Publication Type

Conference Proceeding Article

Version

acceptedVersion

Publication Date

3-2004

Abstract

Edge computing pushes application logic and the underlying data to the edge of the network, with the aim of improving availability and scalability. As the edge servers are not necessarily secure, there must be provisions for validating their outputs. This paper proposes a mechanism that creates a verification object (VO) for checking the integrity of each query result produced by an edge server - that values in the result tuples are not tampered with, and that no spurious tuples are introduced. The primary advantages of our proposed mechanism are that the VO is independent of the database size, and that relational operations can still be fulfilled by the edge servers. These advantages reduce transmission load and processing at the clients. We also show how insert and delete transactions can be supported.

Keywords

Edge computing, Edge servers, Result authentication, Transmission loads

Discipline

Databases and Information Systems | Numerical Analysis and Scientific Computing

Publication

ICDE 2004: 20th IEEE International Conference on Data Engineering: Proceedings: 30 March-2 April, 2004, Boston

First Page

560

Last Page

571

ISBN

9780769520650

Identifier

10.1109/ICDE.2004.1320027

Publisher

IEEE Computer Society

City or Country

Los Alamitos, CA

Copyright Owner and License

Authors

Additional URL

http://doi.ieeecomputersociety.org/10.1109/ICDE.2004.1320027

Share

COinS