2022
DOI: 10.1155/2022/5016809
|View full text |Cite
|
Sign up to set email alerts
|

An Edge Cloud Data Integrity Protection Scheme Based on Blockchain

Abstract: The publicly accessible feature of edge servers leads to the threat of malicious access to the data stored on the server and a series of security problems such as the leakage of user data privacy and the destruction of integrity. Data custody causes the separation of user ownership and management rights and brings potential security risks of data theft and destruction. Among them, for the integrity of the data uploaded by the terminal, the current protection mechanism mostly verifies the identity of the visito… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 27 publications
(35 reference statements)
0
4
0
Order By: Relevance
“…Proposed an energy-minimized offloading mechanism for fault tolerance in the edge-cloud computing paradigm. 4. Presented security metrics as one of the QoS alongside energy and makespan minimization.…”
Section: Big Data Workflow Executionmentioning
confidence: 99%
See 2 more Smart Citations
“…Proposed an energy-minimized offloading mechanism for fault tolerance in the edge-cloud computing paradigm. 4. Presented security metrics as one of the QoS alongside energy and makespan minimization.…”
Section: Big Data Workflow Executionmentioning
confidence: 99%
“…The provision of protection against unauthorized access to the information stored on the server and several other security concerns, such as data leakage and integrity annihilation, is required in Reference 4. These three components work together to achieve trustworthy verification without a trusted third party.…”
Section: Review Of Literaturementioning
confidence: 99%
See 1 more Smart Citation
“…Springer: An broad database containing scientific writing, such as journals, books, and conference proceedings. This database is distributed by Elsevier [9].…”
Section: Search In Databasesmentioning
confidence: 99%
“…The protocol allows for optimized structure, privacy protection and effective aggregation verification functions. He [5] et al proposed a blockchain-based T-Merkle tree-based integrity verification scheme for large-scale cloud data, which can effectively improve the data storage rate and support binary search within blocks, and proposed a ZSSbased data integrity verification method with short signatures .Duan [6] et al proposed a blockchain-based data integrity verification protocol to achieve trusted verification without relying on third parties .Zhou [7] et al proposed a scalable blockchain data integrity verification scheme. The scheme is based on ZSS short signatures to build scalable homomorphic verification tags and uses smart contracts to complete data integrity verification, which not only avoids the risk of leakage but also resists malicious attacks.…”
Section: Introductionmentioning
confidence: 99%