4.7 Article

Auditing Cache Data Integrity in the Edge Computing Environment

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

READ: Robustness-Oriented Edge Application Deployment in Edge Computing Environment

Bo Li et al.

Summary: This article introduces the concept and advantages of edge computing, and proposes the problem of robustness-oriented edge application deployment. Through mathematical modeling and algorithm design, precise and approximate solutions are provided to solve this problem. Experimental results demonstrate the effectiveness of the proposed methods on real-world datasets.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Computer Science, Information Systems

Interference-Aware SaaS User Allocation Game for Edge Computing

Guangming Cui et al.

Summary: Edge computing is a promising paradigm that minimizes network latency and energy consumption by allocating users to nearby servers. However, allocating too many users may cause interference and impact data rates. In this article, a game-theoretic approach is proposed to solve this problem, and a decentralized algorithm is designed to find the optimal solution.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2022)

Article Computer Science, Information Systems

Trading off Between User Coverage and Network Robustness for Edge Server Placement

Guangming Cui et al.

Summary: This article investigates the problem of edge server placement, aiming to deploy multiple edge servers within a specific geographic area to maximize user coverage and ensure network robustness. The authors propose an optimal approach and an approximation approach, and evaluate their performance through experiments.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2022)

Article Computer Science, Information Systems

Distributed Redundant Placement for Microservice-based Applications at the Edge

Hailiang Zhao et al.

Summary: Multi-access edge computing (MEC) is a promising paradigm that pushes computation and communication resources to the network edge. We propose a distributed redundant placement framework and a GA-based Server Selection (GASS) algorithm for microservice-based applications. Numerical results based on real-world dataset confirm the superiority of our proposed approach over benchmark policies.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Computer Science, Information Systems

Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage

Jiguo Li et al.

Summary: To increase the availability and durability of outsourced data, many customers store multiple copies on multiple cloud servers. Existing PDP protocols mainly focus on single-copy storage and rely on PKI technique, which has security vulnerabilities and high communication/computational costs. In this paper, we propose a novel identity-based PDP scheme for multi-copy on multiple cloud storage servers, achieving both security and efficiency.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2022)

Article Computer Science, Theory & Methods

Cost-Effective App Data Distribution in Edge Computing

Xiaoyu Xia et al.

Summary: In this article, the Edge Data Distribution (EDD) problem is formulated as a constrained optimization problem from the app vendor's perspective, and two algorithms are proposed to solve the problem efficiently. Experimental results show that these two algorithms significantly outperform three representative approaches on a real-world dataset.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2021)

Article Computer Science, Theory & Methods

Online Collaborative Data Caching in Edge Computing

Xiaoyu Xia et al.

Summary: In the edge computing environment, caching data on edge servers can reduce latency for app users, but the limited resources of edge servers pose a challenge. This article investigates the collaborative caching problem in this environment and proposes an online algorithm, CEDC-O, which outperforms four representative approaches according to real-world data set evaluation.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2021)

Article Computer Science, Information Systems

Optimal Application Deployment in Resource Constrained Distributed Edges

Shuiguang Deng et al.

Summary: This paper discusses the deployment of microservice-based applications in the MEC environment and proposes an approach to optimize deployment costs while considering resource constraints and performance requirements. Through a series of experiments, it is shown that the approach can improve the average response time of mobile services.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2021)

Article Computer Science, Hardware & Architecture

Dynamic Group-Oriented Provable Data Possession in the Cloud

Kun He et al.

Summary: The research introduces the first public auditing scheme for shared data in cloud storage, named PRAYS, which supports fully dynamic operations and achieves constant storage cost for the verifiers. The scheme utilizes a new paradigm for remote data integrity checking, including a specially designed authenticated structure and a novel cryptographic primitive. Extensive evaluation demonstrates the efficiency of PRAYS compared to existing solutions.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Theory & Methods

A Game-Theoretical Approach for User Allocation in Edge Computing Environment

Qiang He et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2020)

Article Automation & Control Systems

Dynamical Resource Allocation in Edge for Trustable Internet-of-Things Systems: A Reinforcement Learning Method

Shuiguang Deng et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Proceedings Paper Computer Science, Hardware & Architecture

Privacy-Preserving Data Integrity Verification in Mobile Edge Computing

Wei Tong et al.

2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019) (2019)

Proceedings Paper Computer Science, Interdisciplinary Applications

Data Caching Optimization in the Edge Computing Environment

Ying Liu et al.

2019 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (IEEE ICWS 2019) (2019)

Article Computer Science, Theory & Methods

Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges

Rodrigo Roman et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Engineering, Electrical & Electronic

Follow Me at the Edge: Mobility-Aware Dynamic Service Placement for Mobile Edge Computing

Tao Ouyang et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2018)

Article Computer Science, Hardware & Architecture

Label-less Learning for Traffic Control in an Edge Network

Min Chen et al.

IEEE NETWORK (2018)

Article Computer Science, Hardware & Architecture

An Efficient Computation Offloading Management Scheme in the Densely Deployed Small Cell Networks With Mobile Edge Computing

Fengxian Guo et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2018)

Article Computer Science, Information Systems

A Survey on Mobile Edge Computing: The Communication Perspective

Yuyi Mao et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)

Article Computer Science, Information Systems

Mobile Edge Computing: A Survey on Architecture and Computation Offloading

Pavel Mach et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)

Article Computer Science, Theory & Methods

Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage

Yong Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Information Systems

Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage

Hui Tian et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2017)

Article Computer Science, Information Systems

Challenges of Connecting Edge and Cloud Computing: A Security and Forensic Perspective

Christian Esposito et al.

IEEE CLOUD COMPUTING (2017)

Article Computer Science, Software Engineering

An overview of Fog computing and its security issues

Ivan Stojmenovic et al.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2016)

Article Computer Science, Information Systems

Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies

Florian Tschorsch et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)

Article Computer Science, Theory & Methods

Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud

Jiangtao Li et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Hardware & Architecture

Efficient Multi-User Computation Offloading for Mobile-Edge Cloud Computing

Xu Chen et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2016)

Review Computer Science, Information Systems

Edge Computing: Vision and Challenges

Weisong Shi et al.

IEEE INTERNET OF THINGS JOURNAL (2016)

Article Computer Science, Hardware & Architecture

MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud

Chang Liu et al.

IEEE TRANSACTIONS ON COMPUTERS (2015)

Article Computer Science, Theory & Methods

Provable Multicopy Dynamic Data Possession in Cloud Computing Systems

Ayad F. Barsoum et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Information Systems

Identity-Based Distributed Provable Data Possession in Multicloud Storage

Huaqun Wang

IEEE TRANSACTIONS ON SERVICES COMPUTING (2015)

Article Computer Science, Theory & Methods

Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates

Chang Liu et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Theory & Methods

An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing

Kan Yang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)

Article Computer Science, Theory & Methods

Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage

Yan Zhu et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2012)

Article Computer Science, Artificial Intelligence

A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability

Zhuo Hao et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2011)