CFP last date
22 April 2024
Reseach Article

Data Location Verification in Cloud Computing

by Abhishek Vaish, Abhishek Kushwaha, Rahul Das, Chandan Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 68 - Number 12
Year of Publication: 2013
Authors: Abhishek Vaish, Abhishek Kushwaha, Rahul Das, Chandan Sharma
10.5120/11632-7104

Abhishek Vaish, Abhishek Kushwaha, Rahul Das, Chandan Sharma . Data Location Verification in Cloud Computing. International Journal of Computer Applications. 68, 12 ( April 2013), 23-27. DOI=10.5120/11632-7104

@article{ 10.5120/11632-7104,
author = { Abhishek Vaish, Abhishek Kushwaha, Rahul Das, Chandan Sharma },
title = { Data Location Verification in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 68 },
number = { 12 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 23-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume68/number12/11632-7104/ },
doi = { 10.5120/11632-7104 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:27:39.967650+05:30
%A Abhishek Vaish
%A Abhishek Kushwaha
%A Rahul Das
%A Chandan Sharma
%T Data Location Verification in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 68
%N 12
%P 23-27
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing has pioneered the area of On-demand services. The customer can choose the resources according to the current needs with the facility of incrementing and decrementing the resources in the future. It generally follows a pay-as-you-use model which has proven beneficial for enterprises and individual users alike. Since the services are hosted over the internet, one of the recent concerns that are rising among the users is about the location of their data. Sometimes it is necessary for the data to stay in a particular jurisdiction. Therefore, it may be required for the organization to verify the location of their data from time to time. Here in this paper we propose a mechanism based on remote attestation technology of trusted platform module. Remote attestation technique is used to validate the current location of the data, and the generated result is passed to the user/verifier. The very fact that the trusted platform module is tamper proof provides the basis for the accuracy of the result.

References
  1. Dimitrios Zissis and Dimitrios Lekkas, Addressing cloud computing security issues, Future Generation Computer Systems Vol. 28, No. 3, pp. 583–592, March 2012.
  2. Krishana P. N. Puttaswamy, Christopher Kruegel and Ben Y. Zhao, "Silverline: Towards Data Confidentiality in Storage-Intensive Cloud Applications", Second ACM Symposium on Cloud Computing, Oct 2011.
  3. Trusted Computing Group, (2013, February 2). Trusted Computing Group - Trusted Computing [Online] Available: http://www. trustedcomputinggroup. org/trusted_computing
  4. Infineon Technologies AG. (2006, May 4). Infineon's Trusted Platform Module, [Online] Available: http://www. silicon-trust. com/trends/comp_tpm. asp
  5. Bill Hewitt. (2013, February 2). Trusted Computing and the Trusted Platform Module: What All the Fuss Is About [Online] Available: http://www. cs. hmc. edu/~mike/public_html/courses/security/s06/projects/bill. pdf
  6. George Coker et al. , Principles of remote attestation, Int. J. of Info. Sec. , Volume 10, No. 2, pp. 63-81, June 2011.
  7. Windows Azure CDN Node Locations, [Online] Available: http://msdn. microsoft. com/en-us/library/windowsazure/gg680302. aspx
  8. Zachary N. J. Peterson, Mark Gondree, Robert Beverly, "A Position Paper on Data Sovereignty: The Importance of Geolocating Data in the Cloud", HotCloud '11, Portland, OR, June 2011.
  9. Aiiad Albeshri, Colin Boyd and Juan Gonzalez Nieto, GeoProof: Proofs of Geographic Location for Cloud Computing Environment, Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops 2012, , Macau, China, pp. 506-514.
  10. Ali Noman and Carlisle Adams, DLAS: Data Location Assurance Service for Cloud Computing Environments, Tenth Annual International Conference on Privacy, Security and Trust (PST), July 2012.
  11. Thorsten Ries, Volker Fusenig, Christian Vilbois and Thomas Engel, Verification of Data Location in Cloud Networking, Fourth IEEE International Conference on Utility and Cloud Computing (UCC), Dec 2011.
  12. Achemlal, M. , Gharout, S. , Gaber, C. , Trusted Platform Module as an Enabler for Security in Cloud Computing, Conference on Network and Information Systems Security (SAR-SSI), pp. 1-6, 2011.
  13. Bertholon, B. , Varrette, S. , Bouvry, P. , Certicloud: A Novel TPM-based Approach to Ensure Cloud IaaS Security, IEEE International Conference on Cloud Computing (CLOUD), pp. 121-130, 2011.
  14. Dongxi, Liu. , Lee, J. , Jang, J. , Nepal, S. , Zic, J. , A Cloud Architecture of Virtual Trusted Platform Modules, 8th International Conference on Embedded and Ubiquitous Computing (EUC), pp. 804 – 811, 2010.
  15. Tessa Finlayson, (2009, June 3) Cloud Computing & Data Protection [Online] Available: http://www. twobirds. com/English/News/Articles/Pages/Cloud_Computing_Data_Protection_030609. Aspx
  16. Zaigham Mahmood, Data Location and Security Issues in Cloud Computing, International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), Sept 2011.
  17. Confederation of Indian Industry, "The Indian Cloud Revolution", CII, New Delhi, 2012.
  18. Will Knight, (2009, August 17), Energy-Aware Internet Routing [Online] Available: http://www. technologyreview. com/news/414771/energy-aware-internet-routing/page/2/
  19. Francoise Gilbert. (2011, April 10) Server Location: A Significant Factor in Cloud Computing Services [Online] Available: http://www. francoisegilbert. com/2011/04/cloud-computing-legal-issues-data-location/
  20. Data Protection Working Party, (2012 July) Article 29: Opinion 05/2012 on Cloud Computing [Online] Available: http://ec. europa. eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2012/wp196_en. pdf
  21. Guidelines for processing personal data across borders, Office of the Privacy Commissioner of Canada, Canada, Jan. 2009.
  22. Office of the Victorian Privacy Commissioner, 2011 May, Information Sheet: Cloud Computing, [Online] Available: http://www. privacy. vic. gov. au/privacy/web2. nsf/files/cloud-computing/$file/info_sheet_03_11. pdf
  23. Zack Whittaker, (2011, April 26), Case study: How the USA PATRIOT Act can be used to access EU data [Online] Available: http://www. zdnet. com/blog/igeneration/case-study-how-the-usa-patriot-act-can-be-used-to-access-eu-data/8805
Index Terms

Computer Science
Information Sciences

Keywords

Trusted Platform Module Data security Remote attestation Data location