4.7 Article

Inspecting Edge Data Integrity With Aggregate Signature in Distributed Edge Computing Environment

期刊

IEEE TRANSACTIONS ON CLOUD COMPUTING
卷 10, 期 4, 页码 2691-2703

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCC.2021.3059448

关键词

Servers; Cloud computing; Data integrity; Social networking (online); Inspection; Distributed databases; Image edge detection; Edge computing; data integrity; integrity inspection; corruption localization; elliptic curve; aggregate signature

资金

  1. Australian Research Council Discovery Projects [DP180100212, DP200102491]

向作者/读者索取更多资源

In the edge computing environment, ensuring the integrity and security of cached data is crucial. This paper proposes an approach called EDI-S to inspect the integrity of edge data and localize corrupted ones. By utilizing digital signatures based on elliptic curve cryptography, EDI-S enables efficient inspection of large-scale cache data and provides methods for localizing corrupted data.
In the edge computing environment, app vendors can cache their data on a large number of geographically distributed edge servers to serve their users. However, those cached data are particularly vulnerable to both intentional and accidental corruption, which makes data security a major concern in the EC environment. Given limited computing resources of edge servers, how to effectively and efficiently inspect those data over tremendous edge servers is a critical and open problem. To tackle this edge data integrity (EDI) problem, we first study the entities, threats, system objectives, and the inspection mechanism, then propose a novel approach named EDI-S for inspecting the integrity of edge data and localizing the corrupted ones. Based on the elliptic curve cryptography, EDI-S generates one digital signature as the integrity proof for each replica. Then, multiple integrity proofs can be inspected altogether via an aggregate verification. This allows the integrity of tremendous cache data on multiple edge servers can be inspected more efficiently. EDI-S also provides two methods for localizing the corrupted data on edge servers, one for small-scale scenarios and the other for large-scale scenarios. Both theoretical analysis and experimentally evaluation demonstrate that EDI-S can solve the EDI problem effectively and efficiently.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据