skip to main content
10.1145/2435349.2435353acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
research-article

Geolocation of data in the cloud

Published: 18 February 2013 Publication History

Abstract

We introduce and analyze a general framework for authentically binding data to a location while providing strong assurances against cloud storage providers that (either accidentally or maliciously) attempt to re-locate cloud data. We then evaluate a preliminary solution in this framework that combines constraint-based host geolocation with proofs of data possession, called constraint-based data geolocation (CBDG). We evaluate CBDG using a combination of experiments with PlanetLab and real cloud storage services, demonstrating that we can bind fetched data to the location originally hosting it with high precision. We geolocate data hosted on the majority of our PlanetLab targets to regions no larger than 118,000 km^2, and we geolocate data hosted on Amazon S3 to an area no larger than 12,000 km^2, sufficiently small to identify the state or service region.

References

[1]
Amazon Web Services. Summary of the Amazon EC2 and Amazon RDS service disruption in the US east region. Available at http://aws.amazon.com/message/65648/.
[2]
Amazon Web Services. Overview of security processes, May 2011. Available at http://aws.amazon.com/security.
[3]
G. Ateniese, R. Burns, R. Curtmola, J. H. amd Lea Kissner, Z. Peterson, and D. Song. Provable data possession at untrusted stores. In Proceedings of the ACM Conference on Computer and Communications Security, 2007.
[4]
G. Ateniese, S. Kamara, and J. Katz. Proofs of storage from homomorphic identification protocols. In Proceedings of ASIACRYPT, 2009.
[5]
G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik. Scalable and efficient provable data possession. In Proceedings of the International Conference on Security and Privacy in Communication Networks, 2008.
[6]
K. Benson, R. Dowsley, and H. Shacham. Do you know where your cloud files are? In Proceedings of the ACM Cloud Computing Security Workshop, 2011.
[7]
H. Blodget. Amazon's cloud crash disaster permanently destroyed many customers' data. Business Insider, April 4 2011. http://www.businessinsider.com/amazon-lost-data-2011-4.
[8]
K. D. Bowers, A. Juels, and A. Oprea. Proofs of retrievability: Theory and implementation. In Proceedings of the ACM Workshop on Cloud Computing Security, 2009.
[9]
K. D. Bowers, M. van Dijk, A. Juels, A. Oprea, and R. L. Rivest. How to tell if your cloud files are vulnerable to drive crashes. In Proceedings of the ACM Conference on Computer and Communications Security, 2011.
[10]
N. Chandran, V. Goyal, and R. M. R. Ostrovsky. Position based cryptography. In Proceedings of the International Cryptology Conference, 2009.
[11]
CIO Council. Proposed security assessment & authorization for US government cloud computing, November 2010.
[12]
R. Curtmola, O. Khan, and R. Burns. Robust remtoe data checking. In Proceedings of the ACM International Workshop on Storage Security and Survivability, 2008.
[13]
R. Curtmola, O. Khan, R. Burns, and G. Ateniese. MR-PDP: Multiple-replica provable data possession. In Proceedings of the International Conference on Distributed Computing Systems, 2008.
[14]
Y. Deswarte, J.-J. Quisquater, and A. Sa1dane. Remote integrity checking: How to trust files stored on untrusted servers. In Proceedings of the Conference on Integrity and Internal Control in Information Systems, 2003.
[15]
C. C. Erway, A. Küpcü, C. Papamanthou, and R. Tamassia. Dynamic provable data possession. In Proceedings of the ACM Conference on Computer and Communication Security, 2009.
[16]
European Commission. Regulation of the european parliament and of the council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (general data protection regulation). Directive 95/46/EC, 2012.
[17]
D. L. G. Filho and P. S. L. M. Barreto. Demonstrating data possession and uncheatable data transfer. Cryptology ePrint Archive, Report 2006/150, 2006.
[18]
P. Gill, Y. Ganjali, B. Wong, and D. Lie. Dude, where's that IP? Circumventing measurement-based IP geolocation. In Proceedings of the USENIX Security Symposium, 2010.
[19]
N. Gohring. Amazon's S3 down for several hours. PC World, Feb 15 2008. http://www.pcworld.com/businesscenter/article/142549/amazons_s3_down_for_several_hours.html.
[20]
B. Gueye, A. Ziviani, M. Crovella, and S. Fdida. Constraint-based geolocation of Internet hosts. Transactions on Networking, 14(6), December 2006.
[21]
S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg. Proofs of ownership in remote storage systems. In Proceedings of the ACM Conference on Computer and Communications Security, 2011.
[22]
D. Harris. Amazon targets US government with GovCloud. The New York Times, August 2011. http://nyti.ms/y6A0ZH.
[23]
B. Huffaker, M. Fomenkov, and kc claffy. Geocompare: a comparison of public and commercial geolocation databases. In Proceedings of the Network Mapping and Measurement Conference (NMC), 2011.
[24]
K. Irion. Government cloud computing and the policies of data sovereignty, 2011. Available at http://ssrn.com/abstract=1935859.
[25]
A. Juels and B. S. Kaliski Jr. PORs: Proofs of retrievability for large files. In Proceedings of the ACM Conference on Computer and Communications Security, 2007.
[26]
E. Katz-Bassett, J. P. John, A. Krishnamurthy, D. Wetherall, T. Anderson, and Y. Chawathe. Towards IP geolocation using delay and topology measurements. In Proceedings of the Conference on Internet Measurement, 2006.
[27]
V. Kundra. Federal cloud computing strategy, February 2011. Available at http://www.cio.gov/documents/federal-cloud-computing-strategy.pdf.
[28]
K. E. Kushida, J. Murray, and J. Zysman. Diffusing the cloud: Cloud computing and implications for public policy. Journal of Industry, Competition and Trade, 11(3), 2011.
[29]
S. Laki, P. Matray, P. Haga, I. Csabai, and G. Vattay. A detailed path-latency model for router geolocation. In Proceedings of the International Conference on Testbeds and Research Infrastructures for the Development of Networks Communities and Workshops, 2009.
[30]
A. Li, X. Yang, S. Kandula, and M. Zhang. CloudCmp: Comparing public cloud providers. In Proceedings of the Internet Modeling Conference, 2010.
[31]
Microsoft Corporation. Building confidence in the cloud: A proposal for industry and government action to advance cloud computing. Technical report, Microsoft Corporation, January 2010.
[32]
M. Naor and G. N. Rothblum. The complexity of online memory checking. Journal of the ACM, 56(1), 2009.
[33]
V. N. Padmanabhan and L. Subramanian. An investigation of geographic mapping techniques for Internet hosts. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, 2001.
[34]
R. Percacci and A. Vespignani. Scale-free behavior of the internet global performance. European Physical Journal B, 32(4), 2003.
[35]
Z. N. J. Peterson, M. Gondree, and R. Beverly. A position paper on data sovereignty: The importance of geolocating data in the cloud. In Proceedings of the USENIX Workshop on Hot Topics in Cloud Computing, 2010.
[36]
I. Poese, S. Uhlig, M. A. Kaafar, B. Donnet, and B. Gueye. Ip geolocation databases: unreliable? Computer Communication Review, 41(2), 2011.
[37]
T. Schwarz, S.J. and E. L. Miller. Store, forget, and check: Using algebraic signatures to check remotely administered storage. In Proceedings of the IEEE International Conference on Distributed Computing Systems, 2006.
[38]
H. Shacham and B. Waters. Compact proofs of retrievability. In Proceedings of ASIACRYPT, 2008.
[39]
M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan. Auditing to keep online storage services honest. In Proceedings of the USENIX workshop on Hot Topics in Operating Systems, 2007.
[40]
S. Siwpersad, B. Gueye, and S. Uhlig. Assessing the geographic resolution of exhaustive tabulation for geolocating internet hosts. In Passive and Active Network Measurement, 2008.
[41]
J. Sommers, P. Barford, N. Duffield, and A. Ron. Multiobjective monitoring for SLA compliance. Transaction on Networking, 18(2), 2010.
[42]
S. Capkun, M. Cagalj, and M. Srivastava. Secure localization with hidden and mobile base stations. In Proceedings of the IEEE International Conference on Computer Communications, 2006.
[43]
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou. Enabling public verifiability and data dynamics for storage security in cloud computing. In Proceedings of the European Symposium on Research in Computer Security, 2009.
[44]
B. Wong, I. Stoyanov, and E. G. Sirer. Octant: A comprehensive framework for the geolocalization of internet hosts. In Proceedings of the USENIX Networked Systems Design and Implementation, 2007.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CODASPY '13: Proceedings of the third ACM conference on Data and application security and privacy
February 2013
400 pages
ISBN:9781450318907
DOI:10.1145/2435349
  • General Chairs:
  • Elisa Bertino,
  • Ravi Sandhu,
  • Program Chair:
  • Lujo Bauer,
  • Publications Chair:
  • Jaehong Park
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 February 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cloud storage
  2. data availability
  3. proof of data geolocation
  4. provable data possession
  5. storage security

Qualifiers

  • Research-article

Conference

CODASPY'13
Sponsor:

Acceptance Rates

CODASPY '13 Paper Acceptance Rate 24 of 107 submissions, 22%;
Overall Acceptance Rate 149 of 789 submissions, 19%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)29
  • Downloads (Last 6 weeks)2
Reflects downloads up to 31 Dec 2024

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media