DLoc: Distributed Auditing for Data Location Compliance in Cloud

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10436)


The prevalence of mobile devices and their capability to access high speed Internet has transformed them into a portable pocket cloud interface. In order to protect user’s privacy, the European Union Data Protection regulations restricts the transfer of European users’ personal data within the geographical boundaries of the European Union itself. The matter of concern, however, is the enforcement of such regulations. Since cloud service provision is independent of physical location and data can travel to various servers, it is a challenging task to determine the location of data and enforce jurisdiction policies. In this paper we introduce a framework, named DLoc, which enables the end-users to track the location of their data after being transferred to the cloud. DLoc does not require a network of monitoring servers (landmarks) and does not need to reside and run within the target server. It uses a proof of data possession technique to guarantee that the cloud storage service possess the particular file and estimates its location(s) in a distributed manner without requiring the collaboration of the data controller or cloud provider. Empirical evaluations demonstrate that DLoc provides a better accuracy than its rival approaches in real world scenarios.


Smartphone Data transfer Privacy protection Jurisdiction policy 



This project was partially funded by the European Union’s under grant 317387 SECENTIS (FP7-PEOPLE-2012-ITN) and Horizon 2020 research and innovation programme under grant agreement No. 688797.


  1. 1.
    Abdou, A., Matrawy, A., van Oorschot, P.C.: Accurate manipulation of delay-based internet geolocation. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 887–898. ACM (2017)Google Scholar
  2. 2.
    Albeshri, A., Boyd, C., Nieto, J.G.: Geoproof: proofs of geographic location for cloud computing environment. In: 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 506–514 (2012)Google Scholar
  3. 3.
    Ciavarrini, G., Luconi, V., Vecchio, A.: Smartphone-based geolocation of internet hosts. Comput. Netw. 116, 22–32 (2017)CrossRefGoogle Scholar
  4. 4.
    Eskandari, M., De Oliveira, A.S., Crispo, B.: VLoc: an approach to verify the physical location of a virtual machine in cloud. In: 2014 IEEE 6th International Conference on Cloud Computing Technology and Science (CloudCom), pp. 86–94. IEEE (2014)Google Scholar
  5. 5.
    Gondree, M., Peterson, Z.N.J.: Geolocation of data in the cloud. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, CODASPY 2013, pp. 25–36. ACM, New York (2013)Google Scholar
  6. 6.
    Gueye, B., Ziviani, A., Crovella, M., Fdida, S.: Constraint-based geolocation of internet hosts. IEEE/ACM Trans. Netw. 14(6), 1219–1232 (2006)CrossRefGoogle Scholar
  7. 7.
    Hastie, T., Friedman, J., Tibshirani, R.: Model assessment and selection. In: Hastie, T., Friedman, J., Tibshirani, R. (eds.) The Elements of Statistical Learning, pp. 219–259. Springer, New York (2009). doi: 10.1007/978-0-387-21606-5_7CrossRefzbMATHGoogle Scholar
  8. 8.
    Jaiswal, C., Kumar, V.: IGOD: identification of geolocation of cloud datacenters. In: 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops), pp. 665–672. IEEE (2015)Google Scholar
  9. 9.
    Krauß, C., Fusenig, V.: Using trusted platform modules for location assurance in cloud networking. In: Lopez, J., Huang, X., Sandhu, R. (eds.) NSS 2013. LNCS, vol. 7873, pp. 109–121. Springer, Heidelberg (2013). doi: 10.1007/978-3-642-38631-2_9CrossRefGoogle Scholar
  10. 10.
    Padmanabhan, V.N., Subramanian, L.: An investigation of geographic mapping techniques for internet hosts. In: ACM SIGCOMM Computer Communication Review, vol. 31, pp. 173–185. ACM (2001)Google Scholar
  11. 11.
    Paladi, N., Michalas, A.: One of our hosts in another country: challenges of data geolocation in cloud storage. In: 2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace and Electronic Systems (VITAE), pp. 1–6. IEEE (2014)Google Scholar
  12. 12.
    European Parliament and of the Council: General data protection regulation (2016). Final Version. Accessed 27 Apr 2016
  13. 13.
    Wang, Y., Burgener, D., Flores, M., Kuzmanovic, A., Huang, C.: Towards street-level client-independent IP geolocation. NSDI 11, 27–27 (2011)Google Scholar
  14. 14.
    Watson, G.J., Safavi-Naini, R., Alimomeni, M., Locasto, M.E., Narayan, S.: Lost: location based storage. In: Proceedings of the 2012 ACM Workshop on Cloud Computing Security Workshop, pp. 59–70. ACM (2012)Google Scholar
  15. 15.
    Wikipedia: Trilateration (2014)Google Scholar
  16. 16.
    Wikipedia: Geographic coordinate system (2016).
  17. 17.
    Wikipedia: Triangle (2016).
  18. 18.
    Wikipedia: Triangulation (2016).

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.DISIUniversity of TrentoTrentoItaly
  2. 2.DistrNetKULeuvenLeuvenBelgium
  3. 3.SAP LabsSophia AntipolisFrance

Personalised recommendations