{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,14]],"date-time":"2025-12-14T16:10:16Z","timestamp":1765728616180,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,4,2]],"date-time":"2017-04-02T00:00:00Z","timestamp":1491091200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Research Foundation Prime Minister's Office Singapore"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,4,2]]},"DOI":"10.1145\/3052973.3053016","type":"proceedings-article","created":{"date-parts":[[2017,3,31]],"date-time":"2017-03-31T12:22:54Z","timestamp":1490962974000},"page":"408-422","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Proofs of Data Residency"],"prefix":"10.1145","author":[{"given":"Hung","family":"Dang","sequence":"first","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Erick","family":"Purwanto","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Ee-Chien","family":"Chang","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2017,4,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Australian privacy act. http:\/\/www.austlii.edu.au\/au\/legis\/cth\/consol_act\/pa1988108\/.  Australian privacy act. http:\/\/www.austlii.edu.au\/au\/legis\/cth\/consol_act\/pa1988108\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Business Insider. Amazon's cloud crash disaster permanently destroyed many customers$?$ data. http:\/\/www.businessinsider.com\/amazon-lost-data-2011-4?IR=T&r=US&IR=T.  Business Insider. Amazon's cloud crash disaster permanently destroyed many customers$?$ data. http:\/\/www.businessinsider.com\/amazon-lost-data-2011-4?IR=T&r=US&IR=T."},{"key":"e_1_3_2_1_3_1","unstructured":"Data protection directive. http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=URISERV%3Al14012.  Data protection directive. http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=URISERV%3Al14012."},{"key":"e_1_3_2_1_4_1","unstructured":"Google Drive. https:\/\/www.google.com\/drive\/.  Google Drive. https:\/\/www.google.com\/drive\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Ibm 4764 pci-x cryptographic coprocessor. http:\/\/www-03.ibm.com\/security\/cryptocards\/pcixcc\/overview.shtml.  Ibm 4764 pci-x cryptographic coprocessor. http:\/\/www-03.ibm.com\/security\/cryptocards\/pcixcc\/overview.shtml."},{"key":"e_1_3_2_1_6_1","unstructured":"Intel SGX. https:\/\/software.intel.com\/en-us\/sgx.  Intel SGX. https:\/\/software.intel.com\/en-us\/sgx."},{"key":"e_1_3_2_1_7_1","unstructured":"Intel SGX programming reference. https:\/\/software.intel.com\/sites\/default\/files\/managed\/48\/88\/329298-002.pdf.  Intel SGX programming reference. https:\/\/software.intel.com\/sites\/default\/files\/managed\/48\/88\/329298-002.pdf."},{"key":"e_1_3_2_1_8_1","unstructured":"Intel SGX SDK for Linux. https:\/\/github.com\/01org\/linux-sgx.  Intel SGX SDK for Linux. https:\/\/github.com\/01org\/linux-sgx."},{"key":"e_1_3_2_1_9_1","unstructured":"Intel Skylake processor. http:\/\/ark.intel.com\/products\/codename\/37572\/Skylake.  Intel Skylake processor. http:\/\/ark.intel.com\/products\/codename\/37572\/Skylake."},{"key":"e_1_3_2_1_10_1","unstructured":"PsPing. https:\/\/technet.microsoft.com\/en-us\/sysinternals\/psping.aspx.  PsPing. https:\/\/technet.microsoft.com\/en-us\/sysinternals\/psping.aspx."},{"key":"e_1_3_2_1_11_1","unstructured":"Traceroute. http:\/\/linux.die.net\/man\/8\/traceroute.  Traceroute. http:\/\/linux.die.net\/man\/8\/traceroute."},{"volume-title":"HASP","year":"2013","author":"Anati I.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315318"},{"volume-title":"OSDI","year":"2014","author":"Baumann A.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046677"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655015"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046766"},{"volume-title":"IDAACS","year":"2003","author":"Connolly G.","key":"e_1_3_2_1_18_1"},{"volume-title":"USENIX Security","year":"2015","author":"Dinh T. T. A.","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_8"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653688"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435353"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"K. Harrenstien M. K. Stahl and E. J. Feinler. NICNAME\/WHOIS. RFC-954 1985.   K. Harrenstien M. K. Stahl and E. J. Feinler. NICNAME\/WHOIS. RFC-954 1985.","DOI":"10.17487\/rfc0954"},{"key":"e_1_3_2_1_24_1","unstructured":"C. Houri. Method and systems for locating geographical locations of online users 2003. US Patent 6 665 715.  C. Houri. Method and systems for locating geographical locations of online users 2003. US Patent 6 665 715."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/571697.571725"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.37"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2005.71"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383073"},{"volume-title":"HotCloud","year":"2011","author":"Peterson Z. N.","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"J. Postel. User datagram protocol. 1980.  J. Postel. User datagram protocol. 1980.","DOI":"10.17487\/rfc0768"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"J. Postel. Transmission control protocol. 1981.  J. Postel. Transmission control protocol. 1981.","DOI":"10.17487\/rfc0793"},{"journal-title":"Polynomial codes over certain finite fields. J. SIAM","year":"1960","author":"Reed I. S.","key":"e_1_3_2_1_33_1"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.10"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2833312.2833317"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-012-9129-2"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516669"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414503"},{"key":"e_1_3_2_1_39_1","unstructured":"I. N. Yezhkova. Worldwide and U.S. enterprise storage systems forecast update 2015--2019. White Paper. 2015.  I. N. Yezhkova. Worldwide and U.S. enterprise storage systems forecast update 2015--2019. White Paper. 2015."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978326"}],"event":{"name":"ASIA CCS '17: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Abu Dhabi United Arab Emirates","acronym":"ASIA CCS '17"},"container-title":["Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3052973.3053016","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3052973.3053016","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:36:58Z","timestamp":1750217818000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3052973.3053016"}},"subtitle":["Checking whether Your Cloud Files Have Been Relocated"],"short-title":[],"issued":{"date-parts":[[2017,4,2]]},"references-count":40,"alternative-id":["10.1145\/3052973.3053016","10.1145\/3052973"],"URL":"https:\/\/doi.org\/10.1145\/3052973.3053016","relation":{},"subject":[],"published":{"date-parts":[[2017,4,2]]},"assertion":[{"value":"2017-04-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}