Fig. 9From: Landmark-based data location verification in the cloud: review of approaches and challengesPotential attacks on the verification processBack to article page