DLoc: Distributed Auditing for Data Location Compliance in Cloud

被引:2
|
作者
Eskandari, Mojtaba [1 ]
Crispo, Bruno [1 ,2 ]
de Oliveira, Anderson Santana [3 ]
机构
[1] Univ Trento, DISI, Trento, Italy
[2] KULeuven, DistrNet, Leuven, Belgium
[3] SAP Labs, Sophia Antipolis, France
基金
欧盟地平线“2020”;
关键词
Smartphone; Data transfer; Privacy protection; Jurisdiction policy; GEOLOCATION;
D O I
10.1007/978-3-319-67816-0_12
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The prevalence of mobile devices and their capability to access high speed Internet has transformed them into a portable pocket cloud interface. In order to protect user's privacy, the European Union Data Protection regulations restricts the transfer of European users' personal data within the geographical boundaries of the European Union itself. The matter of concern, however, is the enforcement of such regulations. Since cloud service provision is independent of physical location and data can travel to various servers, it is a challenging task to determine the location of data and enforce jurisdiction policies. In this paper we introduce a framework, named DLoc, which enables the end-users to track the location of their data after being transferred to the cloud. DLoc does not require a network of monitoring servers (landmarks) and does not need to reside and run within the target server. It uses a proof of data possession technique to guarantee that the cloud storage service possess the particular file and estimates its location(s) in a distributed manner without requiring the collaboration of the data controller or cloud provider. Empirical evaluations demonstrate that DLoc provides a better accuracy than its rival approaches in real world scenarios.
引用
收藏
页码:202 / 218
页数:17
相关论文
共 50 条
  • [1] Location, Location, Location: Data-Intensive Distributed Computing in the Cloud
    Luckeneder, Michael
    Barker, Adam
    2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 647 - 654
  • [2] Auditing a Cloud Provider's Compliance With Data Backup Requirements: A Game Theoretical Analysis
    Ismail, Ziad
    Kiennert, Christophe
    Leneutre, Jean
    Chen, Lin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (08) : 1685 - 1699
  • [3] Effective Data Storage and Dynamic Data Auditing Scheme for Providing Distributed Services in Federated Cloud
    Sermakani, A. M.
    Paulraj, D.
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2020, 29 (16)
  • [4] Embedding a Distributed Auditing Mechanism in the Service Cloud
    Alqahtani, S.
    Gamble, R.
    2014 IEEE WORLD CONGRESS ON SERVICES (SERVICES), 2014, : 69 - 76
  • [5] Cloud data auditing with designated verifier
    Solomon Guadie Worku
    Chunxiang Xu
    Jining Zhao
    Frontiers of Computer Science, 2014, 8 : 503 - 512
  • [6] Public Auditing: Cloud Data Storage
    Parwekar, Pritee
    Saxena, Mayuri
    Kumar, Prakash
    Saxena, Sakshi
    2014 5TH INTERNATIONAL CONFERENCE CONFLUENCE THE NEXT GENERATION INFORMATION TECHNOLOGY SUMMIT (CONFLUENCE), 2014, : 169 - 173
  • [7] Public Data Auditing with Constrained Auditing Number for Cloud Storage
    Yang, Guangyang
    Xia, Hui
    Shen, Wenting
    Jiang, Xiuxiu
    Yu, Jia
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 21 - 32
  • [8] Secure Auditing and Deduplicating Data in Cloud
    Li, Jingwei
    Li, Jin
    Xie, Dongqing
    Cai, Zhang
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) : 2386 - 2396
  • [9] Cloud data auditing with designated verifier
    Worku, Solomon Guadie
    Xu, Chunxiang
    Zhao, Jining
    FRONTIERS OF COMPUTER SCIENCE, 2014, 8 (03) : 503 - 512
  • [10] Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack
    Madi, Taous
    Majumdar, Suryadipta
    Wang, Yushun
    Jarraya, Yosr
    Pourzandi, Makan
    Wang, Lingyu
    CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, : 195 - 206