{"id":"https://openalex.org/W4411336511","doi":"https://doi.org/10.1109/tdsc.2025.3580153","title":"A Fully Decentralized Auditing Approach for Edge Computing: A Game-Theoretic Perspective","display_name":"A Fully Decentralized Auditing Approach for Edge Computing: A Game-Theoretic Perspective","publication_year":2025,"publication_date":"2025-06-16","ids":{"openalex":"https://openalex.org/W4411336511","doi":"https://doi.org/10.1109/tdsc.2025.3580153"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2025.3580153","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3580153","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092781774","display_name":"Zahra Seyedi","orcid":"https://orcid.org/0009-0002-8492-4640"},"institutions":[{"id":"https://openalex.org/I158248296","display_name":"Amirkabir University of Technology","ror":"https://ror.org/04gzbav43","country_code":"IR","type":"education","lineage":["https://openalex.org/I158248296"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Zahra Seyedi","raw_affiliation_strings":["Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran"],"raw_orcid":"https://orcid.org/0009-0002-8492-4640","affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I158248296"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055832370","display_name":"Farhad Rahmati","orcid":"https://orcid.org/0000-0002-4859-6179"},"institutions":[{"id":"https://openalex.org/I158248296","display_name":"Amirkabir University of Technology","ror":"https://ror.org/04gzbav43","country_code":"IR","type":"education","lineage":["https://openalex.org/I158248296"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Farhad Rahmati","raw_affiliation_strings":["Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran"],"raw_orcid":"https://orcid.org/0000-0002-4859-6179","affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I158248296"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051739014","display_name":"Mohammad Ali","orcid":"https://orcid.org/0000-0002-8685-0991"},"institutions":[{"id":"https://openalex.org/I158248296","display_name":"Amirkabir University of Technology","ror":"https://ror.org/04gzbav43","country_code":"IR","type":"education","lineage":["https://openalex.org/I158248296"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Mohammad Ali","raw_affiliation_strings":["Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran"],"raw_orcid":"https://orcid.org/0000-0002-8685-0991","affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I158248296"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058120371","display_name":"Ximeng Liu","orcid":"https://orcid.org/0000-0002-4238-3295"},"institutions":[{"id":"https://openalex.org/I4210145005","display_name":"State Key Laboratory of Vehicle NVH and Safety Technology","ror":"https://ror.org/04e6h1p91","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210145005"]},{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ximeng Liu","raw_affiliation_strings":["State Key Laboratory of Intelligent Vehicle Safety Technology, Chongqing Changan Automobile Co., Ltd., Chongqing, China","Key Laboratory of Information Security of Network Systems, College of Computer and Data Science, Fuzhou University, Fuzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-4238-3295","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Intelligent Vehicle Safety Technology, Chongqing Changan Automobile Co., Ltd., Chongqing, China","institution_ids":["https://openalex.org/I4210145005"]},{"raw_affiliation_string":"Key Laboratory of Information Security of Network Systems, College of Computer and Data Science, Fuzhou University, Fuzhou, China","institution_ids":["https://openalex.org/I80947539"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5092781774"],"corresponding_institution_ids":["https://openalex.org/I158248296"],"apc_list":null,"apc_paid":null,"fwci":1.8773,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.85895828,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"22","issue":"6","first_page":"6121","last_page":"6132"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11182","display_name":"Auction Theory and Applications","score":0.7573000192642212,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11182","display_name":"Auction Theory and Applications","score":0.7573000192642212,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7336216568946838},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.6463621258735657},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.5721579194068909},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.5494225025177002},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5150599479675293},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4734988808631897},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.41159188747406006},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3326012194156647},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.15781289339065552},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.15221908688545227},{"id":"https://openalex.org/keywords/accounting","display_name":"Accounting","score":0.11160805821418762},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1052263081073761},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.09715762734413147}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7336216568946838},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.6463621258735657},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.5721579194068909},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.5494225025177002},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5150599479675293},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4734988808631897},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.41159188747406006},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3326012194156647},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.15781289339065552},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15221908688545227},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.11160805821418762},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1052263081073761},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.09715762734413147},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3580153","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3580153","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W1980461171","https://openalex.org/W2005759443","https://openalex.org/W2013849380","https://openalex.org/W2038704326","https://openalex.org/W2079493184","https://openalex.org/W2080346852","https://openalex.org/W2102881299","https://openalex.org/W2123069643","https://openalex.org/W2416799949","https://openalex.org/W2528685303","https://openalex.org/W2616646314","https://openalex.org/W2954230588","https://openalex.org/W2966082306","https://openalex.org/W2974782163","https://openalex.org/W2974805580","https://openalex.org/W2992315195","https://openalex.org/W3025728856","https://openalex.org/W3035141897","https://openalex.org/W3036470329","https://openalex.org/W3039635909","https://openalex.org/W3041188391","https://openalex.org/W3093528859","https://openalex.org/W3097472721","https://openalex.org/W3111967092","https://openalex.org/W3119451820","https://openalex.org/W3119455763","https://openalex.org/W3132069591","https://openalex.org/W3135497297","https://openalex.org/W3181129449","https://openalex.org/W3199763178","https://openalex.org/W3215536308","https://openalex.org/W4224250248","https://openalex.org/W4225991562","https://openalex.org/W4290878311","https://openalex.org/W4300349690","https://openalex.org/W4308158646","https://openalex.org/W4312922413","https://openalex.org/W4319302799","https://openalex.org/W4379984016","https://openalex.org/W4390012849","https://openalex.org/W4403201773","https://openalex.org/W4405303665","https://openalex.org/W4409653203"],"related_works":["https://openalex.org/W2404937507","https://openalex.org/W3121186197","https://openalex.org/W2373849942","https://openalex.org/W151161666","https://openalex.org/W2030757640","https://openalex.org/W4324372666","https://openalex.org/W4225706866","https://openalex.org/W2914646191","https://openalex.org/W3023564924","https://openalex.org/W2942586735"],"abstract_inverted_index":{"Edge":[0],"storage":[1,6],"presents":[2],"a":[3,42,81,98,121],"viable":[4],"data":[5,26,49],"alternative":[7],"for":[8,64,80,131],"application":[9],"vendors":[10],"(AVs),":[11],"offering":[12],"benefits":[13],"such":[14],"as":[15,74,120],"reduced":[16],"bandwidth":[17],"overhead":[18],"and":[19,51,92,136,153,165],"latency":[20],"compared":[21,156],"to":[22,34,47,109,157],"cloud":[23],"storage.":[24],"However,":[25],"cached":[27],"in":[28,94],"edge":[29,71],"computing":[30],"systems":[31],"is":[32,118,143,154],"susceptible":[33],"intentional":[35],"or":[36],"accidental":[37],"disturbances.":[38],"This":[39,84],"paper":[40],"proposes":[41],"decentralized":[43],"integrity":[44,50,127],"auditing":[45,116],"scheme":[46],"safeguard":[48],"counter":[52],"the":[53,78,146],"traditional":[54],"reliance":[55],"on":[56],"centralized":[57,82],"third-party":[58],"auditors":[59,91],"(TPA),":[60],"which":[61],"are":[62,106,138],"unfit":[63],"distributed":[65],"systems.":[66],"Our":[67,133],"novel":[68],"approach":[69],"employs":[70],"servers":[72],"(ES)":[73],"mutual":[75],"auditors,":[76],"eliminating":[77],"need":[79],"entity.":[83],"decentralization":[85],"minimizes":[86],"potential":[87],"collusion":[88],"with":[89],"malicious":[90],"biases":[93],"audit":[95,110],"outcomes.":[96],"Using":[97],"strategic":[99],"game":[100],"model,":[101,149],"we":[102],"demonstrate":[103],"that":[104],"ESs":[105],"more":[107],"motivated":[108],"each":[111],"other":[112],"than":[113],"TPAs.":[114],"The":[115],"process":[117],"addressed":[119],"Nash":[122],"Equilibrium":[123],"problem,":[124],"assuring":[125],"accurate":[126],"proof":[128],"through":[129],"incentives":[130],"ESs.":[132],"scheme's":[134],"security":[135],"performance":[137],"rigorously":[139],"assessed,":[140],"showing":[141],"it":[142],"secure":[144],"within":[145],"random":[147],"oracle":[148],"offers":[150],"improved":[151],"speed,":[152],"cost-effective":[155],"existing":[158],"methods.":[159],"It":[160],"also":[161],"significantly":[162],"reduces":[163],"computational":[164],"communication":[166],"overhead.":[167]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-14T23:14:49.485078","created_date":"2025-10-10T00:00:00"}
