Advances, Systems and Applications
From: Landmark-based data location verification in the cloud: review of approaches and challenges
Blocking | Malicious | VM | Forging | Caching | Concealed | ||||
---|---|---|---|---|---|---|---|---|---|
verification | proxy | misappropriation | RTT | data | connection | ||||
Landmarks | Trace service | No interaction | With interaction | Random | Requester-location aware | ||||
Biswal2015 [27] | × | × | × | × | × | × | × | ||
Ries2011 [24] | × | × | × | × | × | × | × | ||
Fotouhi2015 [10] | × | × | × | × | × | × | × | × | |
Jaiswal2016 [22] | × | × | × | × | × | × | |||
Benson2011 [25] | × | × | × | × | × | × | |||
Gondree2013 [26] | × | × | × | × | |||||
Watson2012 [21] | × | × | × | × | |||||
Eskandari2014 [23] | × | × | × | × | × |