{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T10:09:41Z","timestamp":1766138981563,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":28,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819608041"},{"type":"electronic","value":"9789819608058"}],"license":[{"start":{"date-parts":[[2024,12,7]],"date-time":"2024-12-07T00:00:00Z","timestamp":1733529600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,7]],"date-time":"2024-12-07T00:00:00Z","timestamp":1733529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0805-8_19","type":"book-chapter","created":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T22:47:47Z","timestamp":1733525267000},"page":"263-280","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["DynaEDI: Decentralized Integrity Verification for\u00a0Dynamic Edge Data"],"prefix":"10.1007","author":[{"given":"Qiang","family":"He","sequence":"first","affiliation":[]},{"given":"Jiyu","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Feifei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Cong","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Yanhui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yun","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,7]]},"reference":[{"unstructured":"AWS Wavelength for media & entertainment (2021). https:\/\/d1.awsstatic.com\/Wavelength2020\/AWS-Wavelength-for-Media-Entertainment-SolutionBrief-Feb2021-Final.pdf","key":"19_CR1"},{"unstructured":"Amazon EC2 on-demand pricing (2023). https:\/\/aws.amazon.com\/ec2\/pricing\/on-demand\/","key":"19_CR2"},{"doi-asserted-by":"crossref","unstructured":"Ateniese, G., et al.: Provable data possession at untrusted stores. In: ACM Conference on Computer and Communications Security, pp. 598\u2013609 (2007)","key":"19_CR3","DOI":"10.1145\/1315245.1315318"},{"unstructured":"AWS: edge caching on AWS wavelength (2022). https:\/\/aws.amazon.com\/blogs\/media\/metfc-edge-caching-on-aws-wavelength\/","key":"19_CR4"},{"unstructured":"AWS: AWS wavelength features (2024). https:\/\/aws.amazon.com\/wavelength\/features\/","key":"19_CR5"},{"key":"19_CR6","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/978-3-031-48421-6_24","volume-title":"Service-Oriented Computing: 21st International Conference, ICSOC 2023, Rome, Italy, November 28 \u2013 December 1, 2023, Proceedings, Part I","author":"L Baresi","year":"2023","unstructured":"Baresi, L., Quattrocchi, G., Ticongolo, I.G.: Dependency-aware resource allocation for\u00a0serverless functions at\u00a0the\u00a0edge. In: Monti, F., Rinderle-Ma, S., Ruiz Cort\u00e9s, A., Zheng, Z., Mecella, M. (eds.) Service-Oriented Computing: 21st International Conference, ICSOC 2023, Rome, Italy, November 28 \u2013 December 1, 2023, Proceedings, Part I, pp. 347\u2013362. Springer Nature Switzerland, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-48421-6_24"},{"issue":"2","key":"19_CR7","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MMUL.2015.34","volume":"22","author":"X Che","year":"2015","unstructured":"Che, X., Ip, B., Lin, L.: A survey of current YouTube video characteristics. IEEE Multimedia 22(2), 56\u201363 (2015)","journal-title":"IEEE Multimedia"},{"unstructured":"Google: Youtube advertising formats (2024). https:\/\/support.google.com\/youtube\/answer\/2467968","key":"19_CR8"},{"issue":"4","key":"19_CR9","doi-asserted-by":"crossref","first-page":"1813","DOI":"10.1109\/TSC.2020.3022812","volume":"15","author":"W Guo","year":"2022","unstructured":"Guo, W., et al.: Dynamic proof of data possession and replication with tree sharing and batch verification in the cloud. IEEE Trans. Serv. Comput. 15(4), 1813\u20131824 (2022)","journal-title":"IEEE Trans. Serv. Comput."},{"doi-asserted-by":"crossref","unstructured":"He, Q., Dong, Z., Chen, F., Deng, S., Liang, W., Yang, Y.: Pyramid: enabling hierarchical neural networks with edge computing. In: The Web Conference, pp. 1860\u20141870 (2022)","key":"19_CR10","DOI":"10.1145\/3485447.3511990"},{"issue":"11","key":"19_CR11","first-page":"1","volume":"11","author":"YC Hu","year":"2015","unstructured":"Hu, Y.C., Patel, M., Sabella, D., Sprecher, N., Young, V.: Mobile edge computing-a key technology towards 5G. ETSI White Paper 11(11), 1\u201316 (2015)","journal-title":"ETSI White Paper"},{"doi-asserted-by":"crossref","unstructured":"Juels, A., Kaliski\u00a0Jr, B.S.: PORs: proofs of retrievability for large files. In: ACM Conference on Computer and Communications Security, pp. 584\u2013597 (2007)","key":"19_CR12","DOI":"10.1145\/1315245.1315317"},{"key":"19_CR13","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/978-3-030-03596-9_15","volume-title":"Service-Oriented Computing: 16th International Conference, ICSOC 2018, Hangzhou, China, November 12-15, 2018, Proceedings","author":"P Lai","year":"2018","unstructured":"Lai, P., et al.: Optimal edge user allocation in edge computing with variable sized vector bin packing. In: Pahl, C., Vukovic, M., Yin, J., Yu, Q. (eds.) Service-Oriented Computing: 16th International Conference, ICSOC 2018, Hangzhou, China, November 12-15, 2018, Proceedings, pp. 230\u2013245. Springer International Publishing, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03596-9_15"},{"unstructured":"Lamport, L.: Paxos made simple. ACM Sigact News 32(4), 18\u201325 (2001)","key":"19_CR14"},{"key":"19_CR15","doi-asserted-by":"crossref","first-page":"4648","DOI":"10.1109\/TIFS.2021.3111747","volume":"16","author":"B Li","year":"2022","unstructured":"Li, B., et al.: Cooperative assurance of cache data integrity for mobile edge computing. IEEE Trans. Inf. Forensics Secur. 16, 4648\u20134662 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"19_CR16","doi-asserted-by":"crossref","first-page":"1210","DOI":"10.1109\/TPDS.2020.3043755","volume":"32","author":"B Li","year":"2021","unstructured":"Li, B., He, Q., Chen, F., Jin, H., Xiang, Y., Yang, Y.: Auditing cache data integrity in the edge computing environment. IEEE Trans. Parallel Distrib. Syst. 32(5), 1210\u20131223 (2021)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"4","key":"19_CR17","doi-asserted-by":"crossref","first-page":"2691","DOI":"10.1109\/TCC.2021.3059448","volume":"10","author":"B Li","year":"2021","unstructured":"Li, B., He, Q., Chen, F., Jin, H., Xiang, Y., Yang, Y.: Inspecting edge data integrity with aggregate signature in distributed edge computing environment. IEEE Trans. Cloud Comput. 10(4), 2691\u20132703 (2021)","journal-title":"IEEE Trans. Cloud Comput."},{"doi-asserted-by":"crossref","unstructured":"Li, B., He, Q., Yuan, L., Chen, F., Lyu, L., Yang, Y.: EdgeWatch: collaborative investigation of data integrity at the edge based on blockchain. In: 28th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, pp. 3208\u20133218. ACM (2022)","key":"19_CR18","DOI":"10.1145\/3534678.3539104"},{"unstructured":"Ongaro, D., Ousterhout, J.: In search of an understandable consensus algorithm. In: USENIX Annual Technical Conference, pp. 305\u2013319 (2014)","key":"19_CR19"},{"doi-asserted-by":"crossref","unstructured":"Peng, J., et al.: MagNet: cooperative edge caching by automatic content congregating. In: The ACM Web Conference, pp. 3280\u20133288 (2022)","key":"19_CR20","DOI":"10.1145\/3485447.3512146"},{"doi-asserted-by":"crossref","unstructured":"Shi, E., Stefanov, E., Papamanthou, C.: Practical dynamic proofs of retrievability. In: ACM SIGSAC Conference on Computer & Communications Security, pp. 325\u2013336 (2013)","key":"19_CR21","DOI":"10.1145\/2508859.2516669"},{"unstructured":"Szudzik, M.: An elegant pairing function. In: Wolfram Research (ed.) Special NKS 2006 Wolfram Science Conference, pp. 1\u201312 (2006)","key":"19_CR22"},{"issue":"5","key":"19_CR23","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1109\/TPDS.2010.183","volume":"22","author":"Q Wang","year":"2011","unstructured":"Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847\u2013859 (2011)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"19_CR24","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/978-3-030-33702-5_37","volume-title":"Service-Oriented Computing: 17th International Conference, ICSOC 2019, Toulouse, France, October 28\u201331, 2019, Proceedings","author":"X Xia","year":"2019","unstructured":"Xia, X., et al.: Graph-based optimal data caching in edge computing. In: Yangui, S., Bouassida Rodriguez, I., Drira, K., Tari, Z. (eds.) Service-Oriented Computing: 17th International Conference, ICSOC 2019, Toulouse, France, October 28\u201331, 2019, Proceedings, pp. 477\u2013493. Springer International Publishing, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-33702-5_37"},{"issue":"1","key":"19_CR25","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/TPDS.2020.3010521","volume":"32","author":"X Xia","year":"2020","unstructured":"Xia, X., Chen, F., He, Q., Grundy, J.C., Abdelrazek, M., Jin, H.: Cost-effective app data distribution in edge computing. IEEE Trans. Parallel Distrib. Syst. 32(1), 31\u201344 (2020)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"19_CR26","doi-asserted-by":"crossref","first-page":"676","DOI":"10.1109\/TIFS.2016.2631951","volume":"12","author":"Y Zhang","year":"2017","unstructured":"Zhang, Y., Xu, C., Liang, X., Li, H., Mu, Y., Zhang, X.: Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation. IEEE Trans. Inf. Forensics Secur. 12, 676\u2013688 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"19_CR27","doi-asserted-by":"crossref","first-page":"5418","DOI":"10.1109\/TMC.2023.3310532","volume":"23","author":"Y Zhao","year":"2024","unstructured":"Zhao, Y., Qu, Y., Chen, F., Xiang, Y., Gao, L.: Data integrity verification in mobile edge computing with multi-vendor and multi-server. IEEE Trans. Mob. Comput. 23(5), 5418\u20135432 (2024)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"5","key":"19_CR28","doi-asserted-by":"crossref","first-page":"4601","DOI":"10.1109\/TMC.2023.3294180","volume":"23","author":"Y Zhao","year":"2023","unstructured":"Zhao, Y., Qu, Y., Xiang, Y., Shi, C., Chen, F., Gao, L.: Long-term over one-off: heterogeneity-oriented dynamic verification assignment for edge data integrity. IEEE Trans. Mob. Comput. 23(5), 4601\u20134616 (2023)","journal-title":"IEEE Trans. Mob. Comput."}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0805-8_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T16:25:40Z","timestamp":1743265540000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0805-8_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,7]]},"ISBN":["9789819608041","9789819608058"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0805-8_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,7]]},"assertion":[{"value":"7 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICSOC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Service-Oriented Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tunis","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tunisia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icsoc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icsoc2024.redcad.tn\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}