Affiliation:
1. School of Cyber Security and Computer Science, Hebei University, China
2. College of Intelligence and Computing, Tianjin University, China
Abstract
As far as mobile edge computing is concerned, it is necessary to ensure the data integrity of latency-sensitive applications during the process of computing. While certain research programs have demonstrated efficacy, challenges persist, including the inefficient utilization of computing resources, network backhaul issues, and the occurrence of false-negative detections. To solve these problems, an integrity protection scheme is proposed in this paper on the basis of data right confirmation (DRC). Under this scheme, a two-layer consensus algorithm is developed. The outer algorithm is applied to establish a data authorization mechanism by marking the original data source to avoid the false negative results caused by network attacks from the data source. In addition, blockchain-based mobile edge computing (BMEC) technology is applied to enable data sharing in the context of mobile edge computing while minimizing the network backhaul of edge computing. Based on the Merkle Tree algorithm, the inner layer algorithm is capable not only of accurately locating and promptly repairing damaged data but also of verifying all servers in the mobile edge computing network either regularly or on demand. Finally, our proposal is evaluated against two existing research schemes. The experimental results show that our proposed scheme is not only effective in ensuring data integrity in mobile edge computing, but it is also capable of achieving better performance.
Reference37 articles.
1. A. Ali Harchaoui, A. Younes, A. El Hibaoui and A. Bendahmane, Survey and a new taxonomy of proofs of retrievability on the cloud storage, in: Proceedings of the 4th International Conference on Networking, Information Systems & Security, 2021, pp. 1–8.
2. Applications of blockchain in unmanned aerial vehicles: A review
3. G. Anthoine, J.-G. Dumas, M. de Jonghe, A. Maignan, C. Pernet, M. Hanling and D.S. Roche, Dynamic proofs of retrievability with low server storage, in: 30th USENIX Security Symposium (USENIX Security 21), 2021, pp. 537–554.
4. Security and privacy of UAV data using blockchain technology
5. G. Cui, Q. He, B. Li, X. Xia, F. Chen, H. Jin, Y. Xiang and Y. Yang, Efficient verification of edge data integrity in edge computing environment, IEEE Transactions on Services Computing (2021).