Inspecting Edge Data Integrity With Aggregate Signature in Distributed Edge Computing Environment
In the edge computing environment, app vendors can cache their data on a large number of geographically distributed edge servers to serve their users. However, those cached data are particularly vulnerable to both intentional and accidental corruption, which makes data security a major concern in th...
Saved in:
Published in | IEEE transactions on cloud computing Vol. 10; no. 4; pp. 2691 - 2703 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
01.10.2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
ISSN | 2168-7161 2372-0018 |
DOI | 10.1109/TCC.2021.3059448 |
Cover
Abstract | In the edge computing environment, app vendors can cache their data on a large number of geographically distributed edge servers to serve their users. However, those cached data are particularly vulnerable to both intentional and accidental corruption, which makes data security a major concern in the EC environment. Given limited computing resources of edge servers, how to effectively and efficiently inspect those data over tremendous edge servers is a critical and open problem. To tackle this edge data integrity (EDI) problem, we first study the entities, threats, system objectives, and the inspection mechanism, then propose a novel approach named EDI-S for inspecting the integrity of edge data and localizing the corrupted ones. Based on the elliptic curve cryptography, EDI-S generates one digital signature as the integrity proof for each replica. Then, multiple integrity proofs can be inspected altogether via an aggregate verification. This allows the integrity of tremendous cache data on multiple edge servers can be inspected more efficiently. EDI-S also provides two methods for localizing the corrupted data on edge servers, one for small-scale scenarios and the other for large-scale scenarios. Both theoretical analysis and experimentally evaluation demonstrate that EDI-S can solve the EDI problem effectively and efficiently. |
---|---|
AbstractList | In the edge computing environment, app vendors can cache their data on a large number of geographically distributed edge servers to serve their users. However, those cached data are particularly vulnerable to both intentional and accidental corruption, which makes data security a major concern in the EC environment. Given limited computing resources of edge servers, how to effectively and efficiently inspect those data over tremendous edge servers is a critical and open problem. To tackle this edge data integrity (EDI) problem, we first study the entities, threats, system objectives, and the inspection mechanism, then propose a novel approach named EDI-S for inspecting the integrity of edge data and localizing the corrupted ones. Based on the elliptic curve cryptography, EDI-S generates one digital signature as the integrity proof for each replica. Then, multiple integrity proofs can be inspected altogether via an aggregate verification. This allows the integrity of tremendous cache data on multiple edge servers can be inspected more efficiently. EDI-S also provides two methods for localizing the corrupted data on edge servers, one for small-scale scenarios and the other for large-scale scenarios. Both theoretical analysis and experimentally evaluation demonstrate that EDI-S can solve the EDI problem effectively and efficiently. |
Author | He, Qiang Li, Bo Jin, Hai Yang, Yun Chen, Feifei Xiang, Yang |
Author_xml | – sequence: 1 givenname: Bo orcidid: 0000-0002-3226-388X surname: Li fullname: Li, Bo email: boli@swin.edu.au organization: School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia – sequence: 2 givenname: Qiang orcidid: 0000-0002-2607-4556 surname: He fullname: He, Qiang email: qhe@swin.edu.au organization: School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia – sequence: 3 givenname: Feifei orcidid: 0000-0001-5455-3792 surname: Chen fullname: Chen, Feifei email: feifei.chen@deakin.edu.au organization: School of Information Technology, Deakin University, Geelong, VIC, Australia – sequence: 4 givenname: Hai orcidid: 0000-0002-3934-7605 surname: Jin fullname: Jin, Hai email: hjin@hust.edu.cn organization: Services Computing Technology and System Lab, Big Data Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, Hubei, China – sequence: 5 givenname: Yang orcidid: 0000-0001-5252-0831 surname: Xiang fullname: Xiang, Yang email: yxiang@swin.edu.cn organization: School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia – sequence: 6 givenname: Yun orcidid: 0000-0002-7868-5471 surname: Yang fullname: Yang, Yun email: yyang@swin.edu.au organization: School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia |
BookMark | eNp9kD1PwzAQhi1UJAp0R2KJxJzis_Nhj1VaoFIlBooYIyc5B1etExwHqf-eVKkYGLjlbnifO91zTSa2sUjIHdA5AJWP2yybM8pgzmkso0hckCnjKQspBTEZZkhEmEICV2TWdTs6lIhBgpwStbZdi6U3tg5WVY3BUnkVrK3H2hl_DD6M_wwWde2wVh6DN1Nb5XuHgbHB0nTemaL3WI1s1hzaflxlv41r7AGtvyWXWu07nJ37DXl_Wm2zl3Dz-rzOFpuwZBJ8mFSAAKkUmiPGWJW8ELSgXKcF1xSSCPXwmyhAo-Y6oSqNKyVKlJQVIi40vyEP497WNV89dj7fNb2zw8mcpVGaUMkAhlQypkrXdJ1DnZfGK28a650y-xxofjKaD0bzk9H8bHQA6R-wdeag3PE_5H5EDCL-xiWPI5kw_gNLf4N_ |
CODEN | ITCCF6 |
CitedBy_id | crossref_primary_10_1360_SSI_2022_0360 crossref_primary_10_1109_TMC_2023_3294180 crossref_primary_10_1109_TSC_2024_3479909 crossref_primary_10_3390_electronics13010075 crossref_primary_10_1109_TSC_2021_3090173 crossref_primary_10_1109_JIOT_2023_3282939 crossref_primary_10_1109_TMC_2023_3310532 crossref_primary_10_1016_j_vehcom_2024_100763 crossref_primary_10_1109_TNSE_2024_3397320 crossref_primary_10_3390_jsan11040070 crossref_primary_10_1109_ACCESS_2022_3183634 crossref_primary_10_1109_TMC_2022_3174867 crossref_primary_10_1109_TNSM_2024_3383239 crossref_primary_10_1109_TNSE_2023_3337075 crossref_primary_10_1186_s13677_024_00605_z crossref_primary_10_1109_TPDS_2022_3166163 crossref_primary_10_1109_TCE_2024_3368206 crossref_primary_10_1016_j_cose_2024_103932 crossref_primary_10_1007_s10586_023_04072_0 crossref_primary_10_1109_JIOT_2024_3425905 crossref_primary_10_1109_JIOT_2024_3366292 crossref_primary_10_1109_TSC_2021_3112659 crossref_primary_10_1109_JSYST_2022_3206490 crossref_primary_10_1016_j_vehcom_2024_100775 crossref_primary_10_1109_TCC_2024_3459789 crossref_primary_10_1109_TEM_2023_3262678 crossref_primary_10_1145_3680277 crossref_primary_10_1109_TVT_2024_3422974 crossref_primary_10_1109_JIOT_2021_3088493 crossref_primary_10_1109_TSC_2023_3328991 crossref_primary_10_1007_s11227_024_06423_z |
Cites_doi | 10.1109/TIFS.2014.2384391 10.1109/INFOCOM41043.2020.9155365 10.1109/COMST.2017.2682318 10.1007/s00145-003-0052-4 10.1109/TSC.2014.1 10.1109/TDSC.2021.3055559 10.1109/ICWS.2019.00027 10.1007/978-3-030-03596-9_15 10.1109/TSC.2020.3015316 10.1007/978-3-319-21837-3_67 10.1109/TKDE.2011.62 10.1109/TPDS.2020.3016344 10.1109/CCGrid49817.2020.00-85 10.1145/1315245.1315318 10.1109/CLOUD49709.2020.00037 10.1109/TIFS.2016.2615853 10.1109/TPDS.2012.66 10.1109/TC.2014.2375190 10.1109/TNET.2018.2841758 10.1145/1653662.1653688 10.1109/TMC.2019.2902090 10.1109/JIOT.2016.2579198 10.1109/TCC.2020.3008440 10.1007/BF00196725 10.1109/TPDS.2019.2917900 10.1109/TPDS.2012.278 10.1016/j.future.2016.11.009 10.1109/INFOCOM.2019.8737385 10.1109/TPDS.2020.3043755 10.1109/JSAC.2018.2869966 10.1007/978-3-030-33702-5_37 10.1109/MCC.2017.30 10.1109/TPDS.2019.2938944 10.1109/TCC.2020.3008448 10.1109/TPDS.2020.3010521 10.1109/TNET.2015.2487344 10.1109/TCC.2019.2929045 10.1109/COMST.2017.2745201 10.1109/ICDCS.2019.00104 10.1109/TNET.2018.2873002 10.1109/ICDCS.2008.68 10.1007/978-3-030-33702-5_8 10.1007/978-3-642-02384-2_9 10.1145/1315245.1315317 10.1109/TPDS.2016.2604803 10.1109/JSAC.2018.2869954 10.1109/TPDS.2010.183 10.1016/S0020-0190(98)00167-7 10.1109/TSC.2015.2512589 10.1145/2342509.2342513 10.1109/TPDS.2013.191 10.1016/j.jnca.2010.07.006 10.1109/TMC.2018.2871147 10.1109/TIFS.2016.2587242 10.1007/s00145-007-9002-x |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
DOI | 10.1109/TCC.2021.3059448 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 2372-0018 |
EndPage | 2703 |
ExternalDocumentID | 10_1109_TCC_2021_3059448 9354962 |
Genre | orig-research |
GrantInformation_xml | – fundername: Australian Research Council Discovery grantid: DP180100212; DP200102491 |
GroupedDBID | 0R~ 4.4 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABJNI ABQJQ ABVLG AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD HZ~ IEDLZ IFIPE IPLJI JAVBF M43 O9- OCL PQQKQ RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c291t-6d1e11798f3ee5edc3b80b03f7b3f0164ef0598b1fef3f60a75da8ce902b85bf3 |
IEDL.DBID | RIE |
ISSN | 2168-7161 |
IngestDate | Sun Jun 29 16:34:38 EDT 2025 Tue Jul 01 02:57:17 EDT 2025 Thu Apr 24 22:56:41 EDT 2025 Wed Aug 27 02:14:59 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 4 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c291t-6d1e11798f3ee5edc3b80b03f7b3f0164ef0598b1fef3f60a75da8ce902b85bf3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0001-5252-0831 0000-0002-3226-388X 0000-0001-5455-3792 0000-0002-7868-5471 0000-0002-2607-4556 0000-0002-3934-7605 |
PQID | 2747609211 |
PQPubID | 2040413 |
PageCount | 13 |
ParticipantIDs | crossref_primary_10_1109_TCC_2021_3059448 crossref_citationtrail_10_1109_TCC_2021_3059448 proquest_journals_2747609211 ieee_primary_9354962 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2022-10-01 |
PublicationDateYYYYMMDD | 2022-10-01 |
PublicationDate_xml | – month: 10 year: 2022 text: 2022-10-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Piscataway |
PublicationPlace_xml | – name: Piscataway |
PublicationTitle | IEEE transactions on cloud computing |
PublicationTitleAbbrev | TCC |
PublicationYear | 2022 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref56 ref12 ref15 ref14 ref53 ref52 ref11 ref54 ref10 ref17 ref16 ref19 ref18 hao (ref55) 2011; 23 ref51 ref50 ref46 ref45 ref48 ref47 ref42 ref41 ref44 yi (ref30) 2015 ref49 ref8 ref7 ref9 ref4 ref3 ref6 ref5 ref40 ref35 ref34 ref37 ref36 ref31 ref33 ref32 ref2 ref1 ref39 ref38 ref24 ref23 ref26 ref25 brown (ref43) 2010 ref20 ref22 ref21 ref28 ref27 ref29 |
References_xml | – ident: ref38 doi: 10.1109/TIFS.2014.2384391 – ident: ref56 doi: 10.1109/INFOCOM41043.2020.9155365 – ident: ref3 doi: 10.1109/COMST.2017.2682318 – ident: ref33 doi: 10.1007/s00145-003-0052-4 – ident: ref24 doi: 10.1109/TSC.2014.1 – ident: ref9 doi: 10.1109/TDSC.2021.3055559 – ident: ref20 doi: 10.1109/ICWS.2019.00027 – ident: ref44 doi: 10.1007/978-3-030-03596-9_15 – ident: ref5 doi: 10.1109/TSC.2020.3015316 – start-page: 685 year: 2015 ident: ref30 article-title: Security and privacy issues of fog computing: A survey publication-title: Proc Int Conf Wireless Algorithms Syst Appl doi: 10.1007/978-3-319-21837-3_67 – volume: 23 start-page: 1432 year: 2011 ident: ref55 article-title: A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability publication-title: IEEE Trans Knowl Data Eng doi: 10.1109/TKDE.2011.62 – ident: ref6 doi: 10.1109/TPDS.2020.3016344 – ident: ref51 doi: 10.1109/CCGrid49817.2020.00-85 – ident: ref15 doi: 10.1145/1315245.1315318 – ident: ref48 doi: 10.1109/CLOUD49709.2020.00037 – ident: ref37 doi: 10.1109/TIFS.2016.2615853 – ident: ref27 doi: 10.1109/TPDS.2012.66 – ident: ref40 doi: 10.1109/TC.2014.2375190 – ident: ref12 doi: 10.1109/TNET.2018.2841758 – ident: ref26 doi: 10.1145/1653662.1653688 – ident: ref53 doi: 10.1109/TMC.2019.2902090 – ident: ref8 doi: 10.1109/JIOT.2016.2579198 – ident: ref50 doi: 10.1109/TCC.2020.3008440 – ident: ref34 doi: 10.1007/BF00196725 – ident: ref31 doi: 10.1109/TPDS.2019.2917900 – ident: ref28 doi: 10.1109/TPDS.2012.278 – ident: ref22 doi: 10.1016/j.future.2016.11.009 – ident: ref11 doi: 10.1109/INFOCOM.2019.8737385 – ident: ref13 doi: 10.1109/TPDS.2020.3043755 – ident: ref29 doi: 10.1109/JSAC.2018.2869966 – ident: ref21 doi: 10.1007/978-3-030-33702-5_37 – ident: ref23 doi: 10.1109/MCC.2017.30 – ident: ref46 doi: 10.1109/TPDS.2019.2938944 – ident: ref47 doi: 10.1109/TCC.2020.3008448 – ident: ref7 doi: 10.1109/TPDS.2020.3010521 – ident: ref17 doi: 10.1109/TNET.2015.2487344 – year: 2010 ident: ref43 article-title: Standards for efficient cryptography sec 2: Recommended elliptic curve domain parameters – ident: ref41 doi: 10.1109/TCC.2019.2929045 – ident: ref1 doi: 10.1109/COMST.2017.2745201 – ident: ref14 doi: 10.1109/ICDCS.2019.00104 – ident: ref18 doi: 10.1109/TNET.2018.2873002 – ident: ref39 doi: 10.1109/ICDCS.2008.68 – ident: ref45 doi: 10.1007/978-3-030-33702-5_8 – ident: ref36 doi: 10.1007/978-3-642-02384-2_9 – ident: ref16 doi: 10.1145/1315245.1315317 – ident: ref49 doi: 10.1109/TPDS.2016.2604803 – ident: ref4 doi: 10.1109/JSAC.2018.2869954 – ident: ref42 doi: 10.1109/TPDS.2010.183 – ident: ref32 doi: 10.1016/S0020-0190(98)00167-7 – ident: ref25 doi: 10.1109/TSC.2015.2512589 – ident: ref2 doi: 10.1145/2342509.2342513 – ident: ref54 doi: 10.1109/TPDS.2013.191 – ident: ref10 doi: 10.1016/j.jnca.2010.07.006 – ident: ref52 doi: 10.1109/TMC.2018.2871147 – ident: ref19 doi: 10.1109/TIFS.2016.2587242 – ident: ref35 doi: 10.1007/s00145-007-9002-x |
SSID | ssj0000851919 |
Score | 2.443807 |
Snippet | In the edge computing environment, app vendors can cache their data on a large number of geographically distributed edge servers to serve their users. However,... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 2691 |
SubjectTerms | aggregate signature Cloud computing corruption localization Cryptography Curves Data integrity Digital signatures Distributed databases Edge computing elliptic curve Geographical distribution Image edge detection Inspection Integrity integrity inspection Servers Social networking (online) |
Title | Inspecting Edge Data Integrity With Aggregate Signature in Distributed Edge Computing Environment |
URI | https://ieeexplore.ieee.org/document/9354962 https://www.proquest.com/docview/2747609211 |
Volume | 10 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELZKJxZeBVEoyAMLEmmTOC-PVR9qkcpCK7pFdnIuFShFkC78enzOAwQIsWWwLSufH_ed774j5MoLE_RVeJYPnrQ8KVJLOoFtCRFwKfWNAgJzh2d3wWTh3S79ZYPc1LkwAGCCz6CLn-YtP90kW3SV9TjTbAYP3B29zIpcrdqfgqYDd3j1Emnz3nww0PzPdboMNUmwwM-Xm8eUUvlx_ppLZbxPZtV0iliSp-42l93k_ZtS43_ne0D2SuuS9ovlcEgakB2R_apyAy03couIaVakWGYrOkpXQIciF3RqpCO0WU4f1vkj7a80F0cvG71frwoBULrO6BCldrFKFqRF32J4M9Rn1twxWYxH88HEKostWInLndwKUgdQHi5SDMCHNGEysqXNVCiZQh0uUPo3RtJRoJgKbBH6qYgS4LYrI18qdkKa2SaDU0KVzzRJFAq0seH5KKgWSRc84EyEIROyTXoVEHFSKpFjQYzn2DASm8cauhihi0vo2uS67vFSqHD80baFSNTtShDapFNhHZfb9C1GSh7YXJPgs997nZNdF_MdTPRehzTz1y1caCskl5dm-X0Ak2zbOw |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED4hGGDhjShPDyxIpE3ivDyiAmqBslAEW2Qn51KBUgTpwq_H5yQFAUJsGWzLymf77jv7vgM4CuKMYhWBE2KgnEDJ3FFe5DpSRkIpY1FQUu7w4Cbq3QWXD-HDHJzMcmEQ0T4-wzZ92rv8fJJNKVTWEdywGTpwF4zdD8IqW2sWUSHnQXiiuYt0RWfY7RoG6HttTqokVOLni-2xxVR-nMDWrFyswKCZUPWa5Kk9LVU7e_-m1fjfGa_Ccu1fstNqQazBHBbrsNLUbmD1Vt4A2S-qJMtixM7zEbIzWUrWt-IRxjFn9-PykZ2ODBunOBu7HY8qCVA2LtgZie1SnSzMq77V8Haoz7y5Tbi7OB92e05dbsHJfOGVTpR7SAJxieaIIeYZV4mrXK5jxTUpcaE2vzFRnkbNdeTKOMxlkqFwfZWESvMtmC8mBW4D0yE3NFFqNO5GEJKkWqJ8DFBwGcdcqhZ0GiDSrNYip5IYz6nlJK5IDXQpQZfW0LXgeNbjpdLh-KPtBiExa1eD0IK9Buu03qhvKZHyyBWGBu_83usQFnvDwXV63b-52oUln7If7Fu-PZgvX6e4b3ySUh3YpfgBNIDeiA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Inspecting+Edge+Data+Integrity+With+Aggregate+Signature+in+Distributed+Edge+Computing+Environment&rft.jtitle=IEEE+transactions+on+cloud+computing&rft.au=Li%2C+Bo&rft.au=He%2C+Qiang&rft.au=Chen%2C+Feifei&rft.au=Jin%2C+Hai&rft.date=2022-10-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.eissn=2372-0018&rft.volume=10&rft.issue=4&rft.spage=2691&rft_id=info:doi/10.1109%2FTCC.2021.3059448&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2168-7161&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2168-7161&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2168-7161&client=summon |