Efficient Verification of Edge Data Integrity in Edge Computing Environment

Guangming Cui,Qiang He,Bo Li,Xiaoyu Xia,Feifei Chen,Hai Jin,Yang Xiang,Yun Yang
DOI: https://doi.org/10.1109/tsc.2021.3090173
IF: 11.019
2022-01-01
IEEE Transactions on Services Computing
Abstract:The new edge computing paradigm extends cloud computing by allowing service vendors to deploy their service instances and data on distributed edge servers to serve their service users in close geographic proximity to those edge servers. Caching edge data on edge servers profoundly reduces the retrieval latency perceived by users. However, these edge data are subject to corruption due to intentional and/or accidental exceptions. This is a major challenge for service vendors but has been overlooked. Thus, verifying the integrity of edge data accurately and efficiently is a critical security problem in the edge computing environment. A unique characteristic of the edge computing environment is that edge servers suffer from constrained computing capacities. Thus, verifying data integrity on massive edge servers individually is computationally expensive and impractical. In this paper, we tackle this Edge Data Integrity (EDI) problem with an inspection and corruption localization scheme for EDI named ICL-EDI. This scheme allows service vendors to inspect data integrity and localize corrupted edge data cached on multiple edge servers accurately and efficiently. To evaluate its performance, we implement ICL-EDI and conduct extensive experiments to demonstrate its effectiveness and efficiency.
computer science, information systems, software engineering
What problem does this paper attempt to address?
This paper attempts to address the challenge of efficiently verifying the integrity of edge data in the edge - computing environment. Specifically, it focuses on how service providers can ensure the integrity of data when the data cached in distributed edge servers are not fully under their control. Since edge servers are restricted by computing resources, traditional cloud data integrity verification methods (such as Provable Data Possession (PDP)) are not suitable for the edge - computing environment. Therefore, the paper proposes a new scheme named ICL - EDI, aiming to help service providers accurately locate the corrupted edge data copies through data inspection while ensuring low computing overhead. ### Background of the Paper and Problem Definition With the development of edge computing, more and more service providers choose to deploy data and service instances on edge servers close to users to reduce data retrieval latency and improve user experience. However, this approach also brings new challenges, that is, edge data are easily damaged due to accidental or intentional reasons. This not only affects the quality of service but may also lead to serious security issues. Therefore, how to efficiently verify data integrity in the resource - constrained edge - computing environment has become an important research topic. ### Overview of the ICL - EDI Scheme The ICL - EDI scheme realizes the simultaneous verification of multiple edge data copies by introducing homomorphic tags and sampling techniques, and significantly reduces the computing overhead of service providers and edge servers. The specific steps are as follows: 1. **Key Generation (KeyGen)**: - The service provider generates a pair of public and private keys for the subsequent data verification process. - The public key is used to generate homomorphic tags, and the private key is used to verify the check of the results. 2. **Homomorphic Tag Generation (TagGen)**: - Each edge server generates homomorphic tags for its cached data copies according to the public key. - These tags have homomorphic properties and can be combined for operations, thus enabling batch verification. 3. **Challenge Generation (ChalEdge)**: - The service provider generates a series of challenge requests and sends them to each edge server. - The challenge requests contain random keys for generating sample data blocks required for verification. 4. **Proof Generation (ProGen)**: - The edge server randomly extracts sample data blocks from its cached data copies according to the received challenge requests and generates corresponding integrity proofs. - The integrity proofs are calculated through homomorphic tags and then returned to the service provider. 5. **Proof Verification (CheckPro)**: - The service provider receives the integrity proofs returned by all edge servers and compares them with the correct proofs generated from the original data stored locally. - Through the binary search technique, the corrupted edge data copies are quickly located. ### Key Contributions 1. **Propose and study the ED (Edge Data Integrity) problem**: - In response to the special requirements of data integrity verification in the edge - computing environment, a new solution is proposed. 2. **Design and implement the ICL - EDI scheme**: - Theoretically prove the correctness and probabilistic integrity guarantee of ICL - EDI. - Experimentally verify the effectiveness and efficiency of ICL - EDI in large - scale data copies. 3. **Experimental Evaluation**: - Through experiments, verify the performance of ICL - EDI in practical applications and show its high efficiency and accuracy in handling a large number of edge data copies. ### Summary By proposing the ICL - EDI scheme, this paper solves the problem of data integrity verification in the edge - computing environment and provides service providers with an efficient and low - cost solution. This scheme is not only strictly proven theoretically but also shows good performance in experiments and has important practical application value.