A comprehensive survey on edge data integrity verification: Fundamentals and future trends
Recent advances in edge computing (EC) have pushed cloud-based data caching services
to edge; however, such emerging edge storage comes with numerous challenging and …
to edge; however, such emerging edge storage comes with numerous challenging and …
Privacy Preserving Multi-party Computation with Secret Sharing for Trajectory Prediction in VANETs
D Liu, G Yu, Y Ding, Z Zhong… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Vehicular ad-hoc networks (VANETs) enable communication among vehicle-to-vehicle
(V2V) and vehicle-to-infrastructure (V2I) with a dedicated short range communications …
(V2V) and vehicle-to-infrastructure (V2I) with a dedicated short range communications …
Analyzing Threats and Attacks in Edge Data Analytics within IoT Environments
Edge data analytics refers to processing near data sources at the edge of the network to
reduce delays in data transmission and, consequently, enable real-time interactions …
reduce delays in data transmission and, consequently, enable real-time interactions …
[HTML][HTML] A fair multi-attribute data transaction mechanism supporting cross-chain
Reliable storage and high-speed data networks enable individuals to access high-quality
Internet of Things (IoT) data for scientific research through global transactions. Blockchain …
Internet of Things (IoT) data for scientific research through global transactions. Blockchain …
Privacy-preserving dynamic auditing for regenerating code-based storage in cloud-fog-assisted IIoT
D Liu, Y Ding, G Yu, Z Zhong, Y Song - Internet of Things, 2024 - Elsevier
A human-centered, sustainable development technological concept from industry 5.0 is
rapidly sparking extensive discussions in the academic and professional communities …
rapidly sparking extensive discussions in the academic and professional communities …
Development of Heuristic Strategy With Hybrid Encryption for Energy Efficient and Secure Data Storage Scheme in Blockchain‐Based Mobile Edge Computing
KM Matrouk, P Rasappan, P Bhutani… - Transactions on …, 2025 - Wiley Online Library
ABSTRACT Internet of Things (IoT) devices is extensively employed to collect physiological
health data and provide diverse services to end‐users. Nevertheless, in recent applications …
health data and provide diverse services to end‐users. Nevertheless, in recent applications …
Merkle multi-branch hash tree-based dynamic data integrity auditing for B5G network cloud storage
H Chen, Z Tao, Z Wang, X Liu - Journal of Information Security and …, 2025 - Elsevier
Abstract In the Beyond 5th Generation (B5G) mobile communication network, data
transmission speed will be higher, and communication time latency will be minimized, it also …
transmission speed will be higher, and communication time latency will be minimized, it also …
Decentralized data integrity inspection offloading in edge computing systems using potential games
Edge storage is becoming an increasingly appealing alternative for data owners (DOs),
offering benefits like decreased latency and minimized bandwidth usage compared to …
offering benefits like decreased latency and minimized bandwidth usage compared to …
[PDF][PDF] Development of an Intelligent Service Delivery System to Increase Efficiency of Software Defined Networks.
S Joldasbayev, S Sapakova, A Zhaksylyk… - … Journal of Advanced …, 2023 - researchgate.net
The burgeoning complexity in network management has garnered considerable attention,
specifically focusing on Software-Defined Networking (SDN), a transformative technology …
specifically focusing on Software-Defined Networking (SDN), a transformative technology …
EDI-C: Reputation-Model-Based Collaborative Audit Scheme for Edge Data Integrity
F Yang, Y Sun, Q Gao, X Chen - Electronics, 2023 - mdpi.com
The emergence of mobile edge computing (MEC) has facilitated the development of data
caching technology, which enables application vendors to cache frequently used data on …
caching technology, which enables application vendors to cache frequently used data on …