Efficient Deterministic Verification and Rapid Corruption Localization for Edge Data Integrity

被引:0
|
作者
Li, Jian [1 ,2 ]
Zhao, Qinglin [1 ]
Teng, Shaohua [2 ]
Wu, Naiqi [3 ,4 ,5 ]
Zhang, Peiyun [6 ,7 ]
机构
[1] Macau Univ Sci & Technol, Sch Comp Sci & Engn, Macau, Peoples R China
[2] Guangdong Univ Technol, Sch Adv Mfg, Guangzhou 510006, Peoples R China
[3] Macau Univ Sci & Technol, Macao Inst Syst Engn, Macau, Peoples R China
[4] Macau Univ Sci & Technol, Collaborat Lab Intelligent Sci & Syst, Macau, Peoples R China
[5] Guangdong Univ Technol, State Key Lab Precis Elect Mfg Technol & Equipment, Guangzhou 510006, Peoples R China
[6] Nanjing Univ Informat Sci & Technol, Engn Res Ctr Digital Forens, Minist Educ, Nanjing 210044, Peoples R China
[7] Nanjing Univ Informat Sci & Technol, Sch Comp Sci, Nanjing 210044, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 20期
基金
中国国家自然科学基金;
关键词
Servers; Location awareness; Data integrity; Probabilistic logic; Edge computing; Maintenance engineering; Low latency communication; Batch verification; corruption localization; deterministic assurance; edge data integrity (EDI); CACHE DATA INTEGRITY;
D O I
10.1109/JIOT.2024.3425905
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ensuring data integrity in edge computing environments presents significant challenges, primarily due to the distributed architecture of edge servers and the inherent risk of data corruption. Traditional edge data integrity (EDI) verification methods predominantly rely on sampling techniques, provide only probabilistic integrity assurances and often struggle with scalability and efficient corruption localization. To overcome these limitations, we introduce the deterministic integrity assurance and rapid corruption localization EDI (DL-EDI) verification scheme, a novel approach that combines extended Merkle grid (EM-Grid) with Boneh-Lynn-Shacham (BLS) signatures. DL-EDI leverages EM-Grid for comprehensive data integrity verification, ensuring deterministic integrity validation across all data blocks while facilitating rapid block corruption localization. Additionally, we incorporate a hierarchical signature aggregation method using BLS signatures to optimize verification efficiency and minimize communication and computational overhead. A thorough performance analysis of DL-EDI is conducted, evaluating its verification accuracy, communication and computational efficiency, and resilience against various security threats. Comparative experimental evaluations of DL-EDI against four established EDI schemes highlight its superior effectiveness and efficiency in addressing the challenges of EDI.
引用
收藏
页码:33346 / 33360
页数:15
相关论文
empty
未找到相关数据