{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T21:06:13Z","timestamp":1763154373102,"version":"3.45.0"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&#x0026;D Program of China","award":["2021YFB3101601"],"award-info":[{"award-number":["2021YFB3101601"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62232002"],"award-info":[{"award-number":["62232002"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Input Output"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1109\/tdsc.2025.3580232","type":"journal-article","created":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T13:44:13Z","timestamp":1750167853000},"page":"6147-6162","source":"Crossref","is-referenced-by-count":0,"title":["EncDB-FR$^{3}$3: An Encrypted Database With Fault Recovery and Rollback Resistance"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-6385-1281","authenticated-orcid":false,"given":"Haitao","family":"Wang","sequence":"first","affiliation":[{"name":"Hangzhou, China and Hangzhou, High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8961-0723","authenticated-orcid":false,"given":"Bingsheng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Hangzhou, China and Hangzhou, High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1969-2591","authenticated-orcid":false,"given":"Kui","family":"Ren","sequence":"additional","affiliation":[{"name":"Hangzhou, China and Hangzhou, High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, Hangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3056101"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3314035"},{"key":"ref3","first-page":"29","article-title":"POLARDB meets computational storage: Efficiently support analytical workloads in cloud-native relational database","volume-title":"Proc. USENIX Conf. File Storage Technol.","author":"Cao"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2903741"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848445"},{"key":"ref7","first-page":"85","article-title":"CryptDB: Protecting confidentiality with encrypted query processing","volume-title":"Proc. ACM Symp. Operating Syst. Princ.","author":"Popa"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14778\/2535573.2488336"},{"key":"ref9","first-page":"587","article-title":"Big data analytics over encrypted datasets with seabed","volume-title":"Proc. USENIX Conf. Operating Syst. Des. Implementation","author":"Papadimitriou"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14778\/3342263.3342641"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616608"},{"article-title":"Intel SGX explained","year":"2016","author":"Costan","key":"ref13"},{"key":"ref14","first-page":"445","article-title":"TrustZone explained: Architectural features and use cases","volume-title":"Proc. IEEE Int. Conf. Collaboration Internet Comput.","author":"Ngabonziza"},{"key":"ref15","first-page":"437","article-title":"HyperEnclave: An open and cross-platform trusted execution environment","volume-title":"Proc. USENIX Annu. Tech. Conf.","author":"Jia"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3318464.3386141"},{"key":"ref17","first-page":"370","article-title":"StealthDB: A scalable encrypted database with full SQL query support","volume-title":"Proc. Privacy Enhancing Technol.","volume":"2019","author":"Vinayagamurthy","year":"2019"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14778\/3476311.3476351"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14778\/3554821.3554826"},{"issue":"6","key":"ref20","first-page":"1019","article-title":"Building enclave-native storage engines for practical encrypted databases","volume-title":"Proc. VLDB Endowment","volume":"14","author":"Sun","year":"2021"},{"key":"ref21","first-page":"264","article-title":"EnclaveDB: A secure database using SGX","volume-title":"Proc. IEEE Symp. Secur. Privacy","author":"Priebe"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303951"},{"key":"ref23","first-page":"173","article-title":"SPEICHER: Securing LSM-based key-value stores using shielded execution","volume-title":"Proc. USENIX Conf. File Storage Technol.","author":"Bailleu"},{"key":"ref24","first-page":"277","article-title":"Concealer: SGX-based secure, volume hiding, and verifiable processing of spatial time-series datasets","volume-title":"Proc. Int. Conf. Extending Database Technol.","author":"Gupta"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3361525.3361533"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14778\/3364324.3364331"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00045"},{"article-title":"Trusted time and monotonic counters with Intel software guard extensions platform services","year":"2019","author":"Cen","key":"ref28"},{"key":"ref29","first-page":"1289","article-title":"ROTE: Rollback protection for trusted execution","volume-title":"Proc. USENIX Conf. Secur. Symp.","author":"Matetic"},{"key":"ref30","doi-asserted-by":"crossref","DOI":"10.1145\/2948618.2954330","article-title":"Intel software guard extensions (Intel SGX) software support for dynamic memory allocation inside an enclave","volume-title":"Proc. Hardware Architectural Support Secur. Privacy","author":"Xing"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064219"},{"key":"ref32","first-page":"645","article-title":"Graphene-SGX: A practical library OS for unmodified applications on SGX","volume-title":"Proc. USENIX Annu. Tech. Conf.","author":"Tsai"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378469"},{"key":"ref34","first-page":"689","article-title":"SCONE: Secure linux containers with Intel SGX","volume-title":"Proc. USENIX Conf. Operating Syst. Des. Implementation","author":"Arnautov"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/356770.356776"},{"volume-title":"Transaction Processing: Concepts and Techniques","year":"1992","author":"Gray","key":"ref37"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/128765.128770"},{"article-title":"Trusted time and monotonic counters with Intel software guard extensions platform services","year":"2019","author":"Cen","key":"ref39"},{"key":"ref40","first-page":"173","article-title":"Practical byzantine fault tolerance","volume-title":"Proc. 3rd USENIX Symp. Operating Syst. Des. Implementation","author":"Castro","year":"2022"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"ref43","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2017.23037","article-title":"SGX-Shield: Enabling address space layout randomization for SGX programs","volume-title":"Proc. Annu. Netw. Distrib. Syst. Secur. Symp.","author":"Seo"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23193"},{"key":"ref45","first-page":"227","article-title":"Varys: Protecting SGX enclaves from practical side-channel attacks","volume-title":"Proc. USENIX Annu. Tech. Conf.","author":"Oleksenko"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78372-3_3"},{"issue":"4","key":"ref47","first-page":"4236","article-title":"ShieldDB: An encrypted document database with padding countermeasures","volume-title":"IEEE Trans. Knowl. Data Eng.","volume":"35","author":"Vo","year":"2023"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623085"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2003.1183547"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142488"},{"key":"ref51","first-page":"277","article-title":"OLTP-bench: An extensible testbed for benchmarking relational databases","volume-title":"Proc. VLDB Endowment","volume":"7","author":"Difallah","year":"2013"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329803"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_33"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813700"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.5220\/0006461202000211"},{"key":"ref56","first-page":"1715","article-title":"The tao of inference in privacy-protected databases","volume-title":"Proc. VLDB Endowment","volume":"11","author":"Bindschaedler","year":"2018"},{"key":"ref57","article-title":"VeritasDB: High throughput key-value store with integrity using SGX","author":"Sinha","year":"2018","journal-title":"IACR Cryptol."}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11242243\/11039209.pdf?arnumber=11039209","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T21:01:15Z","timestamp":1763154075000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11039209\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":55,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3580232","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2025,11]]}}}