Cloud Location Verification and Adversary Identification

被引:0
|
作者
Al Galib, Asadullah [1 ]
Rahman, Rashedur Mohammad [2 ]
机构
[1] Univ Calgary, Dept Comp Sci, Calgary, AB T2N 1N4, Canada
[2] North South Univ, Dept Elect & Comp Engn, Dhaka 1229, Bangladesh
来源
COMPUTATIONAL INTELLIGENCE IN INFORMATION SYSTEMS | 2015年 / 331卷
关键词
GEOLOCATION;
D O I
10.1007/978-3-319-13153-5_33
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
When it comes to cloud computing, people get concerned not only of privacy and integrity of their data but its location as well. This is particularly important due to the existence of variations of laws and regulations governing data storage and access mechanisms in different geographical regions. We will consider a distributed environment such as the cloud and try to verify whether the client-requested servers are holding the file they actually claim to hold. We make some plausible assumptions on the adversarial model and propose a scheme called CLVI for finding out geographical location of servers. Our scheme uses a challenge-response protocol instead of traditional pinging mechanism to accomplish its task. CLVI is able to detect location forgery and identify the adversary involved in the forgery. We validated our technique of detecting location forgery and approximating the adversary's location using measurements from PlanetLab.
引用
收藏
页码:337 / 348
页数:12
相关论文
共 50 条
  • [1] Robust location parameter estimation in the presence of adversary
    Paudel, Santosh
    Chen, Hao
    Himed, Braham
    DIGITAL SIGNAL PROCESSING, 2023, 142
  • [2] Novel method for false location identification based on nonstationary verification
    Feng, Daowang
    Xu, Xin
    Zhou, Yiyu
    Lu, Qizhong
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2002, 24 (11): : 1675 - 1681
  • [3] Landmark-based data location verification in the cloud: review of approaches and challenges
    Malik Irain
    Jacques Jorda
    Zoubir Mammeri
    Journal of Cloud Computing, 6
  • [4] Landmark-based data location verification in the cloud: review of approaches and challenges
    Irain, Malik
    Jorda, Jacques
    Mammeri, Zoubir
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2017, 6
  • [5] Collusion-Attack-Defensive Data Location Verification Protocols in Cloud Computing
    Du S.-J.
    Xu S.-S.
    Liu J.-N.
    Zhang J.-W.
    Ma J.-F.
    2017, Chinese Institute of Electronics (45): : 1321 - 1326
  • [6] Cloud Computing And EDA: Is Cloud Technology Ready for Verification. (And Is Verification Ready for Cloud)?
    Ranjan, Hasmukh
    2011 INTERNATIONAL SYMPOSIUM ON VLSI DESIGN, AUTOMATION AND TEST (VLSI-DAT), 2011, : 232 - 233
  • [7] Online Facility Location against a t-Bounded Adversary
    Lang, Harry
    SODA'18: PROCEEDINGS OF THE TWENTY-NINTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, 2018, : 1002 - 1014
  • [8] Identification of the Adversary from a Single Adversarial Example
    Cheng, Minhao
    Min, Rui
    Sun, Haochen
    Chen, Pin-Yu
    INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 202, 2023, 202
  • [9] Attribute-based encryption with location verification and policy adjusting supporting the cloud mobile office
    Ying Z.
    Ma J.
    Cui J.
    2017, Science Press (44): : 57 - 62and190
  • [10] Mobile cloud security: An adversary model for lightweight browser security
    Pokharel, Shasi
    Choo, Kim-Kwang Raymond
    Liu, Jixue
    COMPUTER STANDARDS & INTERFACES, 2017, 49 : 71 - 78