Affiliation:
1. Deakin University, Burwood, Australia
2. School of Information Technology, Deakin University Faculty of Science Engineering and Built Environment, Geelong, Australia
3. School of IT, Deakin University, Burwood, Australia
4. Sichuan University, Chengdu, China
Abstract
Recent advances in edge computing (EC) have pushed cloud-based data caching services to edge, however, such emerging edge storage comes with numerous challenging and unique security issues. One of them is the problem of edge data integrity verification (EDIV) which coordinates multiple participants (e.g., data owners and edge nodes) to inspect whether data cached on edge is authentic. To date, various solutions have been proposed to address the EDIV problem, while there is no systematic review. Thus, we offer a comprehensive survey for the first time, aiming to show current research status, open problems, and potentially promising insights for readers to further investigate this under-explored field. Specifically, we begin by stating the significance of the EDIV problem, the integrity verification difference between data cached on cloud and edge, and three typical system models with corresponding inspection processes. To thoroughly assess prior research efforts, we synthesize a universal criteria framework that an effective verification approach should satisfy. On top of it, a schematic development timeline is developed to reveal the research advance on EDIV in a sequential manner, followed by a detailed review of the existing EDIV solutions. Finally, we highlight intriguing research challenges and possible directions for future work, along with a discussion on how forthcoming technology, e.g., machine learning and context-aware security, can augment security in EC. Given our findings, some major observations are: there is a noticeable trend to equip EDIV solutions with various functions and diversify study scenarios; completing EDIV within two types of participants (i.e., data owner and edge nodes) is garnering escalating interest among researchers; although the majority of existing methods rely on cryptography, emerging technology is being explored to handle the EDIV problem.
Publisher
Association for Computing Machinery (ACM)
Reference172 articles.
1. Linghe Kong Jinlin Tan Junqin Huang Guihai Chen Shuaitian Wang Xi Jin Peng Zeng Muhammad K Khan and Sajal K Das. 2022. Edge-Computing-Driven Internet of Things: A Survey. ACM Computing Surveys (CSUR)(2022).
2. Asif Ali Laghari, Kaishan Wu, Rashid Ali Laghari, Mureed Ali, and Abdullah Ayub Khan. 2021. A review and state of art of Internet of Things (IoT). Archives of Computational Methods in Engineering (2021), 1–19.
3. Detecting iot devices in the internet;Guo Hang;IEEE/ACM Transactions on Networking,2020
4. Luís ML Oliveira, João Reis, Joel JPC Rodrigues, and Amaro F de Sousa. 2015. IOT based solution for home power energy monitoring and actuating. In 2015 IEEE 13th International Conference on Industrial Informatics (INDIN). IEEE, 988–992.
5. Sensing, Controlling, and IoT Infrastructure in Smart Building: A Review
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献