Skip to main content

Advances, Systems and Applications

Table 3 Vulnerabilities to attacks of analyzed approaches

From: Landmark-based data location verification in the cloud: review of approaches and challenges

 

Blocking

Malicious

VM

Forging

Caching

Concealed

 

verification

proxy

misappropriation

RTT

data

connection

 

Landmarks

Trace service

No interaction

With interaction

 

Random

Requester-location aware

  

Biswal2015 [27]

×

×

×

  

×

×

×

×

Ries2011 [24]

×

×

×

  

×

×

×

×

Fotouhi2015 [10]

×

×

×

 

×

×

×

×

×

Jaiswal2016 [22]

×

  

×

 

×

×

×

×

Benson2011 [25]

×

  

×

 

×

×

×

×

Gondree2013 [26]

×

    

×

×

 

×

Watson2012 [21]

×

    

×

×

 

×

Eskandari2014 [23]

    

×

×

×

×

×

  1. ×: the proposed solution is vulnerable to the attack; an empty case means no vulnerability