期刊
IEEE TRANSACTIONS ON MOBILE COMPUTING
卷 22, 期 9, 页码 5463-5478出版社
IEEE COMPUTER SOC
DOI: 10.1109/TMC.2022.3174867
关键词
Data integrity; Protocols; Cloud computing; Edge computing; Servers; Time factors; Privacy; Mobile edge computing; data integrity checking; privacy-preserving
Mobile edge computing (MEC) is proposed as an extension of cloud computing to provide better services in terms of response time for end devices. We propose two integrity checking protocols (ICE-basic and ICE-batch) for mobile edge storage, allowing third-party verification while preserving data privacy. The protocols are proven to be secure and privacy-preserving, and caching verification tags on end devices reduces communication costs. Extensive experiments demonstrate the efficiency of the proposed protocols.
Mobile edge computing (MEC) is proposed as an extension of cloud computing in the scenarios where the end devices desire better services in terms of response time. Because the edges are usually owned by individuals or small organizations with limited operation capabilities, the data on the edges are easily corrupted (due to external attacks or internal hardware failures). Therefore, it is essential to verify data integrity i the MEC. We propose two Integrity Checking protocols for the mobile Edge storage, called ICE-basic and ICE-batch. Our protocols allow a third-party verifier to check the data integrity on the edges without violating users' data privacy and query pattern privacy. We rigorously prove the security and privacy guarantees of the protocols. In addition, we have investigated how to let the end devices cache some verification tags such that the communication cost between end devices and the cloud can be further reduced when a user connects to multiple edges in sequence. We have implemented a proof-of-concept system that runs ICE, and extensive experiments are conducted to evaluate the performance of the proposed protocols. The theoretical analysis and experimental results demonstrate the proposed protocols are efficient both in computation and communication.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据