Decentralized Data Integrity Inspection Offloading in Edge Computing Systems Using Potential Games

被引:0
作者
Seyedi, Zahra [1 ]
Rahmati, Farhad [1 ]
Ali, Mohammad [1 ]
Liu, Ximeng [2 ]
机构
[1] Amirkabir Univ Technol, Dept Math & Comp Sci, Tehran 158754413, Iran
[2] Fuzhou Univ, Coll Comp & Data Sci, Key Lab Informat Secur Network Syst, Fuzhou 350108, Peoples R China
关键词
Inspection; Data integrity; Games; Security; Blockchains; Cloud computing; Servers; Faces; Nash equilibrium; Costs; Data integrity auditing; edge storage; game theory; provable security; CACHE DATA INTEGRITY; BLOCKCHAIN;
D O I
10.1109/TMC.2024.3516583
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Edge storage is becoming an increasingly appealing alternative for data owners (DOs), offering benefits like decreased latency and minimized bandwidth usage compared to traditional cloud storage solutions. Nonetheless, stored data within edge servers (ESs) remains vulnerable to disruptions. Existing data integrity auditing schemes face challenges such as the costs of third-party auditors (TPA), unreliable and delayed audit results, and effective management of data inspection concerning time and energy consumption. To tackle these challenges, we introduce DIVO, a decentralized data inspection approach. DIVO leverages ESs as each others' auditors, removing the necessity for a centralized party, thereby mitigating collision risks and potential biases in audit results. We propose a game-theoretic technique to efficiently manage data inspection and verification offloading to ESs. By formulating the decision-making issue as a strategic game for optimally allocating verification tasks among multiple ESs, we establish the presence of Nash equilibrium and design a strategy to attain it. Through comprehensive security and performance evaluations, DIVO has been shown to operate securely within the random oracle model while delivering notable efficiency improvements over recent methods. Our analysis highlights that DIVO surpasses a wide range of recent approaches in both communication and computation efficiency.
引用
收藏
页码:3950 / 3961
页数:12
相关论文
共 40 条
  • [1] Ali M, 2023, Arxiv, DOI arXiv:2308.05198
  • [2] Anonymous Aggregate Fine-Grained Cloud Data Verification System for Smart Health
    Ali, Mohammad
    Sadeghi, Mohammad-Reza
    Liu, Ximeng
    Vasilakos, Athanasios V.
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (03) : 2839 - 2855
  • [3] [Anonymous], 2007, The Python pairing based cryptography library
  • [4] [Anonymous], 2006, Secure hashes and message digests library
  • [5] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [6] Blockchain-based data integrity framework for Internet of Things
    Chanal, Poornima M.
    Kakkasageri, Mahabaleshwar S.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (01) : 519 - 532
  • [7] Trusted audit with untrusted auditors: A decentralized data integrity Crowdauditing approach based on blockchain
    Chen, Haiwen
    Zhou, Huan
    Yu, Jiaping
    Wu, Kui
    Liu, Fang
    Zhou, Tongqing
    Cai, Zhiping
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2021, 36 (11) : 6213 - 6239
  • [8] Efficient Verification of Edge Data Integrity in Edge Computing Environment
    Cui, Guangming
    He, Qiang
    Li, Bo
    Xia, Xiaoyu
    Chen, Feifei
    Jin, Hai
    Xiang, Yang
    Yang, Yun
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (06) : 3233 - 3244
  • [9] A Potential Game Theoretic Approach to Computation Offloading Strategy Optimization in End-Edge-Cloud Computing
    Ding, Yan
    Li, Kenli
    Liu, Chubo
    Li, Keqin
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2022, 33 (06) : 1503 - 1519
  • [10] To Blockchain or Not to Blockchain: That Is the Question
    Gatteschi, Valentina
    Lamberti, Fabrizio
    Demartini, Claudio
    Pranteda, Chiara
    Santamaria, Victor
    [J]. IT PROFESSIONAL, 2018, 20 (02) : 62 - 74