2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS) 2019
DOI: 10.1109/icdcs.2019.00104
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Data Integrity Verification in Mobile Edge Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(12 citation statements)
references
References 29 publications
0
12
0
Order By: Relevance
“…Tong et al [32] proposed two integrity checking protocols for mobile edge computing, checking the data integrity at the edge based on the concept of provable data ownership and proprietary information retrieval techniques. Liu et al [33] modeled data failures by classifying them into format failures, time series failures, and value failures and proposed several heuristic rules for the detection and isolation of data failures.…”
Section: Related Workmentioning
confidence: 99%
“…Tong et al [32] proposed two integrity checking protocols for mobile edge computing, checking the data integrity at the edge based on the concept of provable data ownership and proprietary information retrieval techniques. Liu et al [33] modeled data failures by classifying them into format failures, time series failures, and value failures and proposed several heuristic rules for the detection and isolation of data failures.…”
Section: Related Workmentioning
confidence: 99%
“…In recent years, the security issues of MEC have also attracted some attention. For example, Tong et al [19] first studied the data integrity verification of mobile edge computing. ey proposed two methods, which are suitable for users who want to verify the integrity of unilateral or multilateral data.…”
Section: Mobile Edgementioning
confidence: 99%
“…Recently, some research has aimed at auditing the integrity of data in edge computing 33–37 . Wang et al 33 researched the balance between privacy and data integrity in edge‐assisted internet of things, but they did not solve the issues raised in our challenges.…”
Section: Related Workmentioning
confidence: 99%
“…Wang et al 33 researched the balance between privacy and data integrity in edge‐assisted internet of things, but they did not solve the issues raised in our challenges. Tong et al 34 proposed to check data integrity on a single edge or multiple edges. Liu et al 35 proposed an efficient data integrity auditing in edge computing, however, their work is still based on the existence of trusted TPA.…”
Section: Related Workmentioning
confidence: 99%