Skip to main content
Article
Authenticating Query Results in Edge Computing
ICDE 2004: 20th IEEE International Conference on Data Engineering: Proceedings: 30 March-2 April, 2004, Boston
  • Hwee Hwa PANG, Singapore Management University
  • Kian-Lee TAN, National University of Singapore
Publication Type
Conference Proceeding Article
Version
acceptedVersion
Publication Date
3-2004
Abstract

Edge computing pushes application logic and the underlying data to the edge of the network, with the aim of improving availability and scalability. As the edge servers are not necessarily secure, there must be provisions for validating their outputs. This paper proposes a mechanism that creates a verification object (VO) for checking the integrity of each query result produced by an edge server - that values in the result tuples are not tampered with, and that no spurious tuples are introduced. The primary advantages of our proposed mechanism are that the VO is independent of the database size, and that relational operations can still be fulfilled by the edge servers. These advantages reduce transmission load and processing at the clients. We also show how insert and delete transactions can be supported.

Keywords
  • Edge computing,
  • Edge servers,
  • Result authentication,
  • Transmission loads
ISBN
9780769520650
Identifier
10.1109/ICDE.2004.1320027
Publisher
IEEE Computer Society
City or Country
Los Alamitos, CA
Copyright Owner and License
Authors
Creative Commons License
Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International
Additional URL
http://doi.ieeecomputersociety.org/10.1109/ICDE.2004.1320027
Citation Information
Hwee Hwa PANG and Kian-Lee TAN. "Authenticating Query Results in Edge Computing" ICDE 2004: 20th IEEE International Conference on Data Engineering: Proceedings: 30 March-2 April, 2004, Boston (2004) p. 560 - 571
Available at: http://works.bepress.com/hweehwa-pang/13/