Skip to main content
Log in

Enhanced GeoProof: improved geographic assurance for data in the cloud

  • Special Issue Paper
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

The geographic location of cloud data storage centres is an important issue for many organisations and individuals due to various regulations that require data and operations to reside in specific geographic locations. Thus, cloud users may want to be sure that their stored data have not been relocated into unknown geographic regions that may compromise the security of their stored data. Albeshri et al. (2012) combined proof of storage (POS) protocols with distance-bounding protocols to address this problem. However, their scheme involves unnecessary delay when utilising typical POS schemes due to computational overhead at the server side. The aim of this paper is to improve the basic GeoProof protocol by reducing the computation overhead at the server side. We show how this can maintain the same level of security while achieving more accurate geographic assurance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Albeshri, A.A., Boyd, C., Nieto, J.M.G.: Geoproof: proofs of geographic location for cloud computing environment. In: 3rd International Workshop on Security and Privacy in Cloud Computing Part of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012), pp. 506–514. IEEE, Macau, China (2012)

  2. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS ’07, pp. 598–609. ACM, New York, NY (2007)

  3. Benson, K., Dowsley, R., Shacham, H.: Do you know where your cloud files are? In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, CCSW ’11, pp. 73–82. ACM, New York, NY (2011)

  4. Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J.: Controlling data in the cloud: outsourcing computation without outsourcing control. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp. 85–90. ACM (2009)

  5. Erway, C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS ’09, pp. 213–222. ACM, New York, NY (2009)

  6. Juels, A., Kaliski, B.S. Jr.: PORs: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS ’07, pp. 584–597. ACM, New York, NY (2007)

  7. Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Sion, R., et al. (eds.) Financial Cryptography and Data Security, vol. 6054 of Lecture Notes in Computer Science, pp. 136–149. Springer, Berlin (2010)

  8. Katz-Bassett, E., John, J.P., Krishnamurthy, A., Wetherall, D., Anderson, T., Chawathe, Y.: Towards IP geolocation using delay and topology measurements. In: Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, IMC ’06, pp. 71–84. ACM, New York, NY (2006)

  9. Peterson, Z.N.J., Gondree, M., Beverly, R.: A position paper on data sovereignty: the importance of geolocating data in the cloud. In: Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation (2011)

  10. Shacham, H., Waters, B.: Compact proofs of retrievability. In: Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, ASIACRYPT ’08, pp. 90–107. Springer, Berlin (2008)

  11. Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proceedings of the 14th European Conference on Research in Computer Security, ESORICS’09, pp. 355–370. Springer, Berlin (2009)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aiiad Albeshri.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Albeshri, A., Boyd , C. & Nieto, J.G. Enhanced GeoProof: improved geographic assurance for data in the cloud. Int. J. Inf. Secur. 13, 191–198 (2014). https://doi.org/10.1007/s10207-013-0217-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-013-0217-6

Keywords

Navigation