메뉴 건너뛰기




Volumn 58, Issue 10, 2014, Pages 2595-2607

Trusted Validation for Geolocation of Cloud Data

Author keywords

cloud computing; host geolocation; storage security; trusted computing

Indexed keywords

CLOUD COMPUTING; DIGITAL STORAGE; NETWORK SECURITY;

EID: 84943390581     PISSN: 00104620     EISSN: 14602067     Source Type: Journal    
DOI: 10.1093/comjnl/bxu144     Document Type: Article
Times cited : (16)

References (42)
  • 2
    • 74049152260 scopus 로고    scopus 로고
    • Hey, you, get off my cloud! exploring information leakage in third-party compute clouds
    • Chicago, IL, USA, November 9-13. ACM, New York, NY, USA
    • Ristenpart, T., Tromer, E. and Shacham, H. (2009) Hey, You, Get Off My Cloud! Exploring Information Leakage in Third-Party Compute Clouds. Proc. 16th ACM Conf. Computer and Communications Security, Chicago, IL, USA, November 9-13, pp. 199-212. ACM, New York, NY, USA.
    • (2009) Proc. 16th ACM Conf. Computer and Communications Security , pp. 199-212
    • Ristenpart, T.1    Tromer, E.2    Shacham, H.3
  • 3
    • 84880237695 scopus 로고    scopus 로고
    • A position paper on data sovereignty: The importance of geolocating data in the cloud
    • Portland, OR, USA, June 14-15. USENIX Association, Berkeley, CA, USA
    • Peterson, Z. N. J., Gondree, M. and Beverly, R. (2011) A Position Paper on Data Sovereignty: The Importance of Geolocating Data in the Cloud. Proc. USENIX Workshop on Hot Topics in Cloud Computing, Portland, OR, USA, June 14-15, pp. 9-13. USENIX Association, Berkeley, CA, USA.
    • (2011) Proc. USENIX Workshop on Hot Topics in Cloud Computing , pp. 9-13
    • Peterson, Z.N.J.1    Gondree, M.2    Beverly, R.3
  • 4
    • 80955142131 scopus 로고    scopus 로고
    • Do you know where your cloud files are? Proc
    • Chicago, IL, USA, October 17-21. ACM, New York, NY, USA
    • Benson, K., Dowsley, R. and Shacham, H. (2011) Do You Know Where Your Cloud Files Are? Proc. 3rd ACM workshop on Cloud computing security workshop, Chicago, IL, USA, October 17-21, pp. 73-82. ACM, New York, NY, USA.
    • (2011) 3rd ACM Workshop on Cloud Computing Security Workshop , pp. 73-82
    • Benson, K.1    Dowsley, R.2    Shacham, H.3
  • 8
    • 84943398937 scopus 로고    scopus 로고
    • University of Illinois at Urbana-Champaign(accessed July 6
    • University of Illinois at Urbana-Champaign. IP Address to Latitude/ Longitude. http://cello. cs. uiuc. edu/cgi-bin/slamm/ip2ll/ (accessed July 6, 2014).
    • (2014) IP Address to Latitude/ Longitude
  • 9
    • 84943407738 scopus 로고    scopus 로고
    • accessed July 6
    • Whois. net. Domains. http://www. whois. net/ (accessed July 6, 2014).
    • (2014) Domains
  • 10
    • 0034782006 scopus 로고    scopus 로고
    • An investigation of geographic mapping techniques for Internet hosts
    • San Diego, CA, USA, August 29. ACM, New York, NY, USA
    • Padmanabhan, V. N. and Subramanian, L. (2001) An investigation of geographic mapping techniques for Internet hosts. Proc. ACM SIGCOMM Conference, San Diego, CA, USA, August 29, pp. 173-185. ACM, New York, NY, USA.
    • (2001) Proc. ACM SIGCOMM Conference , pp. 173-185
    • Padmanabhan, V.N.1    Subramanian, L.2
  • 11
    • 33745897370 scopus 로고    scopus 로고
    • Constraint-Based Geolocation of Internet Hosts
    • Gueye, B., Ziviani, A. and Crovella,M. (2006) Constraint-Based Geolocation of Internet Hosts. ACM Trans. Netw., 14, 6:1219-6:1232.
    • (2006) ACM Trans. Netw. , vol.14 , pp. 61219-61232
    • Gueye, B.1    Ziviani, A.2    Crovella, M.3
  • 12
    • 34547469869 scopus 로고    scopus 로고
    • Towards IP geolocation using delay and topology measurements
    • Rio de Janeriro, Brazil, October 25-27. ACM, New York, NY, USA
    • Katz-Bassett, E., John, J. P. and Arvind Krishnamurthy, P. (2006) Towards IP Geolocation Using Delay and Topology Measurements. Proc. ACM Internet Measurement Conf., Rio de Janeriro, Brazil, October 25-27, pp. 78-84. ACM, New York, NY, USA.
    • (2006) Proc. ACM Internet Measurement Conf , pp. 78-84
    • Katz-Bassett, E.1    John, J.P.2    Arvind Krishnamurthy, P.3
  • 13
    • 77954317179 scopus 로고    scopus 로고
    • Octant: A comprehensive framework for the geolocalization of internet hosts
    • Cambridge, MA, April 11-13. USENIX Association, Berkeley, CA, USA
    • Wong, B., Stoyanov, I. and Sirer, E. (2007) Octant: A Comprehensive Framework for the Geolocalization of Internet Hosts. Proc. USENIX Conf. Networked Systems Design and Implementation, Cambridge, MA, April 11-13, pp. 23-33. USENIX Association, Berkeley, CA, USA.
    • (2007) Proc. USENIX Conf. Networked Systems Design and Implementation , pp. 23-33
    • Wong, B.1    Stoyanov, I.2    Sirer, E.3
  • 14
    • 13844281021 scopus 로고    scopus 로고
    • Improving the accuracy of measurement-based geographic location of Internet hosts
    • Ziviani, A., Fdida, S. and de Rezende, J. F. (2005) Improving the accuracy of measurement-based geographic location of Internet hosts. Comput. Netw., 47, 4:503-4:523.
    • (2005) Comput. Netw. , vol.47 , pp. 4503-4523
    • Ziviani, A.1    Fdida, S.2    De Rezende, J.F.3
  • 15
    • 84871775618 scopus 로고    scopus 로고
    • IP-geolocation mapping for moderately connected Internet regions
    • Li, D., Chen, J. and Guo, C. (2013) Ip-geolocation mapping for moderately connected Internet regions. IEEE Trans. Parallel Distrib. Syst., 24, 2:381-2:391.
    • (2013) IEEE Trans. Parallel Distrib. Syst. , vol.24 , pp. 2381-2391
    • Li, D.1    Chen, J.2    Guo, C.3
  • 16
    • 74049102823 scopus 로고    scopus 로고
    • Provable data possession at untrusted stores
    • Alexandria, Virginia, USA, October 29. ACM, New York, NY, USA
    • Ateniese, G., Burns, R. and Curtmola, R. (2007) Provable Data Possession at Untrusted Stores. Proc. 14th ACM Conf. Computer and Communications Security, Alexandria, Virginia, USA, October 29, pp. 598-609. ACM, New York, NY, USA.
    • (2007) Proc. 14th ACM Conf. Computer and Communications Security , pp. 598-609
    • Ateniese, G.1    Burns, R.2    Curtmola, R.3
  • 17
    • 84943424558 scopus 로고    scopus 로고
    • A comparative survey on various provable data possession schemes of integrity verification in single and multi cloud environments
    • Abraham, K. and John, W. M. (2013) A comparative survey on various provable data possession schemes of integrity verification in single and multi cloud environments. Int. J. Eng., 2, 17:37-17:44.
    • (2013) Int. J. Eng. , vol.2 , pp. 1737-1744
    • Abraham, K.1    John, W.M.2
  • 18
    • 74049144464 scopus 로고    scopus 로고
    • Hail: A highavailability and integrity layer for cloud storage
    • Chicago, IL, USA, November 9-13. ACM, New York, NY, USA
    • Bowers, K., Juels, A. and Oprea, A. (2009) Hail: A highavailability and integrity layer for cloud storage. Proc. 16th ACM Conf. on Computer and Communications Security, Chicago, IL, USA, November 9-13, pp. 187-198. ACM, New York, NY, USA.
    • (2009) Proc. 16th ACM Conf. on Computer and Communications Security , pp. 187-198
    • Bowers, K.1    Juels, A.2    Oprea, A.3
  • 19
    • 78149247803 scopus 로고    scopus 로고
    • Trusted Computing Group(accessed May 5
    • Trusted Computing Group. TPM Specification Version 1. 2 Revision 103: Part 1-Design Principles. http://www. trustedcom putinggroup. org/files/resource-files/646BE624-1D09-3519-AD DA61BE37A21A74/mainP1DPrev103. pdf (accessed May 5, 2013).
    • (2013) TPM Specification Version 1. 2 Revision 103: Part 1-Design Principles
  • 20
    • 84943392039 scopus 로고    scopus 로고
    • Trusted Computing Group(accessed May 5
    • Trusted Computing Group. TPM Specification Version 1. 2 Revision 103: Part 2-Structures. http://www. trustedcomputinggroup. org/files/resource-files/8D3D6571-1D09-3519-AD22EA2911D 4E9D0/mainP2Structrev103. pdf (accessed May 5, 2013).
    • (2013) TPM Specification Version 1. 2 Revision 103: Part 2-Structures
  • 21
    • 84943403389 scopus 로고    scopus 로고
    • Trusted Computing Group(accessed May 5
    • Trusted Computing Group. TPM Specification Version 1. 2 Revision 103: Part 3. Commands. http://www. trustedcomputing group. org/files/resource-files/E14A09AD-1A4B-B294-D049A CC1A1A138ED/mainP3Commandsrev103. pdf (accessed May 5, 2013).
    • (2013) TPM Specification Version 1. 2 Revision 103: Part 3. Commands
  • 22
    • 84975240564 scopus 로고    scopus 로고
    • Improved remote attestation mechanism of platform configuration based on chameleon hashes
    • Fu, D. L. and Peng, X. G. (2013) Improved remote attestation mechanism of platform configuration based on Chameleon Hashes. Comput. Sci., 40, 1:118-1:121.
    • (2013) Comput. Sci. , vol.40 , pp. 1118-1121
    • Fu, D.L.1    Peng, X.G.2
  • 23
    • 84866540011 scopus 로고    scopus 로고
    • Remote attestation using chameleon hash and dynamic Huffman Merkle Hash tree
    • Fu, D. L. and Chen, G. X. (2012). Remote attestation using chameleon hash and dynamic Huffman Merkle Hash tree. J. Comput. Inf. Syst., 8, 17:7103-17:7112.
    • (2012) J. Comput. Inf. Syst. , vol.8 , pp. 177103-177112
    • Fu, D.L.1    Chen, G.X.2
  • 24
    • 84874534280 scopus 로고    scopus 로고
    • Improved remote attestation mechanism based on group signatures and unbalanced merkle hash tree
    • Fu, D. L. and Chen, G. X. (2013) Improved remote attestation mechanism based on group signatures and unbalanced Merkle Hash Tree. J. Inf. Comput. Sci., 10, 3:773-3:781.
    • (2013) J. Inf. Comput. Sci. , vol.10 , pp. 3773-3781
    • Fu, D.L.1    Chen, G.X.2
  • 25
    • 84874532797 scopus 로고    scopus 로고
    • Remote attestation mechanism of platform configuration based on dynamic Huffman tree
    • Fu, D. L., Peng, X. G. and Chen, G. X. (2012) Remote attestation mechanism of platform configuration based on dynamic Huffman tree. J. Comput. Appl., 32, 8:2275-8:2279+8:2282.
    • (2012) J. Comput. Appl. , vol.32
    • Fu, D.L.1    Peng, X.G.2    Chen, G.X.3
  • 26
    • 84881582001 scopus 로고    scopus 로고
    • Trusted platform module-based scheme for secure access to outsourced data
    • Fu, D. L., Peng, X. G. and Yang, Y. L. (2013) Trusted platform module-based scheme for secure access to outsourced data. J. Electron. Inf. Technol., 35, 7:1766-7:1773.
    • (2013) J. Electron. Inf. Technol. , vol.35 , pp. 71766-71773
    • Fu, D.L.1    Peng, X.G.2    Yang, Y.L.3
  • 28
    • 84943417279 scopus 로고    scopus 로고
    • January 1
    • AMD. AMD64 Architecture Programmer's Manual. http:// support. amd. com/us/Processor-TechDocs/24593-APM-v2. pdf (January 1, 2014).
    • (2014) AMD64 Architecture Programmer's Manual
  • 30
    • 85015375134 scopus 로고    scopus 로고
    • Dude, where's that IP? Circumventing measurement-based IP geolocation
    • Washington, DC, August 11-13. USENIX Association, Berkeley, CA, USA
    • Gill, P., Ganjali, Y. and Wong, B. (2010) Dude, Where's That IP? Circumventing Measurement-Based IP Geolocation. Proc. 19th USENIX Conf. Security, Washington, DC, August 11-13, pp. 16-26. USENIX Association, Berkeley, CA, USA.
    • (2010) Proc. 19th USENIX Conf. Security , pp. 16-26
    • Gill, P.1    Ganjali, Y.2    Wong, B.3
  • 31
    • 84889069075 scopus 로고    scopus 로고
    • Architecture for concurrent execution of secure environments in clouds
    • Berlin, Germany, November 4-8. ACM, New York, NY, USA
    • Jayaram Masti, R., Marforio, C. and Capkun, S. (2013) Architecture for Concurrent Execution of Secure Environments in Clouds. Proc. 2013 ACM Workshop on Cloud Computing Security Workshop, Berlin, Germany, November 4-8, pp. 11-22. ACM, New York, NY, USA.
    • (2013) Proc. 2013 ACM Workshop on Cloud Computing Security Workshop , pp. 11-22
    • Jayaram Masti, R.1    Marforio, C.2    Capkun, S.3
  • 33
    • 82055200280 scopus 로고    scopus 로고
    • Actvsm: A dynamic virtualization platform for enforcement of application integrity
    • Beijing, China, December 13-15. Springer, Berlin, Heidelberg
    • Toegl, R., Pirker, M. and Gissing, M. (2010) acTvSM: A Dynamic Virtualization Platform for Enforcement of Application Integrity. Trusted Systems, Second International Conference, Beijing, China, December 13-15, pp. 326-345. Springer, Berlin, Heidelberg.
    • (2010) Trusted Systems, Second International Conference , pp. 326-345
    • Toegl, R.1    Pirker, M.2    Gissing, M.3
  • 34
    • 84943376797 scopus 로고    scopus 로고
    • accessed December 5
    • Crawler4j. http://code. google. com/p/crawler4j/ (accessed December 5, 2013).
    • (2013)
  • 37
    • 78650777991 scopus 로고    scopus 로고
    • CloudSim: A toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms
    • Calheiros, R. N., Ranjan, R. and Beloglazov, A. (2011) CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Softw. Pract. Exp., 41, 1:23-1:50.
    • (2011) Softw. Pract. Exp. , vol.41 , pp. 123-150
    • Calheiros, R.N.1    Ranjan, R.2    Beloglazov, A.3
  • 38
    • 84943402817 scopus 로고    scopus 로고
    • CloudSim Projects(accessed December 5
    • CloudSim Projects. http://www. cloudbus. org/cloudsim/ (accessed December 5, 2013).
    • (2013)
  • 40
    • 84869436864 scopus 로고    scopus 로고
    • Policy-sealed data: A new abstraction for building trusted cloud services
    • Bellevue, WA, USA, August 8-10. USENIX Association, Berkeley, CA, USA
    • Santos, N., Rodrigues, R., Gummadi, K. P. and Saroiu, S. (2012) Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services. Proceedings of the 21st USENIX Security Symposium, Bellevue, WA, USA, August 8-10, pp. 175-188. USENIX Association, Berkeley, CA, USA.
    • (2012) Proceedings of the 21st USENIX Security Symposium , pp. 175-188
    • Santos, N.1    Rodrigues, R.2    Gummadi, K.P.3    Saroiu, S.4
  • 41
    • 84883356757 scopus 로고    scopus 로고
    • Using trusted platform modules for location assurance in cloud networking
    • Madrid, Spain, June 3-4. Springer, Berlin, Heidelberg
    • Krauß, C. and Fusenig, V. (2013) Using Trusted Platform Modules for Location Assurance in Cloud Networking. Network and System Security-7th International Conference, Madrid, Spain, June 3-4, pp. 109-211. Springer, Berlin, Heidelberg.
    • (2013) Network and System Security-7th International Conference , pp. 109-211
    • Krauß, C.1    Fusenig, V.2
  • 42
    • 84943374627 scopus 로고    scopus 로고
    • Trusted Computing Group(accessed July 6
    • Trusted Computing Group. Cloud computing and security-a natural match. http://www. trustedcomputinggroup. org/files/ resource-files/1F4DEE3D-1A4B-B294-D0AD0742BA449E07/ Cloud%20Computing%20and%20Security%20Whitepaper- July29. 2010. pdf (accessed July 6, 2014).
    • (2014) Cloud Computing and Security-a Natural Match


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.