Paper 2023/999

Enforcing Data Geolocation Policies in Public Cloud using Trusted Computing

Syed Zair Abbas, National University of Computer and Emerging Sciences
Mudassar Aslam, National University of Computer and Emerging Sciences
Abstract

With the advancement in technology, Cloud computing always amazes the world with revolutionizing solutions that automate and simplify complex computational tasks. The advantages like no maintenance cost, accessibility, data backup, pay-per-use models, unlimited storage, and processing power encourage individuals and businesses to migrate their workload to the cloud. Despite the numerous advantages of cloud computing, the geolocation of data in the cloud environment is a massive concern, which relates to the performance and government legislation that will be applied to data. The unclarity of data geolocation can cause compliance concerns. In this work, we have presented a technique that will allow users to restrict the geolocation of their data in the cloud environment. We have used trusted computing mechanisms to attest the host and its geolocation remotely. With this model, the user will upload the data whose decryption key will be shared with a third-party attestation server only. The decryption key will be sealed to the TPM of the host after successful attestation guaranteeing the authorized geolocation and platform state.

Note: This is a pre-print copy of the original work. The complete study will be published soon in Journal of Information Security and Applications

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Preprint.
Keywords
Data GeolocationCloud ComputingTrusted Platform Module
Contact author(s)
i212060 @ nu edu pk
mudassar aslam @ nu edu pk
History
2023-06-27: approved
2023-06-27: received
See all versions
Short URL
https://ia.cr/2023/999
License
Creative Commons Attribution-NonCommercial-NoDerivs
CC BY-NC-ND

BibTeX

@misc{cryptoeprint:2023/999,
      author = {Syed Zair Abbas and Mudassar Aslam},
      title = {Enforcing Data Geolocation Policies in Public Cloud using Trusted Computing},
      howpublished = {Cryptology {ePrint} Archive, Paper 2023/999},
      year = {2023},
      url = {https://eprint.iacr.org/2023/999}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.