A Comprehensive Survey on Edge Data Integrity Verification: Fundamentals and Future Trends

Author:

Zhao Yao1ORCID,Qu Youyang2ORCID,Xiang Yong2ORCID,Uddin Md Palash3ORCID,Peng Dezhong4ORCID,Gao Longxiang2ORCID

Affiliation:

1. Deakin University, Burwood, Australia

2. School of Information Technology, Deakin University Faculty of Science Engineering and Built Environment, Geelong, Australia

3. School of IT, Deakin University, Burwood, Australia

4. Sichuan University, Chengdu, China

Abstract

Recent advances in edge computing (EC) have pushed cloud-based data caching services to edge, however, such emerging edge storage comes with numerous challenging and unique security issues. One of them is the problem of edge data integrity verification (EDIV) which coordinates multiple participants (e.g., data owners and edge nodes) to inspect whether data cached on edge is authentic. To date, various solutions have been proposed to address the EDIV problem, while there is no systematic review. Thus, we offer a comprehensive survey for the first time, aiming to show current research status, open problems, and potentially promising insights for readers to further investigate this under-explored field. Specifically, we begin by stating the significance of the EDIV problem, the integrity verification difference between data cached on cloud and edge, and three typical system models with corresponding inspection processes. To thoroughly assess prior research efforts, we synthesize a universal criteria framework that an effective verification approach should satisfy. On top of it, a schematic development timeline is developed to reveal the research advance on EDIV in a sequential manner, followed by a detailed review of the existing EDIV solutions. Finally, we highlight intriguing research challenges and possible directions for future work, along with a discussion on how forthcoming technology, e.g., machine learning and context-aware security, can augment security in EC. Given our findings, some major observations are: there is a noticeable trend to equip EDIV solutions with various functions and diversify study scenarios; completing EDIV within two types of participants (i.e., data owner and edge nodes) is garnering escalating interest among researchers; although the majority of existing methods rely on cryptography, emerging technology is being explored to handle the EDIV problem.

Publisher

Association for Computing Machinery (ACM)

Reference172 articles.

1. Linghe Kong Jinlin Tan Junqin Huang Guihai Chen Shuaitian Wang Xi Jin Peng Zeng Muhammad K Khan and Sajal K Das. 2022. Edge-Computing-Driven Internet of Things: A Survey. ACM Computing Surveys (CSUR)(2022).

2. Asif Ali Laghari, Kaishan Wu, Rashid Ali Laghari, Mureed Ali, and Abdullah Ayub Khan. 2021. A review and state of art of Internet of Things (IoT). Archives of Computational Methods in Engineering (2021), 1–19.

3. Detecting iot devices in the internet;Guo Hang;IEEE/ACM Transactions on Networking,2020

4. Luís ML Oliveira, João Reis, Joel JPC Rodrigues, and Amaro F de Sousa. 2015. IOT based solution for home power energy monitoring and actuating. In 2015 IEEE 13th International Conference on Industrial Informatics (INDIN). IEEE, 988–992.

5. Sensing, Controlling, and IoT Infrastructure in Smart Building: A Review

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. From Data Integrity to Global ModeI Integrity for Decentralized Federated Learning: A Blockchain-based Approach;2024 International Joint Conference on Neural Networks (IJCNN);2024-06-30

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3