The Technical Program 8:30 – 10:00 Opening and Keynote, Chair Dr Shui Yu, Deakin University, Australia Dr Wenjin Lou, Toward Privacy-Assured Searchable Cloud Data Services 10:00- 10:30 Coffee break 10:30 – 12:00 Security in Big Data 1, Chair Xiaodong Lin, University of Ontario Institute of Technology, Canada Tackling the Big Data 4 Vs for Anomaly Detection José Camacho (University of Granada, Spain); Gabriel Maciá-Fernández (University of Granada, Spain); Jesús E. Díaz-Verdejo (Universidad de Granada, Spain); Pedro García-Teodoro (University of Granada, Spain) Behavioral Analytics for Inferring Large-Scale Orchestrated Probing Events Elias Bou-Harb (National Cyber-Forensics and Training Alliance & Concordia University, Canada); Mourad Debbabi (Concordia University, Montreal, Canada); Chadi Assi (Concordia University, Canada) Loxin -- A Solution to Password-less Universal Login Bo Zhu (University of Waterloo, Canada); Xinxin Fan (University of Waterloo, Canada); Guang Gong (University of Waterloo, Canada) Hashdoop: A MapReduce Framework for Network Anomaly Detection Romain Fontugne (National Institute of Informatics, Japan); Johan Mazel (National Institute of Informatics, Japan); Kensuke Fukuda (National Institute of Informatics, Japan) 12:00- 13:30 Lunch break 13:30 – 15:00 Privacy in Big Data, Chair Dr Peng Li, The University of Aizu, Japan Achieving Big Data Privacy via Hybrid Cloud Xueli Huang (Temple University, USA); Xiaojiang Du (Temple University, USA) MACA: A PrivacyPreserving Multi-factor Cloud Authentication System Utilizing Big Data Wenyi Liu (Georgia Tech, USA); A. Selcuk Uluagac (Georgia Institute of Technology, USA); Raheem Beyah (Georgia Institute of Technology, USA) 1 Load Balancing for Privacy-Preserving Access to Big Data in Cloud Peng Li (The University of Aizu, Japan); Song Guo (The University of Aizu, Japan) HVSTO: Efficient Privacy Preserving Hybrid Storage in Cloud Data Center Mianxiong Dong (National Institute of Information and Communications Technology, Japan); He Li (Huazhong University of Science and Technology, P.R. China); Kaoru Ota (Muroran Institute of Technology, Japan); Haojin Zhu (Shanghai Jiao Tong University, P.R. China) 15:00 – 15:30 Coffee break 15:30 – 17:30 Security in Big Data 2, Prof Jun Shao, Zhejiang Gongshang University, China Active Deception Model for Securing Cloud Infrastructure Albert Brzeczko, Jr (Georgia Institute of Technology, USA); A. Selcuk Uluagac (Georgia Institute of Technology, USA); Raheem Beyah (Georgia Institute of Technology, USA); John A. Copeland (Georgia Institute of Techonology, USA) Conditional Proxy ReEncryption for Secure Big Data Group Sharing in Cloud Environment Junggab Son (Hanyang university, Korea); Donghyun Kim (North Carolina Central University, USA); Rasheed Hussain (Hanyang University, Korea); Heekuck Oh (Hanyang University, Korea) Characterising User Targeting For In-App Mobile Ads Imdad Ullah (University of New South Wales, Australia); Roksana Boreli (National ICT Australia, Australia); Mohamed-Ali Kaafar (INRIA France, France); Salil Kanhere (The University of New South Wales, Australia) Automatic Objects Removal for Scene Completion Jianjun Yang (University of North Georgia, USA); Yin Wang (Lawrence Technological University, USA); Honggang Wang (University of Massachusetts, Dartmouth, USA); Kun Hua (Lawrence Technological University, USA); Wei Wang (South Dakota State University, USA); Ju Shen (University of Kentucky, USA) A Hierarchical Clustering Method For Big Data Oriented Ciphertext Search Chi Chen (Institute of Information Engineering, P.R. China); Xiaojie Zhu (Institute of Information Engineering, CAS, P.R. China); Peisong Shen (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China); Jiankun Hu (University of New South Wales, Australia) 2