{"id":"https://openalex.org/W2598303068","doi":"https://doi.org/10.1145/3052973.3053016","title":"Proofs of Data Residency","display_name":"Proofs of Data Residency","publication_year":2017,"publication_date":"2017-03-31","ids":{"openalex":"https://openalex.org/W2598303068","doi":"https://doi.org/10.1145/3052973.3053016","mag":"2598303068"},"language":"en","primary_location":{"id":"doi:10.1145/3052973.3053016","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3052973.3053016","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013241108","display_name":"Hung Dang","orcid":null},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Hung Dang","raw_affiliation_strings":["National University of Singapore, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"National University of Singapore, Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026022068","display_name":"Erick Purwanto","orcid":null},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Erick Purwanto","raw_affiliation_strings":["National University of Singapore, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"National University of Singapore, Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5105408906","display_name":"Ee\u2010Chien Chang","orcid":"https://orcid.org/0000-0003-4613-0866"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Ee-Chien Chang","raw_affiliation_strings":["National University of Singapore, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"National University of Singapore, Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5013241108"],"corresponding_institution_ids":["https://openalex.org/I165932596"],"apc_list":null,"apc_paid":null,"fwci":3.3854,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.93400203,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"408","last_page":"422"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6555063724517822},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.6418407559394836},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3471747636795044},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13588079810142517}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6555063724517822},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.6418407559394836},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3471747636795044},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13588079810142517},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3052973.3053016","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3052973.3053016","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.4399999976158142}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1480620864","https://openalex.org/W1539733036","https://openalex.org/W1540641082","https://openalex.org/W1550039286","https://openalex.org/W1569778844","https://openalex.org/W1674145689","https://openalex.org/W1852007091","https://openalex.org/W1892267956","https://openalex.org/W1965540627","https://openalex.org/W1978649650","https://openalex.org/W1995672990","https://openalex.org/W2009217060","https://openalex.org/W2022062661","https://openalex.org/W2027703952","https://openalex.org/W2038704326","https://openalex.org/W2058231031","https://openalex.org/W2079493184","https://openalex.org/W2083375560","https://openalex.org/W2102881299","https://openalex.org/W2116976991","https://openalex.org/W2129430465","https://openalex.org/W2144140331","https://openalex.org/W2148575324","https://openalex.org/W2261664117","https://openalex.org/W2533941064","https://openalex.org/W4230038347","https://openalex.org/W4236546623","https://openalex.org/W4251169002"],"related_works":["https://openalex.org/W4243252198","https://openalex.org/W2135396778","https://openalex.org/W2109507516","https://openalex.org/W1527862632","https://openalex.org/W2118300983","https://openalex.org/W2112962394","https://openalex.org/W3137189469","https://openalex.org/W2740990710","https://openalex.org/W4235530921","https://openalex.org/W2382501300"],"abstract_inverted_index":{"While":[0],"cloud":[1],"storage":[2,49,78,83],"services":[3],"offer":[4],"manifold":[5],"benefits":[6],"such":[7,21,54],"as":[8,146,208,210],"cost-effectiveness":[9],"or":[10,80],"elasticity,":[11],"there":[12],"also":[13],"exist":[14],"various":[15],"security":[16,58,190,212],"and":[17,108,126,160,204],"privacy":[18],"concerns.":[19],"Among":[20],"concerns,":[22],"we":[23,139,193],"pay":[24],"our":[25,214],"primary":[26],"attention":[27],"to":[28,38,69,86,135,197,201],"data":[29,37,73,89,99],"residency":[30,100],"--":[31],"a":[32,48,57,118,141,147],"notion":[33,55],"that":[34,97,109],"requires":[35],"outsourced":[36],"be":[39,67],"retrievable":[40],"in":[41,90,128,169,176],"its":[42],"entirety":[43],"from":[44],"local":[45],"drives":[46],"of":[47,62,154,166,173,213],"server":[50,84],"in-question.":[51],"We":[52,93,123],"formulate":[53],"under":[56],"model":[59],"called":[60],"Proofs":[61],"Data":[63],"Residency":[64],"(PoDR).":[65],"can":[66],"employed":[68],"check":[70],"whether":[71],"the":[72,88,91,98,155,171,183,187,206,211],"are":[74],"replicated":[75],"across":[76],"different":[77],"servers,":[79],"combined":[81],"with":[82,186],"geolocation":[85],"\"locate\"":[87],"cloud.":[92],"make":[94],"key":[95],"observations":[96],"checking":[101],"protocol":[102,129],"should":[103,112],"exclude":[104],"all":[105],"server-side":[106],"computation":[107],"each":[110],"challenge":[111],"ask":[113],"for":[114],"no":[115],"more":[116],"than":[117],"single":[119],"atomic":[120],"fetching":[121],"operation.":[122],"illustrate":[124],"challenges":[125],"subtleties":[127],"design":[130],"by":[131],"showing":[132],"potential":[133,199],"attacks":[134,200],"naive":[136],"constructions.":[137],"Next,":[138],"present":[140],"secure":[142],"PoDR":[143],"scheme":[144],"structured":[145],"timed":[148,178],"challenge-response":[149,179],"protocol.":[150],"Two":[151],"implementation":[152],"variants":[153],"proposed":[156],"solution,":[157],"namely":[158],"NVeri":[159],"EVeri,":[161],"describe":[162],"an":[163],"interesting":[164],"use-case":[165],"trusted":[167],"computing,":[168],"particular":[170],"use":[172],"Intel":[174],"SGX,":[175],"cryptographic":[177],"protocols":[180],"whereby":[181],"having":[182],"verifier":[184],"co-locating":[185],"prover":[188],"offers":[189],"enhancement.":[191],"Finally,":[192],"conduct":[194],"extensive":[195],"experiments":[196],"exhibit":[198],"insecure":[202],"constructions":[203],"validate":[205],"performance":[207],"well":[209],"solution.":[215]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
