{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:59:33Z","timestamp":1764784773228},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,15]]},"DOI":"10.1109\/bigdata52589.2021.9671388","type":"proceedings-article","created":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T20:39:16Z","timestamp":1642106356000},"page":"5378-5387","source":"Crossref","is-referenced-by-count":5,"title":["Securing Kafka with Encryption-at-Rest"],"prefix":"10.1109","author":[{"given":"Chris","family":"Giblin","sequence":"first","affiliation":[]},{"given":"Sean","family":"Rooney","sequence":"additional","affiliation":[]},{"given":"Pascal","family":"Vetsch","sequence":"additional","affiliation":[]},{"given":"Adrian","family":"Preston","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"KIP-317: Add end-to-end data encryption functionality to Apache Kafka","year":"2020","author":"liebau","key":"ref10"},{"article-title":"Kafka security via data encryption, end to end data security","year":"2017","author":"chalkiopoulos","key":"ref11"},{"article-title":"Transparent end-to-end security for apache kafka &#x2013; part 1","year":"2016","author":"saly","key":"ref12"},{"year":"2021","key":"ref13","article-title":"Transparent Encryption in HDFS"},{"year":"2020","key":"ref14","article-title":"Kafka protocol guide"},{"year":"2020","key":"ref15","article-title":"Sarama: a go-library for Apache Kafka"},{"year":"2001","key":"ref16","article-title":"National Institute of Stanadards and Technology, Federal Information Processing Standards Publication 197, Advanced Encryption Standard (AES)"},{"year":"2020","key":"ref17","article-title":"National Institute of Standards and Technology Post-Quantum Cryptography FAQ"},{"key":"ref18","first-page":"29","article-title":"Applying grover&#x2019;s algorithm to aes: quantum resource estimates","author":"grassl","year":"0"},{"year":"2007","key":"ref19","article-title":"NIST SP 800-38D, Recommendationfor Block Cipher Modes of Operation: Galois\/Counter mode (GCM) and GMAC"},{"year":"2019","key":"ref4","article-title":"Debezium stream changes from your database"},{"article-title":"Change data capture (CDC) methods","year":"2011","author":"bralgin","key":"ref3"},{"year":"2021","key":"ref6","article-title":"FAQ for Confluent Cloud: What specific security features does Confluent Cloud offer&#x0192;"},{"year":"2020","key":"ref5","article-title":"SP 800-53 Rev. 5 Security and Privacy Controls for Information Systems and Organizations"},{"year":"2021","key":"ref8","article-title":"Bring Your Own Keys for Apache Kafka on HDInsight"},{"year":"2021","key":"ref7","article-title":"Amazon Managed Streaming for Apache Kafka: How Do I Get Started with Encryption&#x0192;"},{"year":"2018","key":"ref2","article-title":"How to Run Kafka at Scale"},{"key":"ref1","article-title":"Kafka : a distributed messaging system for log processing","author":"kreps","year":"2011","journal-title":"6th Interna-tional Workshop on Networking Meets Databases (NetDB)"},{"year":"2021","key":"ref9","article-title":"IBM Cloud Event Streams: Managing encryption"},{"year":"2012","key":"ref20","article-title":"SP 800-38F recommendation for block cipher modes of operation: Methods for key wrapping"},{"journal-title":"Proxy-Based Topic-level Encryption at Rest for Kakfka","year":"0","key":"ref22"},{"journal-title":"KIP-82 Add Record Headers","year":"0","author":"pearce","key":"ref21"}],"event":{"name":"2021 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2021,12,15]]},"location":"Orlando, FL, USA","end":{"date-parts":[[2021,12,18]]}},"container-title":["2021 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9671263\/9671273\/09671388.pdf?arnumber=9671388","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:55:36Z","timestamp":1652201736000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9671388\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,15]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/bigdata52589.2021.9671388","relation":{},"subject":[],"published":{"date-parts":[[2021,12,15]]}}}