{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T08:27:45Z","timestamp":1764836865950,"version":"3.46.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T00:00:00Z","timestamp":1756166400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T00:00:00Z","timestamp":1756166400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004489","name":"Mitacs","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004489","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,26]]},"DOI":"10.1109\/pst65910.2025.11268846","type":"proceedings-article","created":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:40:04Z","timestamp":1764787204000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Comparing Client- &amp; Server-Side AEAD Encryption in Software-Defined Storage Systems"],"prefix":"10.1109","author":[{"given":"David","family":"Mohren","sequence":"first","affiliation":[{"name":"University Of New Brunswick,Faculty of Computer Science,Fredericton,Canada"}]},{"given":"Minh","family":"Truong","sequence":"additional","affiliation":[{"name":"University Of New Brunswick,Faculty of Computer Science,Fredericton,Canada"}]},{"given":"Brett","family":"Kelly","sequence":"additional","affiliation":[{"name":"Research &#x0026; Development 45Drives,Sydney,Canada"}]},{"given":"Kenneth B.","family":"Kent","sequence":"additional","affiliation":[{"name":"University Of New Brunswick,Faculty of Computer Science,Fredericton,Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586125"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc8446"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3385896"},{"article-title":"Client-side encryption for blobs","year":"2024","author":"Estabrook","key":"ref4"},{"volume-title":"Amazon S3 Encryption Client","year":"2023","key":"ref5"},{"volume-title":"I want to encrypt data","year":"2024","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/sds64317.2024.10883912"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2019.8637991"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99828-2_6"},{"article-title":"Ceph: A Scalable, High-Performance Distributed File System","volume-title":"th USENIX Symposium on Operating Systems Design and Implementation (OSDI 06)","author":"Weil","key":"ref10"},{"article-title":"Celebrating one exabyte of Ceph storage","year":"2023","author":"Hatuka","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2010.111"},{"article-title":"Dmcrypt: Linux kernel device-mapper crypto target","year":"2018","author":"Broz","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2008.4493450"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-38d"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43414-7_10"},{"key":"ref17","article-title":"The AEGIS Family of Authenticated Encryption Algorithms","author":"Denis","year":"2024","journal-title":"Backup Publisher: Internet Engineering Task Force Num Pages: 61."},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3538643.3539748"},{"volume-title":"Flexible I\/O Tester","year":"2022","author":"Axboe","key":"ref19"}],"event":{"name":"2025 22nd Annual International Conference on Privacy, Security, and Trust (PST)","start":{"date-parts":[[2025,8,26]]},"location":"Fredericton, NB, Canada","end":{"date-parts":[[2025,8,28]]}},"container-title":["2025 22nd Annual International Conference on Privacy, Security, and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11268482\/11268814\/11268846.pdf?arnumber=11268846","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T08:21:00Z","timestamp":1764836460000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11268846\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,26]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/pst65910.2025.11268846","relation":{},"subject":[],"published":{"date-parts":[[2025,8,26]]}}}