, Amazon Elastic Compute Cloud (EC2), 2017.

. Google-compute-engine, , 2017.

, Heroku Cloud Application Platform, 2017.

, Microsoft Azure Cloud computing plaftorm & services, 2017.

, Trello Project Management Application, 2017.

G. By and G. Cloud, , 2017.

, Canada Personal Information Protection and Electronic Documents Act, 2017.

, /679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, 2016.

, USA Health Insurance Portability and Accountability Act, 2017.

M. Fotouhi, A. Anand, and R. Hasan, PLAG: Practical Landmark Allocation for Cloud Geolocation, 2015 IEEE 8th International Conference on Cloud Computing (CLOUD). IEEE, pp.1103-1106, 2015.

. Aws-aws-cloud-compliance, , 2017.

R. Businessnews, , 2017.

, Service Level Agreement Standardisation Guidelines EuropeanCommission, 2014.

, Internet Protocol Address (IP) Geolocation Bibliography, 2017.

P. Massonet, S. Naqvi, C. Ponsard, J. Latanicki, B. Rochwerger et al., Monitoring and Audit Logging Architecture for Data Location Compliance in Federated Cloud Infrastructures, 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW), pp.1510-1517, 2011.

S. Betgé-brezetz, G. B. Kamga, M. P. Dupont, and A. Guesmi, Privacy Control in Cloud VM File Systems, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom), vol.2, pp.276-280, 2013.

T. Wüchner, S. Müller, and R. Fischer, Compliance-Preserving Cloud Storage Federation Based on Data-Driven Usage Control, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom), vol.2, pp.285-288, 2013.

A. Albeshri, C. Boyd, and J. G. Nieto, GeoProof: Proofs of Geographic Location for Cloud Computing Environment, 32nd International Conference on Distributed Computing Systems Workshops (ICDCSW). IEEE, pp.506-514, 2012.

C. Krauß and V. Fusenig, Using Trusted Platform Modules for Location Assurance in Cloud Networking, Network and System Security: 7th International Conference, pp.109-121, 2004.

M. Bartock, M. Souppaya, R. Yeluri, U. Shetty, J. Greene et al., Trusted Geolocation in the Cloud: Proof of Concept Implementation. Publication NISTIR 7904, 2015.

G. J. Watson, R. Safavi-naini, M. Alimomeni, M. E. Locasto, and S. Narayan, LoSt: Location Based Storage, Proceedings of the 2012 ACM Workshop on Cloud Computing Security Workshop, CCSW '12, pp.59-70, 2012.

C. Jaiswal and V. Kumar, Special Issues on Security and Privacy in Cloud Computing, J Inf Secur Appl, vol.27, pp.85-102, 2016.

M. Eskandari, A. Oliveira, and B. Crispo, VLOC: An Approach to Verify the Physical Location of a Virtual Machine In Cloud, 2014 IEEE 6th International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, pp.86-94, 2014.

T. Ries, V. Fusenig, C. Vilbois, and T. Engel, Verification of Data Location in Cloud Networking, 2011 Fourth IEEE International Conference on Utility and Cloud Computing. IEEE, pp.439-444, 2011.

K. Benson, R. Dowsley, and H. Shacham, Do You Know Where Your Cloud Files Are?, Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, CCSW '11, pp.73-82, 2011.

M. Gondree and Z. Peterson, Geolocation of Data in the Cloud, Proceedings of the Third ACM Conference on Data and Application Security and Privacy, CODASPY '13, pp.25-36, 2013.

B. Biswal, S. Shetty, and T. Rogers, Enhanced Learning Classifier to Locate Data in Cloud Data Centres, Int J Metaheuristics, vol.4, issue.2, pp.141-158, 2015.

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner et al., Provable Data Possession at Untrusted Stores, Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07, pp.598-609, 2007.

M. Achemlal, S. Gharout, and C. Gaber, IEEE (ed) Trusted Platform Module as an Enabler for Security in Cloud Computing, 2011 Conference on Network and Information Systems Security, pp.1-6, 2011.

P. Gill, Y. Ganjali, B. Wong, and D. Lie, Dude, Where's That IP?: Circumventing Measurement-based IP Geolocation, Proceedings of the 19th USENIX Conference on Security, USENIX Security'10. USENIX Association, pp.16-16, 2010.