2017
DOI: 10.1186/s13677-017-0095-y
|View full text |Cite
|
Sign up to set email alerts
|

Landmark-based data location verification in the cloud: review of approaches and challenges

Abstract: Data storage on the cloud is growing every day and many companies, administrations, and individuals are now outsourcing storage of their data to large-scale Cloud Service Providers (CSP). However, because of today's cloud infrastructure virtualization, data owners cannot easily know the location where their data are stored. Even in case of the establishment of a strong Service-Level Agreement, which includes an initial guarantee regarding data location, the CSP may then move data to another location, like anot… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 14 publications
0
6
0
Order By: Relevance
“…Occasionally, these agents are also portrayed as the contributors, facilitators, or difference-makers to the sovereignty of some agent or other, e.g. when commentators observe: “ China’s Cybersecurity Law took effect in 2017 embodying the state’s commitment to ‘data sovereignty’” (Kuner et al., 2019: 1); when they demand: “Data sovereignty: governments must provide and enforce laws to guarantee data independence to their citizens and companies in order to avoid particularly data access by foreign authorities” (Irain et al., 2017: 2); or when they note that “ patients always have data sovereignty and further parties like care providers or researchers are only involved if desired by patients ” (Dehling and Sunyaev, 2014: 89).…”
Section: Resultsmentioning
confidence: 99%
“…Occasionally, these agents are also portrayed as the contributors, facilitators, or difference-makers to the sovereignty of some agent or other, e.g. when commentators observe: “ China’s Cybersecurity Law took effect in 2017 embodying the state’s commitment to ‘data sovereignty’” (Kuner et al., 2019: 1); when they demand: “Data sovereignty: governments must provide and enforce laws to guarantee data independence to their citizens and companies in order to avoid particularly data access by foreign authorities” (Irain et al., 2017: 2); or when they note that “ patients always have data sovereignty and further parties like care providers or researchers are only involved if desired by patients ” (Dehling and Sunyaev, 2014: 89).…”
Section: Resultsmentioning
confidence: 99%
“…Pratical approaches for GLV encompass: distance-bounding protocols [59], landmark-based geolocation [63], [70], and IP address mapping based geolocation [64]- [67], topology-aware geolocation [68]- [69], and hardware-based geolocation [56], [60]- [62].…”
Section: F Vnfs' Geographical Location Verificationmentioning
confidence: 99%
“…Landmark-based geolocation techniques [63], [70] assume a correlation or mapping between network metrics (e.g., Round Time Trip, hop counts, bandwidth, etc.) and geographic distance.…”
Section: F Vnfs' Geographical Location Verificationmentioning
confidence: 99%
“…A distance is associated to RTT value. Among the proposed DLV approaches, we select three, which are representative in the field of data location verification [12].…”
Section: Overview Of DLV Approachesmentioning
confidence: 99%
“…Users can either trust the CSP and there is no data location verification problem, or assume that the CSP can be malicious and store data in an inappropriate location and they have to deploy mechanisms enabling data location verification at any time. Huge approaches addressing this problem were proposed in literature [12]. Three DLV (data location verification) approaches classes are commonly distinguished:…”
Section: Introductionmentioning
confidence: 99%