{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,14]],"date-time":"2025-12-14T16:07:31Z","timestamp":1765728451963,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,19]],"date-time":"2012-10-19T00:00:00Z","timestamp":1350604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,19]]},"DOI":"10.1145\/2381913.2381926","type":"proceedings-article","created":{"date-parts":[[2012,10,19]],"date-time":"2012-10-19T13:41:01Z","timestamp":1350654061000},"page":"59-70","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["LoSt"],"prefix":"10.1145","author":[{"given":"Gaven J.","family":"Watson","sequence":"first","affiliation":[{"name":"University of Bristol, Bristol, United Kingdom"}]},{"given":"Reihaneh","family":"Safavi-Naini","sequence":"additional","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]},{"given":"Mohsen","family":"Alimomeni","sequence":"additional","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]},{"given":"Michael E.","family":"Locasto","sequence":"additional","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]},{"given":"Shivaramakrishnan","family":"Narayan","sequence":"additional","affiliation":[{"name":"Optimal Payments, Calgary, AB, Canada"}]}],"member":"320","published-online":{"date-parts":[[2012,10,19]]},"reference":[{"unstructured":"Amazon web services (AWS). http:\/\/aws.amazon.com.  Amazon web services (AWS). http:\/\/aws.amazon.com.","key":"e_1_3_2_1_1_1"},{"unstructured":"Planet-lab. http:\/\/www.planet-lab.org\/.  Planet-lab. http:\/\/www.planet-lab.org\/.","key":"e_1_3_2_1_2_1"},{"unstructured":"Storage resource broker (SRB). http:\/\/www.sdsc.edu\/srb\/.  Storage resource broker (SRB). http:\/\/www.sdsc.edu\/srb\/.","key":"e_1_3_2_1_3_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1007\/978-3-642-10366-7_19"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/2046660.2046677"},{"doi-asserted-by":"crossref","unstructured":"Dan\n      Boneh Ben\n      Lynn and \n      Hovav\n      Shacham\n    .\n  Short signatures from the weil pairing\n  . In Colin Boyd editor ASIACRYPT volume \n  2248\n   of \n  Lecture Notes in Computer Science pages \n  514\n  --\n  532\n  . \n  Springer 2001\n  .   Dan Boneh Ben Lynn and Hovav Shacham. Short signatures from the weil pairing. In Colin Boyd editor ASIACRYPT volume 2248 of Lecture Notes in Computer Science pages 514--532. Springer 2001.","key":"e_1_3_2_1_7_1","DOI":"10.1007\/3-540-45682-1_30"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/1655008.1655015"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/2046707.2046766"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/ICDCS.2008.68"},{"unstructured":"M. Geist. Location matters up in the cloud. http:\/\/www.thestar.com\/business\/article\/901068-geist-location-matters-up-in-the-cloud.  M. Geist. Location matters up in the cloud. http:\/\/www.thestar.com\/business\/article\/901068-geist-location-matters-up-in-the-cloud.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","first-page":"241","volume-title":"USENIX Security Symposium","author":"Gill P.","year":"2010","unstructured":"P. Gill , Y. Ganjali , B. Wong , and D. Lie . Dude, where's that IP? circumventing measurement-based IP geolocation . In USENIX Security Symposium , pages 241 -- 256 , 2010 . P. Gill, Y. Ganjali, B. Wong, and D. Lie. Dude, where's that IP? circumventing measurement-based IP geolocation. In USENIX Security Symposium, pages 241--256, 2010."},{"unstructured":"Canadian Government. Personal information protection and electronic documents act. http:\/\/laws-lois.justice.gc.ca\/PDF\/P-8.6.pdf.  Canadian Government. Personal information protection and electronic documents act. http:\/\/laws-lois.justice.gc.ca\/PDF\/P-8.6.pdf.","key":"e_1_3_2_1_13_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/1315245.1315317"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/1177080.1177090"},{"unstructured":"Terry Lavender. Getting the surveymonkey off our backs. http:\/\/www.vancouverobserver.com\/blogs\/megabytes\/2011\/05\/05\/getting-surveymonkey-our-backs.  Terry Lavender. Getting the surveymonkey off our backs. http:\/\/www.vancouverobserver.com\/blogs\/megabytes\/2011\/05\/05\/getting-surveymonkey-our-backs.","key":"e_1_3_2_1_16_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1109\/SFCS.2005.12"},{"key":"e_1_3_2_1_18_1","first-page":"2011","author":"Peterson Z. N. J.","year":"2011","unstructured":"Z. N. J. Peterson , M. Gondree , and R. Beverly . A position paper on data sovereignty: The importance of geolocating data in the cloud. In USENIX Hot Cloud 2011 , 2011 . Z. N. J. Peterson, M. Gondree, and R. Beverly. A position paper on data sovereignty: The importance of geolocating data in the cloud. In USENIX Hot Cloud 2011, 2011.","journal-title":"In USENIX Hot Cloud"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1007\/978-3-540-89255-7_7"},{"key":"e_1_3_2_1_20_1","volume-title":"NSDI","author":"Wong B.","year":"2007","unstructured":"B. Wong , I. Stoyanov , and E. G\u00fcn Sirer . Octant: A comprehensive framework for the geolocalization of internet hosts . In NSDI , 2007 . B. Wong, I. Stoyanov, and E. G\u00fcn Sirer. Octant: A comprehensive framework for the geolocalization of internet hosts. In NSDI, 2007."}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CCS'12","name":"CCS'12: the ACM Conference on Computer and Communications Security","location":"Raleigh North Carolina USA"},"container-title":["Proceedings of the 2012 ACM Workshop on Cloud computing security workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381913.2381926","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2381913.2381926","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:40Z","timestamp":1750239280000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381913.2381926"}},"subtitle":["location based storage"],"short-title":[],"issued":{"date-parts":[[2012,10,19]]},"references-count":19,"alternative-id":["10.1145\/2381913.2381926","10.1145\/2381913"],"URL":"https:\/\/doi.org\/10.1145\/2381913.2381926","relation":{},"subject":[],"published":{"date-parts":[[2012,10,19]]},"assertion":[{"value":"2012-10-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}