, Canada: Personal information protection and electronic documents act, p.16, 2017.

, on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95/46/ec (general data protection regulation), vol.27, p.16, 2016.

M. Achemlal, S. Gharout, and C. Gaber, Trusted platform module as an enabler for security in cloud computing, 2011 Conference on Network and Information Systems Security, pp.1-6, 2011.
URL : https://hal.archives-ouvertes.fr/hal-01004365

A. Albeshri, C. Boyd, and J. G. Nieto, Geoproof: Proofs of geographic location for cloud computing environment, Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on, pp.506-514, 2012.

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner et al., Provable data possession at untrusted stores, Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07, pp.598-609, 2007.

M. Bartock, M. Souppaya, R. Yeluri, U. Shetty, J. Greene et al., Trusted geolocation in the cloud: Proof of concept implementation, Nat. Instit. Stand. Technol. Internal Report, vol.7904, 2015.

K. Benson, R. Dowsley, and H. Shacham, Do you know where your cloud files are?, Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, CCSW '11, pp.73-82, 2011.

S. Betgé-brezetz, G. B. Kamga, M. P. Dupont, and A. Guesmi, Privacy control in cloud vm file systems, Cloud Computing Technology and Science (CloudCom), vol.2, pp.276-280, 2013.

B. Biswal, S. Shetty, and T. Rogers, Enhanced learning classifier to locate data in cloud datacenters, IEEE 3rd International Conference on, pp.375-380, 2014.

M. Eskandari, A. S. Oliveira, and B. Crispo, Vloc: An approach to verify the physical location of a virtual machine in cloud, Cloud Computing Technology and Science (CloudCom), pp.86-94, 2014.

M. Fotouhi, A. Anand, and R. Hasan, Plag: Practical landmark allocation for cloud geolocation, IEEE 8th International Conference on, pp.1103-1106, 2015.

P. Gill, Y. Ganjali, B. Wong, and D. Lie, Dude, where's that ip?: Circumventing measurement-based ip geolocation, Proceedings of the 19th USENIX Conference on Security, USENIX Security'10, pp.16-16, 2010.

M. Gondree and Z. N. Peterson, Geolocation of data in the cloud, Proceedings of the Third ACM Conference on Data and Application Security and Privacy, CODASPY '13, pp.25-36, 2013.

C. Jaiswal and V. Kumar, Igod: Identification of geolocation of cloud datacenters, IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops), pp.665-672, 2015.

C. Krauß, V. Fusenig, S. Network, and . Security, Proceedings, chapter Using Trusted Platform Modules for Location Assurance in Cloud Networking, pp.109-121, 2013.

P. Massonet, S. Naqvi, C. Ponsard, J. Latanicki, B. Rochwerger et al., A monitoring and audit logging architecture for data location compliance in federated cloud infrastructures, Parallel and Distributed Processing Workshops and Phd Forum, p.2011

, IEEE International Symposium on, pp.1510-1517, 2011.

T. Ries, V. Fusenig, C. Vilbois, and T. Engel, Verification of data location in cloud networking, 2011 Fourth IEEE International Conference on Utility and Cloud Computing, pp.439-444, 2011.

G. J. Watson, R. Safavi-naini, M. Alimomeni, M. E. Locasto, and S. Narayan, Lost: Location based storage, Proceedings of the 2012 ACM Workshop on Cloud Computing Security Workshop, CCSW '12, pp.59-70, 2012.

T. Wüchner, S. Müller, and R. Fischer, Compliance-preserving cloud storage federation based on data-driven usage control, Cloud Computing Technology and Science (CloudCom), vol.2, pp.285-288, 2013.