A comprehensive survey on edge data integrity verification: Fundamentals and future trends

Y Zhao, Y Qu, Y **ang, MP Uddin, D Peng… - ACM Computing …, 2024 - dl.acm.org
Recent advances in edge computing (EC) have pushed cloud-based data caching services
to edge; however, such emerging edge storage comes with numerous challenging and …

Privacy Preserving Multi-party Computation with Secret Sharing for Trajectory Prediction in VANETs

D Liu, G Yu, Y Ding, Z Zhong… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Vehicular ad-hoc networks (VANETs) enable communication among vehicle-to-vehicle
(V2V) and vehicle-to-infrastructure (V2I) with a dedicated short range communications …

Analyzing Threats and Attacks in Edge Data Analytics within IoT Environments

P Mahadevappa, R Al-amri, G Alkawsi, AA Alkahtani… - IoT, 2024 - mdpi.com
Edge data analytics refers to processing near data sources at the edge of the network to
reduce delays in data transmission and, consequently, enable real-time interactions …

[HTML][HTML] A fair multi-attribute data transaction mechanism supporting cross-chain

K Fan, C Zhou, N Lu, W Shi, V Chang - Internet of Things, 2024 - Elsevier
Reliable storage and high-speed data networks enable individuals to access high-quality
Internet of Things (IoT) data for scientific research through global transactions. Blockchain …

Privacy-preserving dynamic auditing for regenerating code-based storage in cloud-fog-assisted IIoT

D Liu, Y Ding, G Yu, Z Zhong, Y Song - Internet of Things, 2024 - Elsevier
A human-centered, sustainable development technological concept from industry 5.0 is
rapidly sparking extensive discussions in the academic and professional communities …

Development of Heuristic Strategy With Hybrid Encryption for Energy Efficient and Secure Data Storage Scheme in Blockchain‐Based Mobile Edge Computing

KM Matrouk, P Rasappan, P Bhutani… - Transactions on …, 2025 - Wiley Online Library
ABSTRACT Internet of Things (IoT) devices is extensively employed to collect physiological
health data and provide diverse services to end‐users. Nevertheless, in recent applications …

Merkle multi-branch hash tree-based dynamic data integrity auditing for B5G network cloud storage

H Chen, Z Tao, Z Wang, X Liu - Journal of Information Security and …, 2025 - Elsevier
Abstract In the Beyond 5th Generation (B5G) mobile communication network, data
transmission speed will be higher, and communication time latency will be minimized, it also …

Decentralized data integrity inspection offloading in edge computing systems using potential games

Z Seyedi, F Rahmati, M Ali, X Liu - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Edge storage is becoming an increasingly appealing alternative for data owners (DOs),
offering benefits like decreased latency and minimized bandwidth usage compared to …

[PDF][PDF] Development of an Intelligent Service Delivery System to Increase Efficiency of Software Defined Networks.

S Joldasbayev, S Sapakova, A Zhaksylyk… - … Journal of Advanced …, 2023 - researchgate.net
The burgeoning complexity in network management has garnered considerable attention,
specifically focusing on Software-Defined Networking (SDN), a transformative technology …

EDI-C: Reputation-Model-Based Collaborative Audit Scheme for Edge Data Integrity

F Yang, Y Sun, Q Gao, X Chen - Electronics, 2023 - mdpi.com
The emergence of mobile edge computing (MEC) has facilitated the development of data
caching technology, which enables application vendors to cache frequently used data on …