Publication Type

Journal Article

Publication Date

9-2006

Abstract

Edge computing pushes application logic and the underlying data to the edge of the network, with the aim of improving availability and scalability. As the edge servers are not necessarily secure, there must be provisions for users to validate the results—that values in the result tuples are not tampered with, that no qualifying data are left out, that no spurious tuples are introduced, and that a query result is not actually the output from a different query. This paper aims to address the challenges of ensuring data integrity in edge computing. We study three schemes that enable users to check the correctness of query results produced by the edge servers. Two of the schemes are our original contributions, while the third is an adaptation of existing work. Our study shows that each scheme offers different security features, and imposes different demands on the edge servers, user machines, and interconnecting network. In other words, all three schemes are useful for different application requirements and resource configurations.

Keywords

Data integrity, Edge computing, Data dissemination, Replication

Discipline

Databases and Information Systems | Information Security | Systems Architecture

Research Areas

Data Management and Analytics; Cybersecurity

Publication

Data and Knowledge Engineering

Volume

58

Issue

3

First Page

381

Last Page

409

ISSN

0169-023X

Identifier

10.1016/j.datak.2005.05.003

Publisher

Elsevier

Copyright Owner and License

Authors

Creative Commons License

Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License.

Additional URL

http://doi.org/10.1016/j.datak.2005.05.003

Share

COinS