4.7 Article

Privacy-Preserving Data Integrity Verification for Secure Mobile Edge Storage

期刊

IEEE TRANSACTIONS ON MOBILE COMPUTING
卷 22, 期 9, 页码 5463-5478

出版社

IEEE COMPUTER SOC
DOI: 10.1109/TMC.2022.3174867

关键词

Data integrity; Protocols; Cloud computing; Edge computing; Servers; Time factors; Privacy; Mobile edge computing; data integrity checking; privacy-preserving

向作者/读者索取更多资源

Mobile edge computing (MEC) is proposed as an extension of cloud computing to provide better services in terms of response time for end devices. We propose two integrity checking protocols (ICE-basic and ICE-batch) for mobile edge storage, allowing third-party verification while preserving data privacy. The protocols are proven to be secure and privacy-preserving, and caching verification tags on end devices reduces communication costs. Extensive experiments demonstrate the efficiency of the proposed protocols.
Mobile edge computing (MEC) is proposed as an extension of cloud computing in the scenarios where the end devices desire better services in terms of response time. Because the edges are usually owned by individuals or small organizations with limited operation capabilities, the data on the edges are easily corrupted (due to external attacks or internal hardware failures). Therefore, it is essential to verify data integrity i the MEC. We propose two Integrity Checking protocols for the mobile Edge storage, called ICE-basic and ICE-batch. Our protocols allow a third-party verifier to check the data integrity on the edges without violating users' data privacy and query pattern privacy. We rigorously prove the security and privacy guarantees of the protocols. In addition, we have investigated how to let the end devices cache some verification tags such that the communication cost between end devices and the cloud can be further reduced when a user connects to multiple edges in sequence. We have implemented a proof-of-concept system that runs ICE, and extensive experiments are conducted to evaluate the performance of the proposed protocols. The theoretical analysis and experimental results demonstrate the proposed protocols are efficient both in computation and communication.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据