Conference Proceeding Article
Edge computing pushes application logic and the underlying data to the edge of the network, with the aim of improving availability and scalability. As the edge servers are not necessarily secure, there must be provisions for validating their outputs. This paper proposes a mechanism that creates a verification object (VO) for checking the integrity of each query result produced by an edge server - that values in the result tuples are not tampered with, and that no spurious tuples are introduced. The primary advantages of our proposed mechanism are that the VO is independent of the database size, and that relational operations can still be fulfilled by the edge servers. These advantages reduce transmission load and processing at the clients. We also show how insert and delete transactions can be supported.
Edge computing, Edge servers, Result authentication, Transmission loads
Databases and Information Systems | Numerical Analysis and Scientific Computing
Data Management and Analytics
ICDE 2004: 20th IEEE International Conference on Data Engineering: Proceedings: 30 March-2 April, 2004, Boston
IEEE Computer Society
City or Country
Los Alamitos, CA
PANG, Hwee Hwa and TAN, Kian-Lee.
Authenticating Query Results in Edge Computing. (2004). ICDE 2004: 20th IEEE International Conference on Data Engineering: Proceedings: 30 March-2 April, 2004, Boston. 560-571. Research Collection School Of Information Systems.
Available at: http://ink.library.smu.edu.sg/sis_research/1141
Copyright Owner and License
Creative Commons License
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License.