Call for Paper - October 2019 Edition
IJCA solicits original research papers for the October 2019 Edition. Last date of manuscript submission is September 20, 2019. Read More

Data Location Verification in Cloud Computing

International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 68 - Number 12
Year of Publication: 2013
Abhishek Vaish
Abhishek Kushwaha
Rahul Das
Chandan Sharma

Abhishek Vaish, Abhishek Kushwaha, Rahul Das and Chandan Sharma. Article: Data Location Verification in Cloud Computing. International Journal of Computer Applications 68(12):23-27, April 2013. Full text available. BibTeX

	author = {Abhishek Vaish and Abhishek Kushwaha and Rahul Das and Chandan Sharma},
	title = {Article: Data Location Verification in Cloud Computing},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {68},
	number = {12},
	pages = {23-27},
	month = {April},
	note = {Full text available}


Cloud computing has pioneered the area of On-demand services. The customer can choose the resources according to the current needs with the facility of incrementing and decrementing the resources in the future. It generally follows a pay-as-you-use model which has proven beneficial for enterprises and individual users alike. Since the services are hosted over the internet, one of the recent concerns that are rising among the users is about the location of their data. Sometimes it is necessary for the data to stay in a particular jurisdiction. Therefore, it may be required for the organization to verify the location of their data from time to time. Here in this paper we propose a mechanism based on remote attestation technology of trusted platform module. Remote attestation technique is used to validate the current location of the data, and the generated result is passed to the user/verifier. The very fact that the trusted platform module is tamper proof provides the basis for the accuracy of the result.


  • Dimitrios Zissis and Dimitrios Lekkas, Addressing cloud computing security issues, Future Generation Computer Systems Vol. 28, No. 3, pp. 583–592, March 2012.
  • Krishana P. N. Puttaswamy, Christopher Kruegel and Ben Y. Zhao, "Silverline: Towards Data Confidentiality in Storage-Intensive Cloud Applications", Second ACM Symposium on Cloud Computing, Oct 2011.
  • Trusted Computing Group, (2013, February 2). Trusted Computing Group - Trusted Computing [Online] Available: http://www. trustedcomputinggroup. org/trusted_computing
  • Infineon Technologies AG. (2006, May 4). Infineon's Trusted Platform Module, [Online] Available: http://www. silicon-trust. com/trends/comp_tpm. asp
  • Bill Hewitt. (2013, February 2). Trusted Computing and the Trusted Platform Module: What All the Fuss Is About [Online] Available: http://www. cs. hmc. edu/~mike/public_html/courses/security/s06/projects/bill. pdf
  • George Coker et al. , Principles of remote attestation, Int. J. of Info. Sec. , Volume 10, No. 2, pp. 63-81, June 2011.
  • Windows Azure CDN Node Locations, [Online] Available: http://msdn. microsoft. com/en-us/library/windowsazure/gg680302. aspx
  • Zachary N. J. Peterson, Mark Gondree, Robert Beverly, "A Position Paper on Data Sovereignty: The Importance of Geolocating Data in the Cloud", HotCloud '11, Portland, OR, June 2011.
  • Aiiad Albeshri, Colin Boyd and Juan Gonzalez Nieto, GeoProof: Proofs of Geographic Location for Cloud Computing Environment, Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops 2012, , Macau, China, pp. 506-514.
  • Ali Noman and Carlisle Adams, DLAS: Data Location Assurance Service for Cloud Computing Environments, Tenth Annual International Conference on Privacy, Security and Trust (PST), July 2012.
  • Thorsten Ries, Volker Fusenig, Christian Vilbois and Thomas Engel, Verification of Data Location in Cloud Networking, Fourth IEEE International Conference on Utility and Cloud Computing (UCC), Dec 2011.
  • Achemlal, M. , Gharout, S. , Gaber, C. , Trusted Platform Module as an Enabler for Security in Cloud Computing, Conference on Network and Information Systems Security (SAR-SSI), pp. 1-6, 2011.
  • Bertholon, B. , Varrette, S. , Bouvry, P. , Certicloud: A Novel TPM-based Approach to Ensure Cloud IaaS Security, IEEE International Conference on Cloud Computing (CLOUD), pp. 121-130, 2011.
  • Dongxi, Liu. , Lee, J. , Jang, J. , Nepal, S. , Zic, J. , A Cloud Architecture of Virtual Trusted Platform Modules, 8th International Conference on Embedded and Ubiquitous Computing (EUC), pp. 804 – 811, 2010.
  • Tessa Finlayson, (2009, June 3) Cloud Computing & Data Protection [Online] Available: http://www. twobirds. com/English/News/Articles/Pages/Cloud_Computing_Data_Protection_030609. Aspx
  • Zaigham Mahmood, Data Location and Security Issues in Cloud Computing, International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), Sept 2011.
  • Confederation of Indian Industry, "The Indian Cloud Revolution", CII, New Delhi, 2012.
  • Will Knight, (2009, August 17), Energy-Aware Internet Routing [Online] Available: http://www. technologyreview. com/news/414771/energy-aware-internet-routing/page/2/
  • Francoise Gilbert. (2011, April 10) Server Location: A Significant Factor in Cloud Computing Services [Online] Available: http://www. francoisegilbert. com/2011/04/cloud-computing-legal-issues-data-location/
  • Data Protection Working Party, (2012 July) Article 29: Opinion 05/2012 on Cloud Computing [Online] Available: http://ec. europa. eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2012/wp196_en. pdf
  • Guidelines for processing personal data across borders, Office of the Privacy Commissioner of Canada, Canada, Jan. 2009.
  • Office of the Victorian Privacy Commissioner, 2011 May, Information Sheet: Cloud Computing, [Online] Available: http://www. privacy. vic. gov. au/privacy/web2. nsf/files/cloud-computing/$file/info_sheet_03_11. pdf
  • Zack Whittaker, (2011, April 26), Case study: How the USA PATRIOT Act can be used to access EU data [Online] Available: http://www. zdnet. com/blog/igeneration/case-study-how-the-usa-patriot-act-can-be-used-to-access-eu-data/8805