Three Architectures for Trusted Data Dissemination in Edge Computing

Edge computing pushes application logic and the underlying data to the edge of the network, with the aim of improving availability and scalability. As the edge servers are not necessarily secure, there must be provisions for users to validate the results—that values in the result tuples are not tamp...

Full description

Saved in:
Bibliographic Details
Main Authors: GOH, Shen-Tat, PANG, Hwee Hwa, DENG, Robert H., BAO, Feng
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2006
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/1202
https://ink.library.smu.edu.sg/context/sis_research/article/2201/viewcontent/Three_Architectures_for_Trusted_Data_Dissemination_in_Edge_Computing__edited_.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-2201
record_format dspace
spelling sg-smu-ink.sis_research-22012017-07-11T09:44:34Z Three Architectures for Trusted Data Dissemination in Edge Computing GOH, Shen-Tat PANG, Hwee Hwa DENG, Robert H. BAO, Feng Edge computing pushes application logic and the underlying data to the edge of the network, with the aim of improving availability and scalability. As the edge servers are not necessarily secure, there must be provisions for users to validate the results—that values in the result tuples are not tampered with, that no qualifying data are left out, that no spurious tuples are introduced, and that a query result is not actually the output from a different query. This paper aims to address the challenges of ensuring data integrity in edge computing. We study three schemes that enable users to check the correctness of query results produced by the edge servers. Two of the schemes are our original contributions, while the third is an adaptation of existing work. Our study shows that each scheme offers different security features, and imposes different demands on the edge servers, user machines, and interconnecting network. In other words, all three schemes are useful for different application requirements and resource configurations. 2006-09-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1202 info:doi/10.1016/j.datak.2005.05.003 https://ink.library.smu.edu.sg/context/sis_research/article/2201/viewcontent/Three_Architectures_for_Trusted_Data_Dissemination_in_Edge_Computing__edited_.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Data integrity Edge computing Data dissemination Replication Databases and Information Systems Information Security Systems Architecture
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Data integrity
Edge computing
Data dissemination
Replication
Databases and Information Systems
Information Security
Systems Architecture
spellingShingle Data integrity
Edge computing
Data dissemination
Replication
Databases and Information Systems
Information Security
Systems Architecture
GOH, Shen-Tat
PANG, Hwee Hwa
DENG, Robert H.
BAO, Feng
Three Architectures for Trusted Data Dissemination in Edge Computing
description Edge computing pushes application logic and the underlying data to the edge of the network, with the aim of improving availability and scalability. As the edge servers are not necessarily secure, there must be provisions for users to validate the results—that values in the result tuples are not tampered with, that no qualifying data are left out, that no spurious tuples are introduced, and that a query result is not actually the output from a different query. This paper aims to address the challenges of ensuring data integrity in edge computing. We study three schemes that enable users to check the correctness of query results produced by the edge servers. Two of the schemes are our original contributions, while the third is an adaptation of existing work. Our study shows that each scheme offers different security features, and imposes different demands on the edge servers, user machines, and interconnecting network. In other words, all three schemes are useful for different application requirements and resource configurations.
format text
author GOH, Shen-Tat
PANG, Hwee Hwa
DENG, Robert H.
BAO, Feng
author_facet GOH, Shen-Tat
PANG, Hwee Hwa
DENG, Robert H.
BAO, Feng
author_sort GOH, Shen-Tat
title Three Architectures for Trusted Data Dissemination in Edge Computing
title_short Three Architectures for Trusted Data Dissemination in Edge Computing
title_full Three Architectures for Trusted Data Dissemination in Edge Computing
title_fullStr Three Architectures for Trusted Data Dissemination in Edge Computing
title_full_unstemmed Three Architectures for Trusted Data Dissemination in Edge Computing
title_sort three architectures for trusted data dissemination in edge computing
publisher Institutional Knowledge at Singapore Management University
publishDate 2006
url https://ink.library.smu.edu.sg/sis_research/1202
https://ink.library.smu.edu.sg/context/sis_research/article/2201/viewcontent/Three_Architectures_for_Trusted_Data_Dissemination_in_Edge_Computing__edited_.pdf
_version_ 1770570896549871616