mechanisms, and more importantly, whether
experience from the performance engineering community (who often need
to carry out analysis on large log files) can be carried over into the
security domain.

We encourage authors to be exploratory in their papers - reporting on
novel use of performance engineering tools that could be repurposed
for supporting security management and vice versa.

Topics of interest include:
* Advanced security features
* Anonymity
* Cloud forensic and anti-forensic techniques and implementations
* Cloud privacy
* Cloud-based honeypots
* Cloud-based intrusion detection and prevention systems
* Distributed authentication and authentication
* Implementation of cryptographic and key management strategies in
  clouds (e.g. homomorphic encryption for cloud computing)
* Multi-Cloud security provisioning
* Real time analysis of security (log) data for alert generation
* Remote collection of evidence (e.g. from cloud servers)
* Security-focused Service Level Agreements

For more information, please visit


Elsevier Journal of Computer and System Sciences, Special Issue on
"Cyber Security in the Critical Infrastructure: Advances and Future
Directions" (Due 31 August 2015)

Editors: Jemal Abawajy, Deakin University (Australia); Kim-Kwang
Raymond Choo, University of South Australia (Australia); Rafiqul
Islam, Charles Sturt University (Australia)

This special issue invites original research papers that reports on
state-of-the-art and recent advancements in securing our critical
infrastructure and cyberspace, with a particular emphasis on novel
techniques to build resilient critical information infrastructure.

Topics of interest include but are not limited to

* Cyber security mitigation techniques for critical infrastructures
  such as banking and finance, communications, emergency services,
  energy, food chain, health, mass gatherings, transport and water;
* Cyber threat modelling and analysis;
* Cyber forensics;
* Visual analytics and risk management techniques for cyber security; and
* Cyber security test beds, tools, and methodologies.

For more information, please visit