4.7 Article

Privacy-Preserving Data Integrity Verification for Secure Mobile Edge Storage

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Location Privacy Protection via Delocalization in 5G Mobile Edge Computing Environment

Guangming Cui et al.

Summary: In this article, a novel architecture called LBS@E is proposed for delocalized location-based services (LBSs) in the 5G mobile edge computing (MEC) environment, which eliminates the need for users' location information. LBS@E allows mobile users to retrieve local information from nearby edge servers, effectively addressing the root cause of the traditional location privacy problem. However, LBS@E also introduces new challenges to location privacy.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2023)

Article Computer Science, Information Systems

Efficient Verification of Edge Data Integrity in Edge Computing Environment

Guangming Cui et al.

Summary: Verifying data integrity in the edge computing environment is crucial for security, but faces challenges due to high computational costs. The ICL-EDI scheme helps service vendors efficiently inspect and localize corrupted edge data, enhancing overall security.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Computer Science, Information Systems

Secure deduplication schemes for content delivery in mobile edge computing

Yu Lin et al.

Summary: Data leakage poses a serious threat to edge computing users in the mobile edge computing (MEC) paradigm. This research considers the specific properties of MEC and proposes secure data deduplication schemes for centralized, semi-distributed, and distributed MEC settings. The schemes ensure secure data storage, retrieval, sharing, and deduplication.

COMPUTERS & SECURITY (2022)

Article Computer Science, Hardware & Architecture

A Game-Theoretical Approach for Mitigating Edge DDoS Attack

Qiang He et al.

Summary: Edge computing is an emerging paradigm that extends cloud computing by pushing computing resources onto edge servers. However, the geographical distribution of edge servers poses new security threats, especially DDoS attacks. This article proposes two approaches to mitigate edge DDoS attacks and provides theoretical analysis and experimental evaluation to demonstrate their effectiveness and efficiency.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Information Systems

Inspecting Edge Data Integrity With Aggregate Signature in Distributed Edge Computing Environment

Bo Li et al.

Summary: In the edge computing environment, ensuring the integrity and security of cached data is crucial. This paper proposes an approach called EDI-S to inspect the integrity of edge data and localize corrupted ones. By utilizing digital signatures based on elliptic curve cryptography, EDI-S enables efficient inspection of large-scale cache data and provides methods for localizing corrupted data.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2022)

Article Computer Science, Theory & Methods

Auditing Cache Data Integrity in the Edge Computing Environment

Bo Li et al.

Summary: Edge computing allows app vendors to deploy applications and data on distributed servers for better user experience. However, ensuring data integrity in this environment is challenging. Therefore, effectively auditing data integrity becomes a critical issue.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2021)

Article Computer Science, Theory & Methods

Cooperative Assurance of Cache Data Integrity for Mobile Edge Computing

Bo Li et al.

Summary: The new mobile edge computing (MEC) paradigm changes the data caching technique fundamentally, providing a bounded latency guarantee for latency-sensitive applications. Ensuring cache data integrity in the highly distributed MEC environment is a significant challenge that requires a distributed approach for handling.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Automation & Control Systems

A Blockchain-Based Trusted Data Management Scheme in Edge Computing

Ma Zhaofeng et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Theory & Methods

Game Theory and Reinforcement Learning Based Secure Edge Caching in Mobile Social Networks

Qichao Xu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Engineering, Electrical & Electronic

Edge Computing Security: State of the Art and Challenges

Yinhao Xiao et al.

PROCEEDINGS OF THE IEEE (2019)

Proceedings Paper Computer Science, Hardware & Architecture

Privacy-Preserving Data Integrity Verification in Mobile Edge Computing

Wei Tong et al.

2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019) (2019)

Article Engineering, Electrical & Electronic

Location Privacy in Mobile Edge Clouds: A Chaff-Based Approach

Ting He et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2017)

Article Computer Science, Theory & Methods

Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage

Yong Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Proceedings Paper Computer Science, Theory & Methods

Fair Caching Algorithms for Peer Data Sharing in Pervasive Edge Computing Environments

Yaodong Huang et al.

2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017) (2017)

Proceedings Paper Computer Science, Hardware & Architecture

EdgeCourier: An Edge-hosted Personal Service for Low-bandwidth Document Synchronization in Mobile Cloud Storage Services

Pengzhan Hao et al.

SEC 2017: 2017 THE SECOND ACM/IEEE SYMPOSIUM ON EDGE COMPUTING (SEC'17) (2017)

Proceedings Paper Computer Science, Theory & Methods

Cachier: Edge-caching for recognition applications

Utsav Drolia et al.

2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017) (2017)

Proceedings Paper Computer Science, Hardware & Architecture

Efficient Placement of Multi-Component Applications in Edge Computing Systems

Tayebeh Bahreini et al.

SEC 2017: 2017 THE SECOND ACM/IEEE SYMPOSIUM ON EDGE COMPUTING (SEC'17) (2017)

Article Computer Science, Theory & Methods

Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud

Jiangtao Li et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Hardware & Architecture

2-Server PIR with Subpolynomial Communication

Zeev Dvir et al.

JOURNAL OF THE ACM (2016)

Review Computer Science, Information Systems

Edge Computing: Vision and Challenges

Weisong Shi et al.

IEEE INTERNET OF THINGS JOURNAL (2016)

Article Computer Science, Hardware & Architecture

Mobile-Edge Computing Architecture The role of MEC in the Internet of Things

Dario Sabella et al.

IEEE CONSUMER ELECTRONICS MAGAZINE (2016)

Proceedings Paper Computer Science, Hardware & Architecture

Poster Abstract: EdgeStore: Integrating Edge Computing into Cloud-Based Storage Systems

Zijiang Hao et al.

2016 FIRST IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC 2016) (2016)

Proceedings Paper Computer Science, Hardware & Architecture

Poster Abstract: Edge-caches for vision applications

Utsav Drolia et al.

2016 FIRST IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC 2016) (2016)

Proceedings Paper Computer Science, Hardware & Architecture

Establishing Trusted Identities in Disconnected Edge Environments

Sebastian Echeverria et al.

2016 FIRST IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC 2016) (2016)

Editorial Material Computer Science, Information Systems

Edge-centric Computing: Vision and Challenges

Pedro Garcia Lopez et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2015)

Editorial Material Computer Science, Information Systems

Edge-centric Computing: Vision and Challenges

Pedro Garcia Lopez et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2015)

Article Computer Science, Artificial Intelligence

A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability

Zhuo Hao et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2011)

Article Computer Science, Information Systems

The Case for VM-Based Cloudlets in Mobile Computing

Mahadev Satyanarayanan et al.

IEEE PERVASIVE COMPUTING (2009)

Article Computer Science, Artificial Intelligence

Efficient remote data possession checking in critical information infrastructures

Francesc Sebe et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2008)

Article Computer Science, Theory & Methods

A geometric approach to information-theoretic private information retrieval

David Woodruff et al.

SIAM JOURNAL ON COMPUTING (2007)