Cloud Computing Automated Clustering of Virtual Machines based on Correlation of Resource Usage/Open Call Articles Detection of Malware Attacks on Virtual Machines for a Self-Heal Approach in Cloud Computing using VM Snapshots/Open Call Articles Layer-based Privacy and Security Architecture for Cloud Data Sharing/Open Call Articles An Efficient Hierarchical Multi-Authority Attribute Based Encryption Scheme for Profile Matching using a Fast Ate Pairing in Cloud Environment/Open Call Articles Security Enhancement in Cloud Environment using Secure Secret Key Sharing/Special Issue