A comprehensive survey on edge data integrity verification: Fundamentals and future trends
Recent advances in edge computing (EC) have pushed cloud-based data caching services
to edge; however, such emerging edge storage comes with numerous challenging and …
to edge; however, such emerging edge storage comes with numerous challenging and …
Flexible data integrity checking with original data recovery in IoT-enabled maritime transportation systems
Internet of things (IoT) has emerged as a promising technology that can be widely used in
various industries to realize real-time information collection, so as to improve production …
various industries to realize real-time information collection, so as to improve production …
A certificateless provable data possession scheme for cloud-based EHRs
Electronic health records (EHRs: digital collections of patient health status and diagnosis)
are generally shared, analyzed and stored on cloud servers. One operational challenge is to …
are generally shared, analyzed and stored on cloud servers. One operational challenge is to …
Lightweight certificateless privacy-preserving integrity verification with conditional anonymity for cloud-assisted medical cyber–physical systems
Cloud-assisted medical cyber–physical systems (MCPSs) leverage the power of cloud
computing for scalable storage and management of outsourced medical data. Based on the …
computing for scalable storage and management of outsourced medical data. Based on the …
Trusted audit with untrusted auditors: A decentralized data integrity Crowdauditing approach based on blockchain
Edge computing emerges as an alternative to cloud computing in the scenarios where the
end devices require lower latency and faster access speeds. Edge nodes are deployed at …
end devices require lower latency and faster access speeds. Edge nodes are deployed at …
Long-term over one-off: Heterogeneity-oriented dynamic verification assignment for edge data integrity
E dge I ntelligence (EI), a burgeoning research area, motivates App vendors to cache data
replicas on geographically distributed edge servers to deliver better services. On the …
replicas on geographically distributed edge servers to deliver better services. On the …
A dual auditing protocol for fine-grained access control in the edge-cloud-based smart home
XX Zhang, R Shi, WP Guo, PB Wang, WY Ke - Computer Networks, 2023 - Elsevier
Devices and edges of the Internet of Things (IoT) are working together to broaden the
sensing capability of the IoT. The protection of personal sensory information privacy in the …
sensing capability of the IoT. The protection of personal sensory information privacy in the …
Blockchain-based data integrity verification scheme in aiot cloud–edge computing environment
With the rapid development of Artificial Intelligence of Things (AIoT) technology and
applications, the cloud–edge computing system provides convenient and low-latency …
applications, the cloud–edge computing system provides convenient and low-latency …
Data Integrity Verification in Mobile Edge Computing With Multi-Vendor and Multi-Server
The emerging M obile E dge C omputing (MEC) paradigm reforms the way of data caching
by motivating App vendors to store latency-sensitive data on distributed edge servers. In …
by motivating App vendors to store latency-sensitive data on distributed edge servers. In …
Privacy-preserving public cloud audit scheme supporting dynamic data for unmanned aerial vehicles
J Liu, XA Wang, Z Liu, H Wang, X Yang - IEEE Access, 2020 - ieeexplore.ieee.org
As one of the most popular applications in recent years, cloud storage has been gradually
integrated into all walks of life. In the field of communication techniques for the unmanned …
integrated into all walks of life. In the field of communication techniques for the unmanned …