{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T10:45:24Z","timestamp":1760784324849,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319678153"},{"type":"electronic","value":"9783319678160"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67816-0_12","type":"book-chapter","created":{"date-parts":[[2017,9,12]],"date-time":"2017-09-12T06:43:16Z","timestamp":1505198596000},"page":"202-218","source":"Crossref","is-referenced-by-count":2,"title":["DLoc: Distributed Auditing for Data Location Compliance in Cloud"],"prefix":"10.1007","author":[{"given":"Mojtaba","family":"Eskandari","sequence":"first","affiliation":[]},{"given":"Bruno","family":"Crispo","sequence":"additional","affiliation":[]},{"given":"Anderson Santana","family":"de Oliveira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,13]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Abdou, A., Matrawy, A., van Oorschot, P.C.: Accurate manipulation of delay-based internet geolocation. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 887\u2013898. ACM (2017)","DOI":"10.1145\/3052973.3052993"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Albeshri, A., Boyd, C., Nieto, J.G.: Geoproof: proofs of geographic location for cloud computing environment. In: 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 506\u2013514 (2012)","DOI":"10.1109\/ICDCSW.2012.50"},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.comnet.2017.02.006","volume":"116","author":"G Ciavarrini","year":"2017","unstructured":"Ciavarrini, G., Luconi, V., Vecchio, A.: Smartphone-based geolocation of internet hosts. Comput. Netw. 116, 22\u201332 (2017)","journal-title":"Comput. Netw."},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Eskandari, M., De Oliveira, A.S., Crispo, B.: VLoc: an approach to verify the physical location of a virtual machine in cloud. In: 2014 IEEE 6th International Conference on Cloud Computing Technology and Science (CloudCom), pp. 86\u201394. IEEE (2014)","DOI":"10.1109\/CloudCom.2014.47"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Gondree, M., Peterson, Z.N.J.: Geolocation of data in the cloud. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, CODASPY 2013, pp. 25\u201336. ACM, New York (2013)","DOI":"10.1145\/2435349.2435353"},{"issue":"6","key":"12_CR6","doi-asserted-by":"publisher","first-page":"1219","DOI":"10.1109\/TNET.2006.886332","volume":"14","author":"B Gueye","year":"2006","unstructured":"Gueye, B., Ziviani, A., Crovella, M., Fdida, S.: Constraint-based geolocation of internet hosts. IEEE\/ACM Trans. Netw. 14(6), 1219\u20131232 (2006)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"12_CR7","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-0-387-21606-5_7","volume-title":"The Elements of Statistical Learning","author":"T Hastie","year":"2009","unstructured":"Hastie, T., Friedman, J., Tibshirani, R.: Model assessment and selection. In: Hastie, T., Friedman, J., Tibshirani, R. (eds.) The Elements of Statistical Learning, pp. 219\u2013259. Springer, New York (2009). doi:\n10.1007\/978-0-387-21606-5_7"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Jaiswal, C., Kumar, V.: IGOD: identification of geolocation of cloud datacenters. In: 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops), pp. 665\u2013672. IEEE (2015)","DOI":"10.1109\/LCNW.2015.7365912"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-642-38631-2_9","volume-title":"Network and System Security","author":"C Krau\u00df","year":"2013","unstructured":"Krau\u00df, C., Fusenig, V.: Using trusted platform modules for location assurance in cloud networking. In: Lopez, J., Huang, X., Sandhu, R. (eds.) NSS 2013. LNCS, vol. 7873, pp. 109\u2013121. Springer, Heidelberg (2013). doi:\n10.1007\/978-3-642-38631-2_9"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Padmanabhan, V.N., Subramanian, L.: An investigation of geographic mapping techniques for internet hosts. In: ACM SIGCOMM Computer Communication Review, vol. 31, pp. 173\u2013185. ACM (2001)","DOI":"10.1145\/383059.383073"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Paladi, N., Michalas, A.: One of our hosts in another country: challenges of data geolocation in cloud storage. In: 2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace and Electronic Systems (VITAE), pp. 1\u20136. IEEE (2014)","DOI":"10.1109\/VITAE.2014.6934507"},{"key":"12_CR12","unstructured":"European Parliament and of the Council: General data protection regulation (2016). Final Version. \nhttp:\/\/data.europa.eu\/eli\/reg\/2016\/679\/oj\n\n. Accessed 27 Apr 2016"},{"key":"12_CR13","first-page":"27","volume":"11","author":"Y Wang","year":"2011","unstructured":"Wang, Y., Burgener, D., Flores, M., Kuzmanovic, A., Huang, C.: Towards street-level client-independent IP geolocation. NSDI 11, 27\u201327 (2011)","journal-title":"NSDI"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Watson, G.J., Safavi-Naini, R., Alimomeni, M., Locasto, M.E., Narayan, S.: Lost: location based storage. In: Proceedings of the 2012 ACM Workshop on Cloud Computing Security Workshop, pp. 59\u201370. ACM (2012)","DOI":"10.1145\/2381913.2381926"},{"key":"12_CR15","unstructured":"Wikipedia: Trilateration (2014)"},{"key":"12_CR16","unstructured":"Wikipedia: Geographic coordinate system (2016). \nhttps:\/\/en.wikipedia.org\/wiki\/Geographic_coordinate_system"},{"key":"12_CR17","unstructured":"Wikipedia: Triangle (2016). \nhttps:\/\/en.wikipedia.org\/wiki\/Triangle"},{"key":"12_CR18","unstructured":"Wikipedia: Triangulation (2016). \nhttps:\/\/en.wikipedia.org\/wiki\/Triangulation"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, Cryptocurrencies and Blockchain Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67816-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,8,21]],"date-time":"2018-08-21T19:11:52Z","timestamp":1534878712000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67816-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319678153","9783319678160"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67816-0_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}