Winning at the Starting Line: Unreliable Data Replica Selection for Edge Data Integrity Verification

被引:0
作者
Zhao, Yao [1 ]
Qu, Youyang [2 ,3 ]
Xiang, Yong [1 ]
Chen, Feifei [1 ]
Uddin, Md Palash [1 ]
Gao, Longxiang [2 ,3 ]
机构
[1] Deakin Univ, Sch Informat Technol, Burwood, Vic 3125, Australia
[2] Qilu Univ Technol, Minist Educ, Shandong Acad Sci, Shandong Comp Sci Ctr,Key Lab Comp Power Network &, Jinan 250353, Peoples R China
[3] Shandong Fundamental Res Ctr Comp Sci, Shandong Prov Key Lab Comp Power Internet & Serv C, Jinan 250353, Peoples R China
基金
澳大利亚研究理事会;
关键词
Quality of service; Servers; Distributed databases; Inspection; Monitoring; Data integrity; Optimization; Real-time systems; Accuracy; Vehicle safety; Edge data integrity; optimization; selection algorithm; submodular function; unreliable data replica; CACHE DATA INTEGRITY; FRAMEWORK; SECURITY; SYSTEM; QOS;
D O I
10.1109/TSC.2024.3479909
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Edge Computing (MEC) is an emerging technology, where App vendors are allowed to cache multiple data replicas on geographically distributed edge servers to serve adjacent mobile subscribers. However, this benefit introduces an extra workload for edge servers and App vendors, as they must audit the integrity of multiple data replicas periodically considering various threats caused by distributed and dynamic MEC environments. The large-scale growth of data replicas certainly is a challenge to design more efficient Edge Data Integrity (EDI) verification approaches. Existing solutions are mostly limited to improving efficiency by optimizing proof generation and verification methods, while the improvement is still far from satisfactory due to adopting indiscriminate inspection philosophy (checking all data replicas without discrimination). In this paper, we make the first attempt to abstract a pre-processing phase and correspondingly study the Unreliable data Replica Selection (URS) problem. It can be seamlessly integrated into existing EDI solutions by solving the URS problem at the start of each verification round. Such pre-selection can significantly enhance overall EDI verification efficiency by incorporating the cache service Quality of Service (QoS) and verification success rate, especially in scenarios with a large number of data replicas. Specifically, we first formalize the URS problem as a constrained optimization problem, and further prove its NP -hardness. To address the problem efficiently, we transform it into an easy-to-handle form and develop a Priority-based approach named URS-P. Both theoretical analysis and experimental evaluation validate the effectiveness and efficiency of our proposed solution.
引用
收藏
页码:4481 / 4493
页数:13
相关论文
共 41 条
  • [1] A binary multi-verse optimizer for 0-1 multidimensional knapsack problems with application in interactive multimedia systems
    Abdel-Basset, Mohamed
    El-Shahat, Doaa
    Faris, Hossam
    Mirjalili, Seyedali
    [J]. COMPUTERS & INDUSTRIAL ENGINEERING, 2019, 132 : 187 - 206
  • [2] Unsupervised Machine Learning-Based Detection of Covert Data Integrity Assault in Smart Grid Networks Utilizing Isolation Forest
    Ahmed, Saeed
    Lee, YoungDoo
    Hyun, Seung-Ho
    Koo, Insoo
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (10) : 2765 - 2777
  • [3] [Anonymous], 2024, Data replication status
  • [4] Database security - Concepts, approaches, and challenges
    Bertino, E
    Sandhu, R
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2005, 2 (01) : 2 - 19
  • [5] LOF: Identifying density-based local outliers
    Breunig, MM
    Kriegel, HP
    Ng, RT
    Sander, J
    [J]. SIGMOD RECORD, 2000, 29 (02) : 93 - 104
  • [6] On the evaluation of unsupervised outlier detection: measures, datasets, and an empirical study
    Campos, Guilherme O.
    Zimek, Arthur
    Sander, Jorg
    Campello, Ricardo J. G. B.
    Micenkova, Barbora
    Schubert, Erich
    Assent, Ira
    Houle, Michael E.
    [J]. DATA MINING AND KNOWLEDGE DISCOVERY, 2016, 30 (04) : 891 - 927
  • [7] BOSSA: A Decentralized System for Proofs of Data Retrievability and Replication
    Chen, Dian
    Yuan, Haobo
    Hu, Shengshan
    Wang, Qian
    Wang, Cong
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2021, 32 (04) : 786 - 798
  • [8] Efficient Verification of Edge Data Integrity in Edge Computing Environment
    Cui, Guangming
    He, Qiang
    Li, Bo
    Xia, Xiaoyu
    Chen, Feifei
    Jin, Hai
    Xiang, Yang
    Yang, Yun
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (06) : 3233 - 3244
  • [9] Bayes' Theorem in the 21st Century
    Efron, Bradley
    [J]. SCIENCE, 2013, 340 (6137) : 1177 - 1178
  • [10] Dynamic Provable Data Possession
    Erway, C. Chris
    Kupcu, Alptekin
    Papamanthou, Charalampos
    Tamassia, Roberto
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2015, 17 (04)