DRC-EDI: An integrity protection scheme based on data right confirmation for mobile edge computing

As far as mobile edge computing is concerned, it is necessary to ensure the data integrity of latency-sensitive applications during the process of computing. While certain research programs have demonstrated efficacy, challenges persist, including the inefficient utilization of computing resources,...

Full description

Saved in:
Bibliographic Details
Published inJournal of computer security Vol. 32; no. 4; pp. 405 - 423
Main Authors Gao, Yan, Du, Ruizhong, Wang, Xiaofei, Li, Ruilin, Li, Mingyue, Wang, Ziyuan
Format Journal Article
LanguageEnglish
Published London, England SAGE Publications 26.08.2024
Sage Publications Ltd
Subjects
Online AccessGet full text
ISSN0926-227X
1875-8924
DOI10.3233/JCS-220103

Cover

Loading…
More Information
Summary:As far as mobile edge computing is concerned, it is necessary to ensure the data integrity of latency-sensitive applications during the process of computing. While certain research programs have demonstrated efficacy, challenges persist, including the inefficient utilization of computing resources, network backhaul issues, and the occurrence of false-negative detections. To solve these problems, an integrity protection scheme is proposed in this paper on the basis of data right confirmation (DRC). Under this scheme, a two-layer consensus algorithm is developed. The outer algorithm is applied to establish a data authorization mechanism by marking the original data source to avoid the false negative results caused by network attacks from the data source. In addition, blockchain-based mobile edge computing (BMEC) technology is applied to enable data sharing in the context of mobile edge computing while minimizing the network backhaul of edge computing. Based on the Merkle Tree algorithm, the inner layer algorithm is capable not only of accurately locating and promptly repairing damaged data but also of verifying all servers in the mobile edge computing network either regularly or on demand. Finally, our proposal is evaluated against two existing research schemes. The experimental results show that our proposed scheme is not only effective in ensuring data integrity in mobile edge computing, but it is also capable of achieving better performance.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:0926-227X
1875-8924
DOI:10.3233/JCS-220103