
A Comprehensive Survey on Edge Data Integrity Verification:
Fundamentals and Future Trends
YAO ZHAO, School of Information Technology, Deakin University, Australia
YOUYANG QU, 1. Key Laboratory of Computing Power Network and Information Security, Ministry of
Education, Shandong Computer Science Center, Qilu University of Technology (Shandong Academy of Sciences),
2. Shandong Provincial Key Laboratory of Computer Networks, Shandong Fundamental Research Center for
Computer Science, China
YONG XIANG, School of Information Technology, Deakin University, Australia
MD PALASH UDDIN, School of Information Technology, Deakin University, Australia
DEZHONG PENG, College of Computer Science, Sichuan University, China
LONGXIANG GAO
∗
,1. Key Laboratory of Computing Power Network and Information Security, Ministry of
Education, Shandong Computer Science Center, Qilu University of Technology (Shandong Academy of Sciences),
2. Shandong Provincial Key Laboratory of Computer Networks, Shandong Fundamental Research Center for
Computer Science, China
Recent advances in edge computing (EC) have pushed cloud-based data caching services to edge, however, such emerging
edge storage comes with numerous challenging and unique security issues. One of them is the problem of edge data integrity
verication (EDIV) which coordinates multiple participants (e.g., data owners and edge nodes) to inspect whether data cached
on edge is authentic. To date, various solutions have been proposed to address the EDIV problem, while there is no systematic
review. Thus, we oer a comprehensive survey for the rst time, aiming to show current research status, open problems, and
potentially promising insights for readers to further investigate this under-explored eld. Specically, we begin by stating the
signicance of the EDIV problem, the integrity verication dierence between data cached on cloud and edge, and three
typical system models with corresponding inspection processes. To thoroughly assess prior research eorts, we synthesize a
universal criteria framework that an eective verication approach should satisfy. On top of it, a schematic development
timeline is developed to reveal the research advance on EDIV in a sequential manner, followed by a detailed review of the
existing EDIV solutions. Finally, we highlight intriguing research challenges and possible directions for future work, along
with a discussion on how forthcoming technology, e.g., machine learning and context-aware security, can augment security
in EC. Given our ndings, some major observations are: there is a noticeable trend to equip EDIV solutions with various
∗Longxiang Gao and Youyang Qu are the co-corresponding authors.
Authors’ addresses: Yao Zhao, School of Information Technology, Deakin University, Australia; Youyang Qu, 1. Key Laboratory of Computing
Power Network and Information Security, Ministry of Education, Shandong Computer Science Center, Qilu University of Technology
(Shandong Academy of Sciences), 2. Shandong Provincial Key Laboratory of Computer Networks, Shandong Fundamental Research Center
for Computer Science, China; Yong Xiang, School of Information Technology, Deakin University, Australia; Md Palash Uddin, School of
Information Technology, Deakin University, Australia; Dezhong Peng, College of Computer Science, Sichuan University, China; Longxiang
Gao, 1. Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center,
Qilu University of Technology (Shandong Academy of Sciences), 2. Shandong Provincial Key Laboratory of Computer Networks, Shandong
Fundamental Research Center for Computer Science, China.
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that
copies are not made or distributed for prot or commercial advantage and that copies bear this notice and the full citation on the rst
page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy
otherwise, or republish, to post on servers or to redistribute to lists, requires prior specic permission and/or a fee. Request permissions from
permissions@acm.org.
©2024 Association for Computing Machinery.
XXXX-XXXX/2024/8-ART $15.00
https://doi.org/10.1145/nnnnnnn.nnnnnnn
, Vol. 1, No. 1, Article . Publication date: August 2024.
arXiv:2210.10978v2 [cs.CR] 7 Aug 2024