Decentralized Data Integrity Inspection Offloading in Edge Computing Systems Using Potential Games

被引:0
作者
Seyedi, Zahra [1 ]
Rahmati, Farhad [1 ]
Ali, Mohammad [1 ]
Liu, Ximeng [2 ]
机构
[1] Amirkabir Univ Technol, Dept Math & Comp Sci, Tehran 158754413, Iran
[2] Fuzhou Univ, Coll Comp & Data Sci, Key Lab Informat Secur Network Syst, Fuzhou 350108, Peoples R China
关键词
Inspection; Data integrity; Games; Security; Blockchains; Cloud computing; Servers; Faces; Nash equilibrium; Costs; Data integrity auditing; edge storage; game theory; provable security; CACHE DATA INTEGRITY; BLOCKCHAIN;
D O I
10.1109/TMC.2024.3516583
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Edge storage is becoming an increasingly appealing alternative for data owners (DOs), offering benefits like decreased latency and minimized bandwidth usage compared to traditional cloud storage solutions. Nonetheless, stored data within edge servers (ESs) remains vulnerable to disruptions. Existing data integrity auditing schemes face challenges such as the costs of third-party auditors (TPA), unreliable and delayed audit results, and effective management of data inspection concerning time and energy consumption. To tackle these challenges, we introduce DIVO, a decentralized data inspection approach. DIVO leverages ESs as each others' auditors, removing the necessity for a centralized party, thereby mitigating collision risks and potential biases in audit results. We propose a game-theoretic technique to efficiently manage data inspection and verification offloading to ESs. By formulating the decision-making issue as a strategic game for optimally allocating verification tasks among multiple ESs, we establish the presence of Nash equilibrium and design a strategy to attain it. Through comprehensive security and performance evaluations, DIVO has been shown to operate securely within the random oracle model while delivering notable efficiency improvements over recent methods. Our analysis highlights that DIVO surpasses a wide range of recent approaches in both communication and computation efficiency.
引用
收藏
页码:3950 / 3961
页数:12
相关论文
共 40 条
[21]  
Liu Z. Li, 2023, Cyber Secur App, V1
[22]   Clustering-based data integrity verification approach for multi-replica in a fog environment [J].
Maheswari, K. Uma ;
Bhanu, S. Mary Saira ;
Savarimuthu, Nickolas .
JOURNAL OF SUPERCOMPUTING, 2024, 80 (03) :3089-3113
[23]  
Mohammed L. A., 2018, Int. J. Netw. Secur. Appl., V10
[24]   Potential games [J].
Monderer, D ;
Shapley, LS .
GAMES AND ECONOMIC BEHAVIOR, 1996, 14 (01) :124-143
[25]  
Osborne MJ., 2004, An introduction to game theory
[26]   Efficient power control via pricing in wireless data networks [J].
Saraydar, CU ;
Mandayam, NB ;
Goodman, DJ .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2002, 50 (02) :291-303
[27]   A practical vehicular-fog-based privacy-preserving attribute-based keyword search system using potential games [J].
Seyedi, Zahra ;
Rahmati, Farhad ;
Ali, Mohammad .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (10)
[28]  
Seyedi Z, 2023, Arxiv, DOI arXiv:2312.16007
[29]   Verifiable and privacy-preserving fine-grained data management in vehicular fog computing: A game theory-based approach [J].
Seyedi, Zahra ;
Rahmati, Farhad ;
Ali, Mohammad ;
Liu, Ximeng .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (01) :410-431
[30]   Blockchain-Based Decentralized Public Auditing for Cloud Storage [J].
Shu, Jiangang ;
Zou, Xing ;
Jia, Xiaohua ;
Zhang, Weizhe ;
Xie, Ruitao .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (04) :2366-2380