4.7 Article

Inspecting Edge Data Integrity With Aggregate Signature in Distributed Edge Computing Environment

Journal

IEEE TRANSACTIONS ON CLOUD COMPUTING
Volume 10, Issue 4, Pages 2691-2703

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCC.2021.3059448

Keywords

Servers; Cloud computing; Data integrity; Social networking (online); Inspection; Distributed databases; Image edge detection; Edge computing; data integrity; integrity inspection; corruption localization; elliptic curve; aggregate signature

Funding

  1. Australian Research Council Discovery Projects [DP180100212, DP200102491]

Ask authors/readers for more resources

In the edge computing environment, ensuring the integrity and security of cached data is crucial. This paper proposes an approach called EDI-S to inspect the integrity of edge data and localize corrupted ones. By utilizing digital signatures based on elliptic curve cryptography, EDI-S enables efficient inspection of large-scale cache data and provides methods for localizing corrupted data.
In the edge computing environment, app vendors can cache their data on a large number of geographically distributed edge servers to serve their users. However, those cached data are particularly vulnerable to both intentional and accidental corruption, which makes data security a major concern in the EC environment. Given limited computing resources of edge servers, how to effectively and efficiently inspect those data over tremendous edge servers is a critical and open problem. To tackle this edge data integrity (EDI) problem, we first study the entities, threats, system objectives, and the inspection mechanism, then propose a novel approach named EDI-S for inspecting the integrity of edge data and localizing the corrupted ones. Based on the elliptic curve cryptography, EDI-S generates one digital signature as the integrity proof for each replica. Then, multiple integrity proofs can be inspected altogether via an aggregate verification. This allows the integrity of tremendous cache data on multiple edge servers can be inspected more efficiently. EDI-S also provides two methods for localizing the corrupted data on edge servers, one for small-scale scenarios and the other for large-scale scenarios. Both theoretical analysis and experimentally evaluation demonstrate that EDI-S can solve the EDI problem effectively and efficiently.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available