An investigation of geographic mapping techniques for internet hosts
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Towards IP geolocation using delay and topology measurements
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement
Constraint-based geolocation of internet hosts
IEEE/ACM Transactions on Networking (TON)
Pors: proofs of retrievability for large files
Proceedings of the 14th ACM conference on Computer and communications security
Provable data possession at untrusted stores
Proceedings of the 14th ACM conference on Computer and communications security
The complexity of online memory checking
Journal of the ACM (JACM)
Compact Proofs of Retrievability
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
CRYPTO '09 Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology
Assessing the geographic resolution of exhaustive tabulation for geolocating internet hosts
PAM'08 Proceedings of the 9th international conference on Passive and active network measurement
Multiobjective monitoring for SLA compliance
IEEE/ACM Transactions on Networking (TON)
CloudCmp: comparing public cloud providers
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
Dude, where’s that IP?: circumventing measurement-based IP geolocation
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop
Geolocation of data in the cloud
Proceedings of the third ACM conference on Data and application security and privacy
Towards secure provenance-based access control in cloud environments
Proceedings of the third ACM conference on Data and application security and privacy
Towards self-repairing replication-based storage systems using untrusted clouds
Proceedings of the third ACM conference on Data and application security and privacy
Designing a Secure Cloud Architecture: The SeCA Model
International Journal of Information Security and Privacy
Cost models - pillars for efficient cloud computing: position paper
International Journal of Intelligent Systems Technologies and Applications
Data-Intensive Cloud Computing: Requirements, Expectations, Challenges, and Solutions
Journal of Grid Computing
Hi-index | 0.00 |
In this paper we define the problem and scope of data sovereignty - the coupling of stored data authenticity and geographical location in the cloud. Establishing sovereignty is an especially important concern amid legal and policy constraints when data and resources are virtualized and widely distributed. We identify the key challenges that need to be solved to achieve an effective and un-cheatable solution as well as propose an initial technique for data sovereignty.