Authenticating Query Results in Edge Computing

  • Authors:
  • HweeHwa Pang;Kian-Lee Tan

  • Affiliations:
  • -;-

  • Venue:
  • ICDE '04 Proceedings of the 20th International Conference on Data Engineering
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Edge computing pushes application logic and the underlyingdata to the edge of the network, with the aim of improvingavailability and scalability. As the edge servers arenot necessarily secure, there must be provisions for validatingtheir outputs. This paper proposes a mechanism thatcreates a verification object (VO) for checking the integrityof each query result produced by an edge server - that valuesin the result tuples are not tampered with, and that nospurious tuples are introduced. The primary advantages ofour proposed mechanism are that the VO is independent ofthe database size, and that relational operations can stillbe fulfilled by the edge servers. These advantages reducetransmission load and processing at the clients. We alsoshow how insert and delete transactions can be supported.