Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3534678.3539104acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

EdgeWatch: Collaborative Investigation of Data Integrity at the Edge based on Blockchain

Published: 14 August 2022 Publication History

Abstract

Mobile edge computing (MEC) offers the infrastructure for improving data caching performance structurally by deploying edge servers at the network edge within users' close geographic proximity. Popular data like viral videos can be cached on edge servers to serve users with low latency. Investigating the integrity of these edge data is critical and challenging as edge servers often suffer from unreliability and constrained resources. Meanwhile, EDI (edge data integrity) investigation must be performed by edge servers collaboratively at the edge to avoid excessive backhaul network traffic. There are two main challenges in practice: 1) there is a lack of Byzantine-tolerant collaborative investigation method; and 2) edge servers may be reluctant to collaborate without proper incentives. To tackle these challenges systematically, this paper proposes a novel scheme named EdgeWatch to enable robust and collaborative EDI investigation in a decentralized manner based on blockchain. Under EdgeWatch, edge servers collaborate on EDI investigation following a novel integrity consensus. A blockchain system comprises of three main components is built as the infrastructure to facilitate integrity consensus: 1) an incentive mechanism that motivates edge servers to participate in EDI investigation; 2) a reputation system that elects reliable leaders for block consensus; and 3) a leader randomization technique that protects leaders from targeted attacks. We evaluate it against three representative schemes experimentally. The results demonstrate the high precision, efficiency, and robustness of EdgeWatch.

References

[1]
Daniel Abadi, Owen Arden, Faisal Nawab, and Moshe Shadmon. 2020. Anylog: A grand unification of the Internet of things. In Conference on Innovative Data Systems Research (CIDR20) .
[2]
Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, and Dawn Song. 2007. Provable data possession at untrusted stores. In ACM Conference on Computer and Communications Security. 598--609.
[3]
Amin Banitalebi-Dehkordi, Naveen Vedula, Jian Pei, Fei Xia, Lanjun Wang, and Yong Zhang. 2021. Auto-split: a general framework of collaborative edge-cloud ai. In Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining. 2543--2553.
[4]
Paulo SLM Barreto, Hae Y Kim, Ben Lynn, and Michael Scott. 2002. Efficient algorithms for pairing-based cryptosystems. In Annual International Cryptology Conference. Springer, 354--369.
[5]
A. F. Barsoum and M. A. Hasan. 2015. Provable multicopy dynamic data possession in cloud computing systems. IEEE Transactions on Information Forensics and Security, Vol. 10 (2015), 485--497.
[6]
Miguel Castro, Barbara Liskov, et al. 1999. Practical Byzantine fault tolerance. In OSDI, Vol. 99. 173--186.
[7]
Guangming Cui, Qiang He, Bo Li, Xiaoyu Xia, Feifei Chen, Hai Jin, Yang Xiang, and Yun Yang. 2021. Efficient verification of edge data integrity in edge computing Environment. IEEE Transactions on Services Computing (2021). https://doi.org/10.1109/TSC.2021.3090173
[8]
Yevgeniy Dodis and Aleksandr Yampolskiy. 2005. A verifiable random function with short proofs and keys. In International Workshop on Public Key Cryptography. Springer, 416--431.
[9]
Dawei Gao, Xiaoxi He, Zimu Zhou, Yongxin Tong, Ke Xu, and Lothar Thiele. 2020. Rethinking pruning for accelerating deep inference at the edge. In Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. 155--164.
[10]
Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, and Nickolai Zeldovich. 2017. Algorand: Scaling Byzantine agreements for cryptocurrencies. In 2017 26th Symposium on Operating Systems Principles. 51--68.
[11]
Google. 2021. Google Stadia. https://stadia.google.com/. [Online; accessed 20-September-2021].
[12]
Qiang He, Guangming Cui, Xuyun Zhang, Feifei Chen, Shuiguang Deng, Hai Jin, Yanhui Li, and Yun Yang. 2019. A game-theoretical approach for user allocation in edge computing environment. IEEE Transactions on Parallel and Distributed Systems, Vol. 31, 3 (2019), 515--529.
[13]
Qiang He, Zeqian Dong, Feifei Chen, Shuiguang Deng, Weifa Liang, and Yun Yang. 2022. Pyramid: Enabling hierarchical neural networks with edge computing. In The Web Conference. 1860--1870. https://doi.org/10.1145/3485447.3511990
[14]
Qiang He, Cheng Wang, Guangming Cui, Bo Li, Rui Zhou, Qingguo Zhou, Yang Xiang, Hai Jin, and Yun Yang. 2021. A game-theoretical approach for mitigating edge DDoS attack. IEEE Transactions on Dependable and Secure Computing (2021). https://doi.org/10.1109/TDSC.2021.3055559
[15]
Ari Juels and Burton S Kaliski Jr. 2007. textPORs: Proofs of retrievability for large files. In ACM Conference on Computer and Communications Security. 584--597.
[16]
Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov. 2017. Ouroboros: A provably secure proof-of-stake blockchain protocol. In Annual International Cryptology Conference. Springer, 357--388.
[17]
Frank Klinker. 2011. Exponential moving average versus moving exponential average. Mathematische Semesterberichte, Vol. 58, 1 (2011), 97--107.
[18]
Bo Li, Qiang He, Feifei Chen, Haipeng Dai, Hai Jin, Yang Xiang, and Yun Yang. 2021 a. Cooperative assurance of cache data integrity for mobile edge computing. IEEE Transactions on Information Forensics and Security, Vol. 16 (2021), 4648--4662.
[19]
Bo Li, Qiang He, Feifei Chen, Hai Jin, Yang Xiang, and Yun Yang. 2021 b. Auditing cache data integrity in the edge computing environment. IEEE Transactions on Parallel and Distributed Systems, Vol. 32, 5 (2021), 1210--1223. https://doi.org/10.1109/TPDS.2020.3043755
[20]
Bo Li, Qiang He, Feifei Chen, Hai Jin, Yang Xiang, and Yun Yang. 2021 c. Inspecting edge data integrity with aggregated signature in distributed edge computing environment. IEEE Transactions on Cloud Computing (2021). https://doi.org/10.1109/TCC.2021.3059448
[21]
Bo Li, Qiang He, Guangming Cui, Xiaoyu Xia, Feifei Chen, Hai Jin, and Yun Yang. 2022. textREAD: Robustness-oriented edge application deployment in edge computing environment. In IEEE Transactions on Services Computing, Vol. 15. 1746--1759. https://doi.org/10.1109/TSC.2020.3015316
[22]
J. Li, H. Yan, and Y. Zhang. 2019. Efficient identity-based provable multi-copy data possession in multi-cloud storage. IEEE Transactions on Cloud Computing (2019). https://doi.org/10.1109/TCC.2019.2929045
[23]
Fang Liu, Guoming Tang, Youhuizi Li, Zhiping Cai, Xingzhou Zhang, and Tongqing Zhou. 2019. A survey on edge computing systems and tools. Proc. IEEE, Vol. 107, 8 (2019), 1537--1562.
[24]
Mengting Liu, F Richard Yu, Yinglei Teng, Victor CM Leung, and Mei Song. 2018. Distributed resource allocation in blockchain-based video streaming systems with mobile edge computing. IEEE Transactions on Wireless Communications, Vol. 18, 1 (2018), 695--708.
[25]
Meta. 2021. Meta Horizon. https://www.oculus.com/facebook-horizon/. [Online; accessed 20-September-2021].
[26]
Silvio Micali, Salil Vadhan, and Michael Rabin. 1999. Verifiable random functions. In Proceedings of the 40th Annual Symposium on Foundations of Computer Science. IEEE, 120--130.
[27]
Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review (2008), 21260.
[28]
Arvind Narayanan, Eman Ramadan, Jason Carpenter, Qingxu Liu, Yu Liu, Feng Qian, and Zhi-Li Zhang. 2020. A first look at commercial 5G performance on smartphones. In 2020 International Conference on World Wide Web. 894--905.
[29]
Diego Ongaro and John Ousterhout. 2014. In search of an understandable consensus algorithm. In textUSENIX Annual Technical Conference. 305--319.
[30]
Zeineb Rejiba, Xavier Masip-Bruin, and Eva Marin-Tordera. 2019. A survey on mobility-induced service migration in the fog, edge, and related computing paradigms. ACM Computing Surveys (CSUR), Vol. 52, 5 (2019), 1--33.
[31]
Hamed Rezaei and Balajee Vamanan. 2021. Superways: A datacenter topology for incast-heavy workloads. In Proceedings of the Web Conference 2021. 317--328.
[32]
Farah Ait Salaht, Frédéric Desprez, and Adrien Lebre. 2020. An overview of service placement problem in fog and edge computing. ACM Computing Surveys (CSUR), Vol. 53, 3 (2020), 1--35.
[33]
Qin Wang and Rujia Li. 2021. A weak consensus algorithm and its application to high-performance blockchain. In 2021 IEEE Conference on Computer Communications (INFOCOM). 1--10. https://doi.org/10.1109/INFOCOM42981.2021.9488725
[34]
Yinhao Xiao, Yizhen Jia, Chunchi Liu, Xiuzhen Cheng, Jiguo Yu, and Weifeng Lv. 2019. Edge computing security: State of the art and challenges. Proc. IEEE, Vol. 107, 8 (2019), 1608--1631.
[35]
Chenhan Xu, Kun Wang, Peng Li, Song Guo, Jiangtao Luo, Baoliu Ye, and Minyi Guo. 2018. Making big data open in edges: A resource-efficient blockchain-based approach. IEEE Transactions on Parallel and Distributed Systems, Vol. 30, 4 (2018), 870--882.
[36]
Maofan Yin, Dahlia Malkhi, Michael K Reiter, Guy Golan Gueta, and Ittai Abraham. 2019. textHotStuff: textBFT consensus with linearity and responsiveness. In 2019 ACM Symposium on Principles of Distributed Computing. 347--356.
[37]
Jiangshan Yu, David Kozhaya, Jeremie Decouchant, and Paulo Esteves-Verissimo. 2019. Repucoin: Your reputation is your power. IEEE Trans. Comput., Vol. 68, 8 (2019), 1225--1237.
[38]
Liang Yuan, Qiang He, Feifei Chen, Jun Zhang, Lianyong Qi, Xiaolong Xu, Yang Xiang, and Yun Yang. 2021 a. CSEdge: Enabling collaborative edge storage for multi-access edge computing based on blockchain. IEEE Transactions on Parallel and Distributed Systems, Vol. 33, 8 (2021), 1873--1887.
[39]
Liang Yuan, Qiang He, Siyu Tan, Bo Li, Jiangshan Yu, Feifei Chen, Hai Jin, and Yun Yang. 2021 b. CoopEdge: A decentralized blockchain-based platform for cooperative edge computing. In 2021 International Conference on World Wide Web. 2245--2257.
[40]
Dongdong Yue, Ruixuan Li, Yan Zhang, Wenlong Tian, and Yongfeng Huang. 2020. Blockchain-based verification framework for data integrity in edge-cloud storage. J. Parallel and Distrib. Comput., Vol. 146 (2020), 1--14.
[41]
Lu Zhao, Bo Li, Wenan Tan, Guangming Cui, Qiang He, Xiaolong Xu, Li D Xu, and Yun Yang. 2022. Joint Coverage-Reliability for Budgeted Edge Application Deployment in Mobile Edge Computing Environment. IEEE Transactions on Parallel and Distributed Systems (2022), 1--1. https://doi.org/10.1109/TPDS.2022.3166163

Cited By

View all
  • (2024)A Comprehensive Survey on Edge Data Integrity Verification: Fundamentals and Future TrendsACM Computing Surveys10.1145/3680277Online publication date: 7-Aug-2024
  • (2024)HSA-EDI: An Efficient One-Round Integrity Verification for Mobile Edge Caching Using Hierarchical Signature AggregationIEEE Transactions on Network and Service Management10.1109/TNSM.2024.338323921:3(3358-3371)Online publication date: Jun-2024
  • (2024)OR-EDI: A Per-Edge One-Round Data Integrity Verification Scheme for Mobile Edge ComputingIEEE Transactions on Network Science and Engineering10.1109/TNSE.2023.333707511:2(2074-2086)Online publication date: Mar-2024
  • Show More Cited By

Index Terms

  1. EdgeWatch: Collaborative Investigation of Data Integrity at the Edge based on Blockchain

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    KDD '22: Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining
    August 2022
    5033 pages
    ISBN:9781450393850
    DOI:10.1145/3534678
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 14 August 2022

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. blockchain
    2. data caching
    3. data integrity
    4. distributed consensus
    5. mobile edge computing

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    KDD '22
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 1,133 of 8,635 submissions, 13%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)135
    • Downloads (Last 6 weeks)6
    Reflects downloads up to 22 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A Comprehensive Survey on Edge Data Integrity Verification: Fundamentals and Future TrendsACM Computing Surveys10.1145/3680277Online publication date: 7-Aug-2024
    • (2024)HSA-EDI: An Efficient One-Round Integrity Verification for Mobile Edge Caching Using Hierarchical Signature AggregationIEEE Transactions on Network and Service Management10.1109/TNSM.2024.338323921:3(3358-3371)Online publication date: Jun-2024
    • (2024)OR-EDI: A Per-Edge One-Round Data Integrity Verification Scheme for Mobile Edge ComputingIEEE Transactions on Network Science and Engineering10.1109/TNSE.2023.333707511:2(2074-2086)Online publication date: Mar-2024
    • (2024)NANO: Cryptographic Enforcement of Readability and Editability Governance in Blockchain DatabasesIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.333017121:4(3439-3452)Online publication date: Jul-2024
    • (2024)A Learning-Based Hierarchical Edge Data Corruption Detection Framework in Edge IntelligenceIEEE Internet of Things Journal10.1109/JIOT.2024.336629211:10(18366-18380)Online publication date: 15-May-2024
    • (2024)Joint Mobile Edge Caching and Pricing: A Mean-Field Game Approach2024 IEEE 40th International Conference on Data Engineering (ICDE)10.1109/ICDE60146.2024.00126(1533-1546)Online publication date: 13-May-2024
    • (2024)Challenges in adopting blockchain technology in supply chain management: a too far fetched idea?International Journal of Quality & Reliability Management10.1108/IJQRM-12-2022-0366Online publication date: 14-May-2024
    • (2024)CIM: CP-ABE-based identity management framework for collaborative edge storagePeer-to-Peer Networking and Applications10.1007/s12083-023-01606-617:2(639-655)Online publication date: 11-Jan-2024
    • (2023)EDI-C: Reputation-Model-Based Collaborative Audit Scheme for Edge Data IntegrityElectronics10.3390/electronics1301007513:1(75)Online publication date: 23-Dec-2023
    • (2023)A Survey on UAV-Enabled Edge Computing: Resource Management PerspectiveACM Computing Surveys10.1145/362656656:3(1-36)Online publication date: 21-Oct-2023
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media