{"id":"https://openalex.org/W4405303665","doi":"https://doi.org/10.1109/tmc.2024.3516583","title":"Decentralized Data Integrity Inspection Offloading in Edge Computing Systems Using Potential Games","display_name":"Decentralized Data Integrity Inspection Offloading in Edge Computing Systems Using Potential Games","publication_year":2024,"publication_date":"2024-12-12","ids":{"openalex":"https://openalex.org/W4405303665","doi":"https://doi.org/10.1109/tmc.2024.3516583"},"language":"en","primary_location":{"id":"doi:10.1109/tmc.2024.3516583","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2024.3516583","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092781774","display_name":"Zahra Seyedi","orcid":"https://orcid.org/0009-0002-8492-4640"},"institutions":[{"id":"https://openalex.org/I158248296","display_name":"Amirkabir University of Technology","ror":"https://ror.org/04gzbav43","country_code":"IR","type":"education","lineage":["https://openalex.org/I158248296"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Zahra Seyedi","raw_affiliation_strings":["Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran"],"raw_orcid":"https://orcid.org/0009-0002-8492-4640","affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I158248296"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055832370","display_name":"Farhad Rahmati","orcid":"https://orcid.org/0000-0002-4859-6179"},"institutions":[{"id":"https://openalex.org/I158248296","display_name":"Amirkabir University of Technology","ror":"https://ror.org/04gzbav43","country_code":"IR","type":"education","lineage":["https://openalex.org/I158248296"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Farhad Rahmati","raw_affiliation_strings":["Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran"],"raw_orcid":"https://orcid.org/0000-0002-4859-6179","affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I158248296"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051739014","display_name":"Mohammad Ali","orcid":"https://orcid.org/0000-0002-8685-0991"},"institutions":[{"id":"https://openalex.org/I158248296","display_name":"Amirkabir University of Technology","ror":"https://ror.org/04gzbav43","country_code":"IR","type":"education","lineage":["https://openalex.org/I158248296"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Mohammad Ali","raw_affiliation_strings":["Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran"],"raw_orcid":"https://orcid.org/0000-0002-8685-0991","affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I158248296"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058120371","display_name":"Ximeng Liu","orcid":"https://orcid.org/0000-0002-4238-3295"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ximeng Liu","raw_affiliation_strings":["Key Laboratory of Information Security of Network Systems, College of Computer and Data Science, Fuzhou University, Fuzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-4238-3295","affiliations":[{"raw_affiliation_string":"Key Laboratory of Information Security of Network Systems, College of Computer and Data Science, Fuzhou University, Fuzhou, China","institution_ids":["https://openalex.org/I80947539"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5092781774"],"corresponding_institution_ids":["https://openalex.org/I158248296"],"apc_list":null,"apc_paid":null,"fwci":1.3456,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.83227722,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":"24","issue":"5","first_page":"3950","last_page":"3961"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.982200026512146,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.982200026512146,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9733999967575073,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9521999955177307,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8451138734817505},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.6308945417404175},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.5918280482292175},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4710136651992798},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4621181786060333},{"id":"https://openalex.org/keywords/mobile-edge-computing","display_name":"Mobile edge computing","score":0.435300350189209},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34943777322769165},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12048831582069397}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8451138734817505},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.6308945417404175},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.5918280482292175},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4710136651992798},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4621181786060333},{"id":"https://openalex.org/C2776061582","wikidata":"https://www.wikidata.org/wiki/Q25325231","display_name":"Mobile edge computing","level":3,"score":0.435300350189209},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34943777322769165},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12048831582069397}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tmc.2024.3516583","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2024.3516583","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W2079493184","https://openalex.org/W2102881299","https://openalex.org/W2108077180","https://openalex.org/W2798386039","https://openalex.org/W2966082306","https://openalex.org/W2972268941","https://openalex.org/W2982516999","https://openalex.org/W3022321359","https://openalex.org/W3039635909","https://openalex.org/W3041188391","https://openalex.org/W3044837503","https://openalex.org/W3049290327","https://openalex.org/W3111967092","https://openalex.org/W3119451820","https://openalex.org/W3119455763","https://openalex.org/W3132069591","https://openalex.org/W3133913697","https://openalex.org/W3181129449","https://openalex.org/W3182719754","https://openalex.org/W3199763178","https://openalex.org/W3201218664","https://openalex.org/W3215536308","https://openalex.org/W4285104895","https://openalex.org/W4286751385","https://openalex.org/W4290878311","https://openalex.org/W4300349690","https://openalex.org/W4308158646","https://openalex.org/W4312922413","https://openalex.org/W4365420232","https://openalex.org/W4386225234","https://openalex.org/W4386923300","https://openalex.org/W4390012849","https://openalex.org/W4390307012","https://openalex.org/W4395471043","https://openalex.org/W4403201773","https://openalex.org/W6637589107","https://openalex.org/W6798863401","https://openalex.org/W6855213881"],"related_works":["https://openalex.org/W4361251304","https://openalex.org/W4324372666","https://openalex.org/W4225706866","https://openalex.org/W3024547383","https://openalex.org/W4210813012","https://openalex.org/W2914646191","https://openalex.org/W3174690704","https://openalex.org/W4221092438","https://openalex.org/W3023564924","https://openalex.org/W2942586735"],"abstract_inverted_index":{"Edge":[0],"storage":[1,25],"is":[2],"becoming":[3],"an":[4],"increasingly":[5],"appealing":[6],"alternative":[7],"for":[8,91,129],"data":[9,29,39,62,78,113],"owners":[10],"(DOs),":[11],"offering":[12],"benefits":[13],"like":[14],"decreased":[15],"latency":[16],"and":[17,54,58,66,99,115,144,154,192],"minimized":[18],"bandwidth":[19],"usage":[20],"compared":[21],"to":[22,36,110,118,148,161],"traditional":[23],"cloud":[24],"solutions.":[26],"Nonetheless,":[27],"stored":[28],"within":[30,164],"edge":[31],"servers":[32],"(ESs)":[33],"remains":[34],"vulnerable":[35],"disruptions.":[37],"Existing":[38],"integrity":[40],"auditing":[41],"schemes":[42],"face":[43],"challenges":[44],"such":[45],"as":[46,84,125],"the":[47,89,122,139,165],"costs":[48],"of":[49,61,141,186],"third-party":[50],"auditors":[51],"(TPA),":[52],"unreliable":[53],"delayed":[55],"audit":[56,103],"results,":[57],"effective":[59],"management":[60],"inspection":[63,79,114],"concerning":[64],"time":[65],"energy":[67],"consumption.":[68],"To":[69],"tackle":[70],"these":[71],"challenges,":[72],"we":[73,137],"introduce":[74],"DIVO,":[75],"a":[76,92,107,126,146,183],"decentralized":[77],"approach.":[80],"DIVO":[81,157,181],"leverages":[82],"ESs":[83],"each":[85],"others\u2019":[86],"auditors,":[87],"removing":[88],"necessity":[90],"centralized":[93],"party,":[94],"thereby":[95],"mitigating":[96],"collision":[97],"risks":[98],"potential":[100],"biases":[101],"in":[102,189],"results.":[104],"We":[105],"propose":[106],"game-theoretic":[108],"technique":[109],"efficiently":[111],"manage":[112],"verification":[116,132],"offloading":[117],"ESs.":[119],"By":[120],"formulating":[121],"decision-making":[123],"issue":[124],"strategic":[127],"game":[128],"optimally":[130],"allocating":[131],"tasks":[133],"among":[134],"multiple":[135],"ESs,":[136],"establish":[138],"presence":[140],"Nash":[142],"equilibrium":[143],"design":[145],"strategy":[147],"attain":[149],"it.":[150],"Through":[151],"comprehensive":[152],"security":[153],"performance":[155],"evaluations,":[156],"has":[158],"been":[159],"shown":[160],"operate":[162],"securely":[163],"random":[166],"oracle":[167],"model":[168],"while":[169],"delivering":[170],"notable":[171],"efficiency":[172],"improvements":[173],"over":[174],"recent":[175,187],"methods.":[176],"Our":[177],"analysis":[178],"highlights":[179],"that":[180],"surpasses":[182],"wide":[184],"range":[185],"approaches":[188],"both":[190],"communication":[191],"computation":[193],"efficiency.":[194]},"counts_by_year":[{"year":2025,"cited_by_count":4}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
