Sciweavers

ICDE
2004
IEEE

Authenticating Query Results in Edge Computing

14 years 5 months ago
Authenticating Query Results in Edge Computing
Edge computing pushes application logic and the underlying data to the edge of the network, with the aim of improving availability and scalability. As the edge servers are not necessarily secure, there must be provisions for validating their outputs. This paper proposes a mechanism that creates a verification object (VO) for checking the integrity of each query result produced by an edge server ? that values in the result tuples are not tampered with, and that no spurious tuples are introduced. The primary advantages of our proposed mechanism are that the VO is independent of the database size, and that relational operations can still be fulfilled by the edge servers. These advantages reduce transmission load and processing at the clients. We also show how insert and delete transactions can be supported.
HweeHwa Pang, Kian-Lee Tan
Added 01 Nov 2009
Updated 01 Nov 2009
Type Conference
Year 2004
Where ICDE
Authors HweeHwa Pang, Kian-Lee Tan
Comments (0)