We are happy to announce the finalists of the UCC Cloud Challenge, that will be presented in the UCC Cloud session of the UCC 2018 Conference. First the finalists will present their solutions to the audience. After the presentations, life demonstrations of the solutions are given. Full conference and daytickets are available from the main conference's registration site.
|11:30 - 11:35||
Welcome and Introduction by the Challenge Chairs
|11:35 - 12:00||
Security Governance as a Service on the CloudThe increasing number of security attacks is placing organizations in difficulty, especially SMEs. Their workload is exacerbated by information handling obligations imposed by insurance companies as part of cyber-insurance contracts, and by regulation like the GDPR. This situation requires that security and compliance be providable as an external cloud service that SMEs can connect their IT infrastructure to. This paper proposes a cloud model for this purpose. The increasing number of security attacks is placing organizations in difficulty, especially SMEs. Their workload is exacerbated by information handling obligations imposed by insurance companies as part of cyber-insurance contracts, and by regulation like the GDPR. This situation requires that security and compliance be providable as an external cloud service that SMEs can connect their IT infrastructure to. This paper proposes a cloud model for this purpose.
|12:00 - 12:25||
Andrey Brito, Christof Fetzer, Stefan Köpsell, Marcelo Pasin, Pascal Felber, Keiko Fonseca, Marcelo Rosa, Luiz C. Gomes Jr., Rodrigo Riella, Charles Prado, Daniel Rötter, Márton Sipos, László Nagy, Marcell Fehér and Peter Pietzuch.
Secure End-to-End Processing of Smart Grid DataCloud computing considerably reduces the costs of deploying applications through on-demand, automated, and fine- granular allocation of resources. Even in private settings, cloud computing platforms enable agile and self-service management, which means that physical resources are shared more efficiently. Nevertheless, using shared infrastructures also creates more opportunities for attacks and data breaches. In this paper, we describe the SecureCloud approach. The SecureCloud project aims to enable confidentiality and integrity of data and applica- tions running in potentially untrusted cloud environments. The project leverages technologies such as Intel SGX, OpenStack and Kubernetes to provide a cloud platform that supports secure applications. In addition, the project provides tools that help generating cloud-native, secure applications and services to be deployed on potentially untrusted clouds. The results have been validated in the smart grid scenario and enabled a data workflow that is protected end-to-end: from the collection of data to the generation of high-level information such as fraud alerts.
|12:25 - 13:00||Life Demonstration of the Solutions
Cloud Challenge is a competition where participants present solutions that utilize Cloud technologies. Proposals may range from exploratory approaches to real-world problems benefiting from private, public, or hybrid Clouds extending to Fog and Edge computing. This year, we especially encourage proposals with focus on security.
The authors of the best cloud challenge submission and presentation, as determined by a jury, will be awarded a CHF 1000 voucher for cloud resources and managed services at the APPUiO.ch Swiss Container Platform, sponsored by VSHN AG.
Nowadays, a wide range of Cloud technologies are available, ranging from containerized applications to XaaS in decentralized Cloud environments. We invite the submission of proposals related to various aspects of Cloud computing elucidating novel approaches for extending features of technologies and/or for advancing paradigms. Suggested topics include, but are not limited to:
The competitors should outline the nature of the problem that might range from business, science to socio-lifestyle applications. The solutions need to be implemented and authors should present the methodology used to solve the problem and the means of validation of the solution. Important evaluation criteria are impact, novelty, soundness of the approach, consideration of security and good scientific practice (reproducibility, open source/access). The competitors must be able to demonstrate their approach at UCC 2018, if selected, using an appropriate means e.g. a live demo, a simulation, emulation, or similar.
Authors are asked to prepare their manuscripts according to the IEEE format for conference proceedings.
Submitted manuscripts should be structured as technical papers and may not exceed 6 pages (letter-size 8.5'' x 11'') including figures, tables and references.The initial submission needs to be in pdf format. Submitted papers must represent original unpublished research that is not currently under review for any other conference or journal. We strongly encourage authors to consider open source code and open data wherever possible. Manuscripts must be submitted to the submission online system EasyChair no later than the indicated submission deadline.
Please register for an account as author if you do not already have one. If you cannot access the submission website or have difficulties completing your submission, please contact the workshop chairs for assistance. All papers will be reviewed by at least 2 independent reviewers from the international program committee. Papers will be selected based on their originality, their interest for the research community, the quality of the use-case description, the description of the technical solution, the impact of the application and/or technical description and the status of the work.Proposals will be reviewed according to the criteria listed above and should present unpublished work that it is not under consideration for publication elsewhere. At least one member from each selected team is expected to give a technical talk and provide a demonstration of the system.