{"id":"https://openalex.org/W3093855159","doi":"https://doi.org/10.1109/iscc50000.2020.9219563","title":"DPVGeo: Delay-based Public Verification of Cloud Data Geolocation","display_name":"DPVGeo: Delay-based Public Verification of Cloud Data Geolocation","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3093855159","doi":"https://doi.org/10.1109/iscc50000.2020.9219563","mag":"3093855159"},"language":"en","primary_location":{"id":"doi:10.1109/iscc50000.2020.9219563","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc50000.2020.9219563","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044503915","display_name":"Dongzheng Jia","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dongzheng Jia","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, CAS, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, CAS, Beijing, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100354704","display_name":"Yang Zhang","orcid":"https://orcid.org/0000-0002-6341-4206"},"institutions":[{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Zhang","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, CAS, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, CAS, Beijing, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101824334","display_name":"Shijie Jia","orcid":"https://orcid.org/0000-0002-4262-9478"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shijie Jia","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, CAS, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, CAS, Beijing, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100388518","display_name":"Limin Liu","orcid":"https://orcid.org/0000-0001-5610-6443"},"institutions":[{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Limin Liu","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, CAS, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, CAS, Beijing, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036002145","display_name":"Jingqiang Lin","orcid":"https://orcid.org/0000-0003-1508-4879"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingqiang Lin","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, CAS, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, CAS, Beijing, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5044503915"],"corresponding_institution_ids":["https://openalex.org/I4210126530","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.2669,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.65913246,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"19","issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8274502158164978},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7925163507461548},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.6390042304992676},{"id":"https://openalex.org/keywords/geolocation","display_name":"Geolocation","score":0.6302452087402344},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.5734183192253113},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5451880693435669},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.5031260848045349},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.34099310636520386},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.3059062659740448},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.147159606218338},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.09930115938186646}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8274502158164978},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7925163507461548},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.6390042304992676},{"id":"https://openalex.org/C22041718","wikidata":"https://www.wikidata.org/wiki/Q638949","display_name":"Geolocation","level":2,"score":0.6302452087402344},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.5734183192253113},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5451880693435669},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.5031260848045349},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34099310636520386},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.3059062659740448},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.147159606218338},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.09930115938186646},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscc50000.2020.9219563","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc50000.2020.9219563","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W631122643","https://openalex.org/W1550039286","https://openalex.org/W1565307912","https://openalex.org/W1583826078","https://openalex.org/W1983508610","https://openalex.org/W1991771901","https://openalex.org/W2000135775","https://openalex.org/W2016242872","https://openalex.org/W2038704326","https://openalex.org/W2040784095","https://openalex.org/W2062878368","https://openalex.org/W2079493184","https://openalex.org/W2083375560","https://openalex.org/W2102881299","https://openalex.org/W2115819049","https://openalex.org/W2123069643","https://openalex.org/W2129430465","https://openalex.org/W2142928963","https://openalex.org/W2143460217","https://openalex.org/W2167868809","https://openalex.org/W2527358790","https://openalex.org/W2598303068","https://openalex.org/W2795807997","https://openalex.org/W3000032648","https://openalex.org/W3024271340","https://openalex.org/W4255122578","https://openalex.org/W6620210869","https://openalex.org/W6632867602"],"related_works":["https://openalex.org/W2163194970","https://openalex.org/W3105229732","https://openalex.org/W2799094075","https://openalex.org/W2945387931","https://openalex.org/W2187946387","https://openalex.org/W2892370851","https://openalex.org/W2052024186","https://openalex.org/W2939141610","https://openalex.org/W2382515644","https://openalex.org/W1930396972"],"abstract_inverted_index":{"Knowing":[0],"the":[1,39,48,60,74,104,122,136,144,162,169,189,214],"geolocation":[2,81,106,163],"of":[3,84,107,164,205,216],"cloud":[4,13,40,44,75,92,108,165,235],"data":[5,30,37,61,64,76,93,109,166],"becomes":[6],"an":[7,116],"urgent":[8],"problem,":[9],"which":[10,98,120],"relates":[11],"to":[12,38,58,62,102,148,160,186,212],"user":[14],"equity":[15],"(e.g.,":[16,21,27,192],"service":[17,19,41,45,236],"compliance),":[18],"performance":[20,215],"disaster":[22],"tolerance)":[23],"and":[24,53,56,132,141,180,197,222,231],"government":[25],"regulations":[26],"GDPR).":[28],"Unfortunately,":[29],"owners":[31],"lose":[32],"physical":[33],"control":[34],"after":[35],"outsourcing":[36,193],"providers,":[42],"while":[43],"providers":[46],"have":[47],"motivation":[49],"(reducing":[50],"economic":[51],"costs":[52],"maximizing":[54],"profits)":[55],"ability":[57],"move":[59],"other":[63],"centers":[65],"in":[66,78,208],"different":[67],"geolocations.":[68],"As":[69],"a":[70,79,90,156,203],"consequence,":[71],"verifying":[72],"whether":[73],"are":[77],"specific":[80],"is":[82,229],"worthy":[83],"concern.In":[85],"this":[86],"paper,":[87],"we":[88,113,154,176,201],"propose":[89],"novel":[91],"public":[94],"verification":[95],"scheme,":[96],"DPVGeo,":[97,112],"allows":[99],"any":[100],"entity":[101],"verify":[103,161],"actual":[105],"remotely.":[110],"In":[111],"first":[114],"design":[115],"atomic":[117,130],"proof":[118,123],"method,":[119],"divides":[121],"into":[124],"several":[125],"minimum":[126],"computation":[127],"units":[128],"(i.e.,":[129,139],"proof),":[131],"subtly":[133],"only":[134],"considers":[135],"normal":[137],"operations":[138],"addition":[140],"multiplication),":[142],"ignoring":[143],"time-consuming":[145],"exponentiation":[146],"operations,":[147],"obtain":[149],"accurate":[150],"response":[151,170],"delay.":[152],"Second,":[153],"utilize":[155],"thresholdbased":[157],"closest-shortest":[158],"approach":[159],"based":[167],"on":[168],"delay":[171],"with":[172],"high":[173],"accuracy.":[174],"Besides,":[175],"select":[177],"both":[178],"blocks":[179],"sectors":[181],"randomly":[182],"during":[183],"each":[184],"challenge":[185],"defend":[187],"against":[188,233],"potential":[190],"attacks":[191],"attack,":[194],"generation":[195],"attack":[196],"replay":[198],"attack).":[199],"Finally,":[200],"perform":[202],"series":[204],"prototype":[206],"implementations":[207],"real":[209],"network":[210],"environment":[211],"validate":[213],"our":[217,227],"design.":[218],"The":[219],"experimental":[220],"results":[221],"security":[223],"analysis":[224],"show":[225],"that":[226],"scheme":[228],"efficient":[230],"secure":[232],"semi-honest":[234],"providers.":[237]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
