Inspecting Edge Data Integrity With Aggregate Signature in Distributed Edge Computing Environment

In the edge computing environment, app vendors can cache their data on a large number of geographically distributed edge servers to serve their users. However, those cached data are particularly vulnerable to both intentional and accidental corruption, which makes data security a major concern in th...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on cloud computing Vol. 10; no. 4; pp. 2691 - 2703
Main Authors Li, Bo, He, Qiang, Chen, Feifei, Jin, Hai, Xiang, Yang, Yang, Yun
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 01.10.2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN2168-7161
2372-0018
DOI10.1109/TCC.2021.3059448

Cover

Abstract In the edge computing environment, app vendors can cache their data on a large number of geographically distributed edge servers to serve their users. However, those cached data are particularly vulnerable to both intentional and accidental corruption, which makes data security a major concern in the EC environment. Given limited computing resources of edge servers, how to effectively and efficiently inspect those data over tremendous edge servers is a critical and open problem. To tackle this edge data integrity (EDI) problem, we first study the entities, threats, system objectives, and the inspection mechanism, then propose a novel approach named EDI-S for inspecting the integrity of edge data and localizing the corrupted ones. Based on the elliptic curve cryptography, EDI-S generates one digital signature as the integrity proof for each replica. Then, multiple integrity proofs can be inspected altogether via an aggregate verification. This allows the integrity of tremendous cache data on multiple edge servers can be inspected more efficiently. EDI-S also provides two methods for localizing the corrupted data on edge servers, one for small-scale scenarios and the other for large-scale scenarios. Both theoretical analysis and experimentally evaluation demonstrate that EDI-S can solve the EDI problem effectively and efficiently.
AbstractList In the edge computing environment, app vendors can cache their data on a large number of geographically distributed edge servers to serve their users. However, those cached data are particularly vulnerable to both intentional and accidental corruption, which makes data security a major concern in the EC environment. Given limited computing resources of edge servers, how to effectively and efficiently inspect those data over tremendous edge servers is a critical and open problem. To tackle this edge data integrity (EDI) problem, we first study the entities, threats, system objectives, and the inspection mechanism, then propose a novel approach named EDI-S for inspecting the integrity of edge data and localizing the corrupted ones. Based on the elliptic curve cryptography, EDI-S generates one digital signature as the integrity proof for each replica. Then, multiple integrity proofs can be inspected altogether via an aggregate verification. This allows the integrity of tremendous cache data on multiple edge servers can be inspected more efficiently. EDI-S also provides two methods for localizing the corrupted data on edge servers, one for small-scale scenarios and the other for large-scale scenarios. Both theoretical analysis and experimentally evaluation demonstrate that EDI-S can solve the EDI problem effectively and efficiently.
Author He, Qiang
Li, Bo
Jin, Hai
Yang, Yun
Chen, Feifei
Xiang, Yang
Author_xml – sequence: 1
  givenname: Bo
  orcidid: 0000-0002-3226-388X
  surname: Li
  fullname: Li, Bo
  email: boli@swin.edu.au
  organization: School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia
– sequence: 2
  givenname: Qiang
  orcidid: 0000-0002-2607-4556
  surname: He
  fullname: He, Qiang
  email: qhe@swin.edu.au
  organization: School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia
– sequence: 3
  givenname: Feifei
  orcidid: 0000-0001-5455-3792
  surname: Chen
  fullname: Chen, Feifei
  email: feifei.chen@deakin.edu.au
  organization: School of Information Technology, Deakin University, Geelong, VIC, Australia
– sequence: 4
  givenname: Hai
  orcidid: 0000-0002-3934-7605
  surname: Jin
  fullname: Jin, Hai
  email: hjin@hust.edu.cn
  organization: Services Computing Technology and System Lab, Big Data Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, Hubei, China
– sequence: 5
  givenname: Yang
  orcidid: 0000-0001-5252-0831
  surname: Xiang
  fullname: Xiang, Yang
  email: yxiang@swin.edu.cn
  organization: School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia
– sequence: 6
  givenname: Yun
  orcidid: 0000-0002-7868-5471
  surname: Yang
  fullname: Yang, Yun
  email: yyang@swin.edu.au
  organization: School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia
BookMark eNp9kD1PwzAQhi1UJAp0R2KJxJzis_Nhj1VaoFIlBooYIyc5B1etExwHqf-eVKkYGLjlbnifO91zTSa2sUjIHdA5AJWP2yybM8pgzmkso0hckCnjKQspBTEZZkhEmEICV2TWdTs6lIhBgpwStbZdi6U3tg5WVY3BUnkVrK3H2hl_DD6M_wwWde2wVh6DN1Nb5XuHgbHB0nTemaL3WI1s1hzaflxlv41r7AGtvyWXWu07nJ37DXl_Wm2zl3Dz-rzOFpuwZBJ8mFSAAKkUmiPGWJW8ELSgXKcF1xSSCPXwmyhAo-Y6oSqNKyVKlJQVIi40vyEP497WNV89dj7fNb2zw8mcpVGaUMkAhlQypkrXdJ1DnZfGK28a650y-xxofjKaD0bzk9H8bHQA6R-wdeag3PE_5H5EDCL-xiWPI5kw_gNLf4N_
CODEN ITCCF6
CitedBy_id crossref_primary_10_1360_SSI_2022_0360
crossref_primary_10_1109_TMC_2023_3294180
crossref_primary_10_1109_TSC_2024_3479909
crossref_primary_10_3390_electronics13010075
crossref_primary_10_1109_TSC_2021_3090173
crossref_primary_10_1109_JIOT_2023_3282939
crossref_primary_10_1109_TMC_2023_3310532
crossref_primary_10_1016_j_vehcom_2024_100763
crossref_primary_10_1109_TNSE_2024_3397320
crossref_primary_10_3390_jsan11040070
crossref_primary_10_1109_ACCESS_2022_3183634
crossref_primary_10_1109_TMC_2022_3174867
crossref_primary_10_1109_TNSM_2024_3383239
crossref_primary_10_1109_TNSE_2023_3337075
crossref_primary_10_1186_s13677_024_00605_z
crossref_primary_10_1109_TPDS_2022_3166163
crossref_primary_10_1109_TCE_2024_3368206
crossref_primary_10_1016_j_cose_2024_103932
crossref_primary_10_1007_s10586_023_04072_0
crossref_primary_10_1109_JIOT_2024_3425905
crossref_primary_10_1109_JIOT_2024_3366292
crossref_primary_10_1109_TSC_2021_3112659
crossref_primary_10_1109_JSYST_2022_3206490
crossref_primary_10_1016_j_vehcom_2024_100775
crossref_primary_10_1109_TCC_2024_3459789
crossref_primary_10_1109_TEM_2023_3262678
crossref_primary_10_1145_3680277
crossref_primary_10_1109_TVT_2024_3422974
crossref_primary_10_1109_JIOT_2021_3088493
crossref_primary_10_1109_TSC_2023_3328991
crossref_primary_10_1007_s11227_024_06423_z
Cites_doi 10.1109/TIFS.2014.2384391
10.1109/INFOCOM41043.2020.9155365
10.1109/COMST.2017.2682318
10.1007/s00145-003-0052-4
10.1109/TSC.2014.1
10.1109/TDSC.2021.3055559
10.1109/ICWS.2019.00027
10.1007/978-3-030-03596-9_15
10.1109/TSC.2020.3015316
10.1007/978-3-319-21837-3_67
10.1109/TKDE.2011.62
10.1109/TPDS.2020.3016344
10.1109/CCGrid49817.2020.00-85
10.1145/1315245.1315318
10.1109/CLOUD49709.2020.00037
10.1109/TIFS.2016.2615853
10.1109/TPDS.2012.66
10.1109/TC.2014.2375190
10.1109/TNET.2018.2841758
10.1145/1653662.1653688
10.1109/TMC.2019.2902090
10.1109/JIOT.2016.2579198
10.1109/TCC.2020.3008440
10.1007/BF00196725
10.1109/TPDS.2019.2917900
10.1109/TPDS.2012.278
10.1016/j.future.2016.11.009
10.1109/INFOCOM.2019.8737385
10.1109/TPDS.2020.3043755
10.1109/JSAC.2018.2869966
10.1007/978-3-030-33702-5_37
10.1109/MCC.2017.30
10.1109/TPDS.2019.2938944
10.1109/TCC.2020.3008448
10.1109/TPDS.2020.3010521
10.1109/TNET.2015.2487344
10.1109/TCC.2019.2929045
10.1109/COMST.2017.2745201
10.1109/ICDCS.2019.00104
10.1109/TNET.2018.2873002
10.1109/ICDCS.2008.68
10.1007/978-3-030-33702-5_8
10.1007/978-3-642-02384-2_9
10.1145/1315245.1315317
10.1109/TPDS.2016.2604803
10.1109/JSAC.2018.2869954
10.1109/TPDS.2010.183
10.1016/S0020-0190(98)00167-7
10.1109/TSC.2015.2512589
10.1145/2342509.2342513
10.1109/TPDS.2013.191
10.1016/j.jnca.2010.07.006
10.1109/TMC.2018.2871147
10.1109/TIFS.2016.2587242
10.1007/s00145-007-9002-x
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/TCC.2021.3059448
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList Computer and Information Systems Abstracts

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2372-0018
EndPage 2703
ExternalDocumentID 10_1109_TCC_2021_3059448
9354962
Genre orig-research
GrantInformation_xml – fundername: Australian Research Council Discovery
  grantid: DP180100212; DP200102491
GroupedDBID 0R~
4.4
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABJNI
ABQJQ
ABVLG
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
HZ~
IEDLZ
IFIPE
IPLJI
JAVBF
M43
O9-
OCL
PQQKQ
RIA
RIE
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c291t-6d1e11798f3ee5edc3b80b03f7b3f0164ef0598b1fef3f60a75da8ce902b85bf3
IEDL.DBID RIE
ISSN 2168-7161
IngestDate Sun Jun 29 16:34:38 EDT 2025
Tue Jul 01 02:57:17 EDT 2025
Thu Apr 24 22:56:41 EDT 2025
Wed Aug 27 02:14:59 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c291t-6d1e11798f3ee5edc3b80b03f7b3f0164ef0598b1fef3f60a75da8ce902b85bf3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-5252-0831
0000-0002-3226-388X
0000-0001-5455-3792
0000-0002-7868-5471
0000-0002-2607-4556
0000-0002-3934-7605
PQID 2747609211
PQPubID 2040413
PageCount 13
ParticipantIDs crossref_primary_10_1109_TCC_2021_3059448
crossref_citationtrail_10_1109_TCC_2021_3059448
proquest_journals_2747609211
ieee_primary_9354962
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2022-10-01
PublicationDateYYYYMMDD 2022-10-01
PublicationDate_xml – month: 10
  year: 2022
  text: 2022-10-01
  day: 01
PublicationDecade 2020
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE transactions on cloud computing
PublicationTitleAbbrev TCC
PublicationYear 2022
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref56
ref12
ref15
ref14
ref53
ref52
ref11
ref54
ref10
ref17
ref16
ref19
ref18
hao (ref55) 2011; 23
ref51
ref50
ref46
ref45
ref48
ref47
ref42
ref41
ref44
yi (ref30) 2015
ref49
ref8
ref7
ref9
ref4
ref3
ref6
ref5
ref40
ref35
ref34
ref37
ref36
ref31
ref33
ref32
ref2
ref1
ref39
ref38
ref24
ref23
ref26
ref25
brown (ref43) 2010
ref20
ref22
ref21
ref28
ref27
ref29
References_xml – ident: ref38
  doi: 10.1109/TIFS.2014.2384391
– ident: ref56
  doi: 10.1109/INFOCOM41043.2020.9155365
– ident: ref3
  doi: 10.1109/COMST.2017.2682318
– ident: ref33
  doi: 10.1007/s00145-003-0052-4
– ident: ref24
  doi: 10.1109/TSC.2014.1
– ident: ref9
  doi: 10.1109/TDSC.2021.3055559
– ident: ref20
  doi: 10.1109/ICWS.2019.00027
– ident: ref44
  doi: 10.1007/978-3-030-03596-9_15
– ident: ref5
  doi: 10.1109/TSC.2020.3015316
– start-page: 685
  year: 2015
  ident: ref30
  article-title: Security and privacy issues of fog computing: A survey
  publication-title: Proc Int Conf Wireless Algorithms Syst Appl
  doi: 10.1007/978-3-319-21837-3_67
– volume: 23
  start-page: 1432
  year: 2011
  ident: ref55
  article-title: A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability
  publication-title: IEEE Trans Knowl Data Eng
  doi: 10.1109/TKDE.2011.62
– ident: ref6
  doi: 10.1109/TPDS.2020.3016344
– ident: ref51
  doi: 10.1109/CCGrid49817.2020.00-85
– ident: ref15
  doi: 10.1145/1315245.1315318
– ident: ref48
  doi: 10.1109/CLOUD49709.2020.00037
– ident: ref37
  doi: 10.1109/TIFS.2016.2615853
– ident: ref27
  doi: 10.1109/TPDS.2012.66
– ident: ref40
  doi: 10.1109/TC.2014.2375190
– ident: ref12
  doi: 10.1109/TNET.2018.2841758
– ident: ref26
  doi: 10.1145/1653662.1653688
– ident: ref53
  doi: 10.1109/TMC.2019.2902090
– ident: ref8
  doi: 10.1109/JIOT.2016.2579198
– ident: ref50
  doi: 10.1109/TCC.2020.3008440
– ident: ref34
  doi: 10.1007/BF00196725
– ident: ref31
  doi: 10.1109/TPDS.2019.2917900
– ident: ref28
  doi: 10.1109/TPDS.2012.278
– ident: ref22
  doi: 10.1016/j.future.2016.11.009
– ident: ref11
  doi: 10.1109/INFOCOM.2019.8737385
– ident: ref13
  doi: 10.1109/TPDS.2020.3043755
– ident: ref29
  doi: 10.1109/JSAC.2018.2869966
– ident: ref21
  doi: 10.1007/978-3-030-33702-5_37
– ident: ref23
  doi: 10.1109/MCC.2017.30
– ident: ref46
  doi: 10.1109/TPDS.2019.2938944
– ident: ref47
  doi: 10.1109/TCC.2020.3008448
– ident: ref7
  doi: 10.1109/TPDS.2020.3010521
– ident: ref17
  doi: 10.1109/TNET.2015.2487344
– year: 2010
  ident: ref43
  article-title: Standards for efficient cryptography sec 2: Recommended elliptic curve domain parameters
– ident: ref41
  doi: 10.1109/TCC.2019.2929045
– ident: ref1
  doi: 10.1109/COMST.2017.2745201
– ident: ref14
  doi: 10.1109/ICDCS.2019.00104
– ident: ref18
  doi: 10.1109/TNET.2018.2873002
– ident: ref39
  doi: 10.1109/ICDCS.2008.68
– ident: ref45
  doi: 10.1007/978-3-030-33702-5_8
– ident: ref36
  doi: 10.1007/978-3-642-02384-2_9
– ident: ref16
  doi: 10.1145/1315245.1315317
– ident: ref49
  doi: 10.1109/TPDS.2016.2604803
– ident: ref4
  doi: 10.1109/JSAC.2018.2869954
– ident: ref42
  doi: 10.1109/TPDS.2010.183
– ident: ref32
  doi: 10.1016/S0020-0190(98)00167-7
– ident: ref25
  doi: 10.1109/TSC.2015.2512589
– ident: ref2
  doi: 10.1145/2342509.2342513
– ident: ref54
  doi: 10.1109/TPDS.2013.191
– ident: ref10
  doi: 10.1016/j.jnca.2010.07.006
– ident: ref52
  doi: 10.1109/TMC.2018.2871147
– ident: ref19
  doi: 10.1109/TIFS.2016.2587242
– ident: ref35
  doi: 10.1007/s00145-007-9002-x
SSID ssj0000851919
Score 2.443807
Snippet In the edge computing environment, app vendors can cache their data on a large number of geographically distributed edge servers to serve their users. However,...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 2691
SubjectTerms aggregate signature
Cloud computing
corruption localization
Cryptography
Curves
Data integrity
Digital signatures
Distributed databases
Edge computing
elliptic curve
Geographical distribution
Image edge detection
Inspection
Integrity
integrity inspection
Servers
Social networking (online)
Title Inspecting Edge Data Integrity With Aggregate Signature in Distributed Edge Computing Environment
URI https://ieeexplore.ieee.org/document/9354962
https://www.proquest.com/docview/2747609211
Volume 10
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELZKJxZeBVEoyAMLEmmTOC-PVR9qkcpCK7pFdnIuFShFkC78enzOAwQIsWWwLSufH_ed774j5MoLE_RVeJYPnrQ8KVJLOoFtCRFwKfWNAgJzh2d3wWTh3S79ZYPc1LkwAGCCz6CLn-YtP90kW3SV9TjTbAYP3B29zIpcrdqfgqYDd3j1Emnz3nww0PzPdboMNUmwwM-Xm8eUUvlx_ppLZbxPZtV0iliSp-42l93k_ZtS43_ne0D2SuuS9ovlcEgakB2R_apyAy03couIaVakWGYrOkpXQIciF3RqpCO0WU4f1vkj7a80F0cvG71frwoBULrO6BCldrFKFqRF32J4M9Rn1twxWYxH88HEKostWInLndwKUgdQHi5SDMCHNGEysqXNVCiZQh0uUPo3RtJRoJgKbBH6qYgS4LYrI18qdkKa2SaDU0KVzzRJFAq0seH5KKgWSRc84EyEIROyTXoVEHFSKpFjQYzn2DASm8cauhihi0vo2uS67vFSqHD80baFSNTtShDapFNhHZfb9C1GSh7YXJPgs997nZNdF_MdTPRehzTz1y1caCskl5dm-X0Ak2zbOw
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED4hGGDhjShPDyxIpE3ivDyiAmqBslAEW2Qn51KBUgTpwq_H5yQFAUJsGWzLymf77jv7vgM4CuKMYhWBE2KgnEDJ3FFe5DpSRkIpY1FQUu7w4Cbq3QWXD-HDHJzMcmEQ0T4-wzZ92rv8fJJNKVTWEdywGTpwF4zdD8IqW2sWUSHnQXiiuYt0RWfY7RoG6HttTqokVOLni-2xxVR-nMDWrFyswKCZUPWa5Kk9LVU7e_-m1fjfGa_Ccu1fstNqQazBHBbrsNLUbmD1Vt4A2S-qJMtixM7zEbIzWUrWt-IRxjFn9-PykZ2ODBunOBu7HY8qCVA2LtgZie1SnSzMq77V8Haoz7y5Tbi7OB92e05dbsHJfOGVTpR7SAJxieaIIeYZV4mrXK5jxTUpcaE2vzFRnkbNdeTKOMxlkqFwfZWESvMtmC8mBW4D0yE3NFFqNO5GEJKkWqJ8DFBwGcdcqhZ0GiDSrNYip5IYz6nlJK5IDXQpQZfW0LXgeNbjpdLh-KPtBiExa1eD0IK9Buu03qhvKZHyyBWGBu_83usQFnvDwXV63b-52oUln7If7Fu-PZgvX6e4b3ySUh3YpfgBNIDeiA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Inspecting+Edge+Data+Integrity+With+Aggregate+Signature+in+Distributed+Edge+Computing+Environment&rft.jtitle=IEEE+transactions+on+cloud+computing&rft.au=Li%2C+Bo&rft.au=He%2C+Qiang&rft.au=Chen%2C+Feifei&rft.au=Jin%2C+Hai&rft.date=2022-10-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.eissn=2372-0018&rft.volume=10&rft.issue=4&rft.spage=2691&rft_id=info:doi/10.1109%2FTCC.2021.3059448&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2168-7161&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2168-7161&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2168-7161&client=summon