FOCS '03 Proceedings of the 44th Annual IEEE Symposium on Foundations of Computer Science
Ciphertext-Policy Attribute-Based Encryption
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Over-encryption: management of access control evolution on outsourced data
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Controlling data in the cloud: outsourcing computation without outsourcing control
Proceedings of the 2009 ACM workshop on Cloud computing security
A case for the accountable cloud
ACM SIGOPS Operating Systems Review
Zero-knowledge sets with short proofs
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
Enabling public verifiability and data dynamics for storage security in cloud computing
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Achieving secure, scalable, and fine-grained data access control in cloud computing
INFOCOM'10 Proceedings of the 29th conference on Information communications
Communications of the ACM
Dude, where’s that IP?: circumventing measurement-based IP geolocation
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing
CLOUDCOM '10 Proceedings of the 2010 IEEE Second International Conference on Cloud Computing Technology and Science
Achieving fine-grained access control for secure data sharing on cloud servers
Concurrency and Computation: Practice & Experience
Windows Azure Storage: a highly available cloud storage service with strong consistency
SOSP '11 Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
Mercurial commitments with applications to zero-knowledge sets
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
SP 800-145. The NIST Definition of Cloud Computing
SP 800-145. The NIST Definition of Cloud Computing
GeoProof: Proofs of Geographic Location for Cloud Computing Environment
ICDCSW '12 Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops
DLAS: Data Location Assurance Service for cloud computing environments
PST '12 Proceedings of the 2012 Tenth Annual International Conference on Privacy, Security and Trust (PST)
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop
Geolocation of data in the cloud
Proceedings of the third ACM conference on Data and application security and privacy
Hi-index | 0.00 |
In the cloud storage environment, the geographic location of the data has profound impacts on its privacy and security; it is due to the fact that the data stored on the cloud will be subject to the laws and regulations of the country where it is physically stored. This is one of the main reasons why companies that deal with sensitive data (e.g., health related data) cannot adopt cloud storage solutions. In order to ensure the rapid growth of cloud computing, we need a data location assurance solution which not only works for existing cloud storage environments but also influences those companies to adopt cloud storage solutions. In this paper, we present a Data Location Assurance Service (DLAS) solution for the well-known, honest-but-curious server model of the cloud storage environment; the proposed DLAS solution facilitates cloud users not only to give preferences regarding their data location but also to receive verifiable assurance about their data location from the Cloud Storage Provider (CSP). This paper also includes a detailed security and performance analysis of the proposed DLAS solution. Unlike other solutions, the DLAS solution allows a user to give a negative location preference regarding his/her data and works for CSPs (e.g., Windows Azure) that practice geo-replication of data (to ensure availability of data in case of natural disasters). Our proposed DLAS solution is based on cryptographic primitives such as zero knowledge sets protocol and ciphertext-policy attribute based encryption. According to the best of our knowledge, we are the first to propose a nongeolocation based solution of this kind.