{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T09:02:34Z","timestamp":1775638954652,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,9]],"date-time":"2021-06-09T00:00:00Z","timestamp":1623196800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,9]]},"DOI":"10.1145\/3448016.3457312","type":"proceedings-article","created":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T17:22:30Z","timestamp":1624036950000},"page":"89-101","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["FastVer: Making Data Integrity a Commodity"],"prefix":"10.1145","author":[{"given":"Arvind","family":"Arasu","sequence":"first","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Badrish","family":"Chandramouli","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Johannes","family":"Gehrke","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Esha","family":"Ghosh","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Donald","family":"Kossmann","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Jonathan","family":"Protzenko","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Ravi","family":"Ramamurthy","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Tahina","family":"Ramananandro","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Aseem","family":"Rastogi","sequence":"additional","affiliation":[{"name":"Microsoft Research, Bengaluru, India"}]},{"given":"Srinath","family":"Setty","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Nikhil","family":"Swamy","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Alexander","family":"van Renen","sequence":"additional","affiliation":[{"name":"Technical University of Munich, Munich, Germany"}]},{"given":"Min","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,6,18]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"crossref","unstructured":"Panagiotis Antonopoulos Arvind Arasu Kunal D. Singh etal 2020. Azure SQL Database Always Encrypted. In SIGMOD. 1511--1525.  Panagiotis Antonopoulos Arvind Arasu Kunal D. Singh et al. 2020. Azure SQL Database Always Encrypted. In SIGMOD. 1511--1525.","DOI":"10.1145\/3318464.3386141"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"crossref","unstructured":"Arvind Arasu Ken Eguro Manas Joglekar etal 2015. Transaction processing on confidential data using cipherbase. In ICDE. 435--446.  Arvind Arasu Ken Eguro Manas Joglekar et al. 2015. Transaction processing on confidential data using cipherbase. In ICDE. 435--446.","DOI":"10.1109\/ICDE.2015.7113304"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064030"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.38"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2799647"},{"key":"e_1_3_2_2_6_1","volume-title":"Proceedings of the IEEE Symposium on Foundations of Computer Science (FOCS).","author":"Blum M.","unstructured":"M. Blum , W. Evans , P. Gemmell , S. Kannan , and M. Naor . 1991. Checking the correctness of memories . In Proceedings of the IEEE Symposium on Foundations of Computer Science (FOCS). M. Blum, W. Evans, P. Gemmell, S. Kannan, and M. Naor. 1991. Checking the correctness of memories. In Proceedings of the IEEE Symposium on Foundations of Computer Science (FOCS)."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.14778\/3229863.3236227"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363202"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"crossref","unstructured":"Brian F. Cooper Adam Silberstein Erwin Tam etal 2010. Benchmarking cloud serving systems with YCSB. In SoCC. 143--154.  Brian F. Cooper Adam Silberstein Erwin Tam et al. 2010. Benchmarking cloud serving systems with YCSB. In SoCC. 143--154.","DOI":"10.1145\/1807128.1807152"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_30"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"Rohit Jain and Sunil Prabhakar. 2013. Trustworthy data from untrusted databases. In ICDE. 529--540.  Rohit Jain and Sunil Prabhakar. 2013. Trustworthy data from untrusted databases. In ICDE. 529--540.","DOI":"10.1109\/ICDE.2013.6544853"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1979.1675439"},{"key":"e_1_3_2_2_14_1","unstructured":"B. Laurie and E Kasper. 2013. Revocation transparency. www.links.org\/files\/RevocationTransparency.pdf.  B. Laurie and E Kasper. 2013. Revocation transparency. www.links.org\/files\/RevocationTransparency.pdf."},{"key":"e_1_3_2_2_15_1","unstructured":"Feifei Li Marios Hadjieleftheriou George Kollios etal 2006. Dynamic authenticated index structures for outsourced databases. In SIGMOD. 121--132.  Feifei Li Marios Hadjieleftheriou George Kollios et al. 2006. Dynamic authenticated index structures for outsourced databases. In SIGMOD. 121--132."},{"key":"e_1_3_2_2_16_1","volume-title":"Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI).","author":"Li Jinyuan","year":"2004","unstructured":"Jinyuan Li , Maxwell Krohn , David Mazi\u00e8res , and Dennis Shasha . 2004 . Secure Untrusted Data Repository (SUNDR) . In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI). Jinyuan Li, Maxwell Krohn, David Mazi\u00e8res, and Dennis Shasha. 2004. Secure Untrusted Data Repository (SUNDR). In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI)."},{"key":"e_1_3_2_2_17_1","volume-title":"Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI).","author":"Mahajan Prince","year":"2010","unstructured":"Prince Mahajan , Srinath Setty , Sangmin Lee , Allen Clement , Lorenzo Alvisi , Mike Dahlin , and Michael Walfish . 2010 . Depot: Cloud storage with minimal trust . In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI). Prince Mahajan, Srinath Setty, Sangmin Lee, Allen Clement, Lorenzo Alvisi, Mike Dahlin, and Michael Walfish. 2010. Depot: Cloud storage with minimal trust. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI)."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48184-2_32"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/321479.321481"},{"key":"e_1_3_2_2_20_1","volume-title":"Bowers","author":"Oprea Alina","year":"2009","unstructured":"Alina Oprea and Kevin D . Bowers . 2009 . Authentic Time-Stamps for Archival Storage. In Computer Security -- ESORICS 2009, Michael Backes and Peng Ning (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg, 136--151. Alina Oprea and Kevin D. Bowers. 2009. Authentic Time-Stamps for Archival Storage. In Computer Security -- ESORICS 2009, Michael Backes and Peng Ning (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 136--151."},{"key":"e_1_3_2_2_21_1","volume-title":"Memoir: Practical State Continuity for Protected Modules","author":"Parno Bryan","year":"2011","unstructured":"Bryan Parno , Jacob R. Lorch , John R. Douceur , 2011 . Memoir: Practical State Continuity for Protected Modules . In IEEE S &P. 379--394. Bryan Parno, Jacob R. Lorch, John R. Douceur, et al. 2011. Memoir: Practical State Continuity for Protected Modules. In IEEE S&P. 379--394."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","unstructured":"Guna Prasaad Badrish Chandramouli and Donald Kossmann. 2019. Concurrent Prefix Recovery: Performing CPR on a Database. In SIGMOD. 687--704.  Guna Prasaad Badrish Chandramouli and Donald Kossmann. 2019. Concurrent Prefix Recovery: Performing CPR on a Database. In SIGMOD. 687--704.","DOI":"10.1145\/3299869.3300090"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3421473.3421479"},{"key":"e_1_3_2_2_24_1","unstructured":"Srinath T. V. Setty Sebastian Angel Trinabh Gupta etal 2018. Proving the correct execution of concurrent services in zero-knowledge. In OSDI. 339--356.  Srinath T. V. Setty Sebastian Angel Trinabh Gupta et al. 2018. Proving the correct execution of concurrent services in zero-knowledge. In OSDI. 339--356."},{"key":"e_1_3_2_2_25_1","first-page":"251","article-title":"VeritasDB: High Throughput Key-Value Store with Integrity","volume":"2018","author":"Sinha Rohit","year":"2018","unstructured":"Rohit Sinha and Mihai Christodorescu . 2018 . VeritasDB: High Throughput Key-Value Store with Integrity . IACR Cryptol. ePrint Arch. , Vol. 2018 (2018), 251 . Rohit Sinha and Mihai Christodorescu. 2018. VeritasDB: High Throughput Key-Value Store with Integrity. IACR Cryptol. ePrint Arch., Vol. 2018 (2018), 251.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837655"},{"key":"e_1_3_2_2_27_1","volume-title":"Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In NSDI. 283--298.","author":"Zheng Wenting","year":"2017","unstructured":"Wenting Zheng , Ankur Dave , Jethro G. Beekman , 2017 . Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In NSDI. 283--298. Wenting Zheng, Ankur Dave, Jethro G. Beekman, et al. 2017. Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In NSDI. 283--298."}],"event":{"name":"SIGMOD\/PODS '21: International Conference on Management of Data","location":"Virtual Event China","acronym":"SIGMOD\/PODS '21","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"]},"container-title":["Proceedings of the 2021 International Conference on Management of Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448016.3457312","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3448016.3457312","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:25:04Z","timestamp":1750195504000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448016.3457312"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,9]]},"references-count":27,"alternative-id":["10.1145\/3448016.3457312","10.1145\/3448016"],"URL":"https:\/\/doi.org\/10.1145\/3448016.3457312","relation":{},"subject":[],"published":{"date-parts":[[2021,6,9]]},"assertion":[{"value":"2021-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}