Journal
2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019)
Volume -, Issue -, Pages 1007-1018Publisher
IEEE COMPUTER SOC
DOI: 10.1109/ICDCS.2019.00104
Keywords
Mobile edge computing; data integrity; privacy-preserving
Categories
Funding
- National Key R&D Program of China [2018YFB1004301]
- Ant Financial through the Ant Financial Science Funds for Security Research
- NSF [CNS-1816399]
- Jiangsu Shuang-Chuang Program
- Jiangsu Six-Talent-Peaks Program
- [NSFC-61425024]
- [NSFC-61872176]
- [NSFC-61872179]
- [NSFC-61872180]
Ask authors/readers for more resources
Mobile edge computing (MEC) is proposed as an extension of cloud computing in the scenarios where the end devices desire better services in terms of response time. Edge nodes are deployed at the proximity of the end devices, and it can pre-download parts of data stored in the cloud so that the end devices can access these data with low latency. However, because the edges are usually owned by individuals and small organizations, which have limited operation capacities for maintaining the machines, the data on the edges are easily corrupted (due to external attacks or internal hardware failures). Therefore, it is essential to verify data integrity in the MEC. We propose two Integrity Checking protocols for mobile Edge computing, called ICE-basic and ICE-batch, which are designed for the cases where the user wants to check data integrity on a single edge or multiple edges, respectively. Based on the concept of provable data possession and the technique of private information retrieval, our protocols allow a third-party verifier to check the data integrity on the edges without violating users' data privacy and query pattern privacy. We rigorously prove the security and privacy guarantees of the protocols. Furthermore, we have implemented a proof-of-concept system that runs ICE, and extensive experiments are conducted. The theoretical analysis and experimental results demonstrate the proposed protocols are efficient both in computation and communication.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available