Efficient verification of edge data integrity in edge computing environment

Cui, Guangming, He, Qiang, Li, Bo, Xia, Xiaoyu, Chen, Feifei, Jin, Hai, Xiang, Yang and Yang, Yun 2021, Efficient verification of edge data integrity in edge computing environment, IEEE transactions on services computing, pp. 1-12, doi: 10.1109/tsc.2021.3090173.

Attached Files
Name Description MIMEType Size Downloads

Title Efficient verification of edge data integrity in edge computing environment
Author(s) Cui, Guangming
He, Qiang
Li, Bo
Xia, XiaoyuORCID iD for Xia, Xiaoyu orcid.org/0000-0003-3526-3217
Chen, FeifeiORCID iD for Chen, Feifei orcid.org/0000-0001-5455-3792
Jin, Hai
Xiang, Yang
Yang, Yun
Journal name IEEE transactions on services computing
Start page 1
End page 12
Total pages 12
Publisher Institute of Electrical and Electronics Engineers
Place of publication Piscataway, N.J.
Publication date 2021-06-17
ISSN 2372-0204
Keyword(s) edge data integrity
edge computing
service vendor
privacy-protection
Summary Edge computing, as a new computing paradigm that extends cloud computing, allows a service vendor to deploy its services on distributed edge servers to serve its service users in close geographic proximity to those edge servers. Caching edge data on edge servers can minimize service users data retrieval latency. However, such edge data are subject to intentional and accidental corruption in the highly distributed and dynamic edge computing environment. Verifying the integrity of service vendors edge data accurately and efficiently is a critical security problem. Given a potentially large number of edge servers and their limited computing capacities, verifying the integrity of the edge data on each edge server individually is computation expensive. In this paper, we make the first attempt to tackle this Edge Data Integrity (EDI) problem from the service vendors perspective by proposing an inspection and corruption localization scheme for EDI named ICL-EDI. This scheme allows a service vendor to inspect its edge data and localize corrupted edge data on multiple edge servers accurately and efficiently. To evaluate its performance, we implement ICL-EDI and conduct extensive experiments to demonstrate its effectiveness and efficiency.
Notes In Press article
Language eng
DOI 10.1109/tsc.2021.3090173
Indigenous content off
Field of Research 0803 Computer Software
0805 Distributed Computing
0806 Information Systems
HERDC Research category C1 Refereed article in a scholarly journal
Persistent URL http://hdl.handle.net/10536/DRO/DU:30152753

Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 20 Abstract Views, 2 File Downloads  -  Detailed Statistics
Created: Tue, 22 Jun 2021, 11:03:31 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.