Decentralized Data Integrity Inspection Offloading in Edge Computing Systems Using Potential Games

被引:0
作者
Seyedi, Zahra [1 ]
Rahmati, Farhad [1 ]
Ali, Mohammad [1 ]
Liu, Ximeng [2 ]
机构
[1] Amirkabir Univ Technol, Dept Math & Comp Sci, Tehran 158754413, Iran
[2] Fuzhou Univ, Coll Comp & Data Sci, Key Lab Informat Secur Network Syst, Fuzhou 350108, Peoples R China
关键词
Inspection; Data integrity; Games; Security; Blockchains; Cloud computing; Servers; Faces; Nash equilibrium; Costs; Data integrity auditing; edge storage; game theory; provable security; CACHE DATA INTEGRITY; BLOCKCHAIN;
D O I
10.1109/TMC.2024.3516583
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Edge storage is becoming an increasingly appealing alternative for data owners (DOs), offering benefits like decreased latency and minimized bandwidth usage compared to traditional cloud storage solutions. Nonetheless, stored data within edge servers (ESs) remains vulnerable to disruptions. Existing data integrity auditing schemes face challenges such as the costs of third-party auditors (TPA), unreliable and delayed audit results, and effective management of data inspection concerning time and energy consumption. To tackle these challenges, we introduce DIVO, a decentralized data inspection approach. DIVO leverages ESs as each others' auditors, removing the necessity for a centralized party, thereby mitigating collision risks and potential biases in audit results. We propose a game-theoretic technique to efficiently manage data inspection and verification offloading to ESs. By formulating the decision-making issue as a strategic game for optimally allocating verification tasks among multiple ESs, we establish the presence of Nash equilibrium and design a strategy to attain it. Through comprehensive security and performance evaluations, DIVO has been shown to operate securely within the random oracle model while delivering notable efficiency improvements over recent methods. Our analysis highlights that DIVO surpasses a wide range of recent approaches in both communication and computation efficiency.
引用
收藏
页码:3950 / 3961
页数:12
相关论文
共 40 条
  • [21] Liu D., 2023, Cyber Secur. Appl., V1
  • [22] Clustering-based data integrity verification approach for multi-replica in a fog environment
    Maheswari, K. Uma
    Bhanu, S. Mary Saira
    Savarimuthu, Nickolas
    [J]. JOURNAL OF SUPERCOMPUTING, 2024, 80 (03) : 3089 - 3113
  • [23] Mohammed L. A., 2018, Int. J. Netw. Secur. Appl., V10
  • [24] Potential games
    Monderer, D
    Shapley, LS
    [J]. GAMES AND ECONOMIC BEHAVIOR, 1996, 14 (01) : 124 - 143
  • [25] Osborne M., 2004, INTRO GAME THEORY
  • [26] Efficient power control via pricing in wireless data networks
    Saraydar, CU
    Mandayam, NB
    Goodman, DJ
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2002, 50 (02) : 291 - 303
  • [27] A practical vehicular-fog-based privacy-preserving attribute-based keyword search system using potential games
    Seyedi, Zahra
    Rahmati, Farhad
    Ali, Mohammad
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (10):
  • [28] Seyedi Z, 2023, Arxiv, DOI arXiv:2312.16007
  • [29] Verifiable and privacy-preserving fine-grained data management in vehicular fog computing: A game theory-based approach
    Seyedi, Zahra
    Rahmati, Farhad
    Ali, Mohammad
    Liu, Ximeng
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (01) : 410 - 431
  • [30] Blockchain-Based Decentralized Public Auditing for Cloud Storage
    Shu, Jiangang
    Zou, Xing
    Jia, Xiaohua
    Zhang, Weizhe
    Xie, Ruitao
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (04) : 2366 - 2380