{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:20:26Z","timestamp":1750220426635,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,14]],"date-time":"2021-06-14T00:00:00Z","timestamp":1623628800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100009708","name":"Novo Nordisk Fonden","doi-asserted-by":"publisher","award":["NNF20OC0064411"],"award-info":[{"award-number":["NNF20OC0064411"]}],"id":[{"id":"10.13039\/501100009708","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,14]]},"DOI":"10.1145\/3456727.3463769","type":"proceedings-article","created":{"date-parts":[[2021,6,6]],"date-time":"2021-06-06T12:34:14Z","timestamp":1622982854000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["The case for adding privacy-related offloading to smart storage"],"prefix":"10.1145","author":[{"given":"Claudiu","family":"Mihali","sequence":"first","affiliation":[{"name":"Aalto University, Finland"}]},{"given":"Anca","family":"Hangan","sequence":"additional","affiliation":[{"name":"UTCN, Romania"}]},{"given":"Gheorghe","family":"Sebestyen","sequence":"additional","affiliation":[{"name":"UTCN, Romania"}]},{"given":"Zsolt","family":"Istv\u00e1n","sequence":"additional","affiliation":[{"name":"IT University, Denmark"}]}],"member":"320","published-online":{"date-parts":[[2021,6,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Advanced query accelerator (aqua) for amazon redshift (accessed 03\/06\/2020). https:\/\/pages.awscloud.com\/AQUA-Preview.html.  Advanced query accelerator (aqua) for amazon redshift (accessed 03\/06\/2020). https:\/\/pages.awscloud.com\/AQUA-Preview.html."},{"key":"e_1_3_2_1_2_1","unstructured":"Samsung smartssd computational storage drive (accessed 03\/06\/2020). https:\/\/samsungsemiconductor-us.com\/smartssd\/index.html.  Samsung smartssd computational storage drive (accessed 03\/06\/2020). https:\/\/samsungsemiconductor-us.com\/smartssd\/index.html."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/291069.291026"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24741-8_12"},{"key":"e_1_3_2_1_5_1","volume-title":"doppiodb 1.0: Machine learning inside a relational engine","author":"Alonso G.","year":"2019","unstructured":"G. Alonso , Z. Istvan , K. Kara , M. Owaida , and D. Sidler . doppiodb 1.0: Machine learning inside a relational engine . IEEE DE Bull , 42(2), 2019 . G. Alonso, Z. Istvan, K. Kara, M. Owaida, and D. Sidler. doppiodb 1.0: Machine learning inside a relational engine. IEEE DE Bull, 42(2), 2019."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29959-0_33"},{"key":"e_1_3_2_1_7_1","volume-title":"Tenth International Workshop on Accelerating Analytics and Data Management Systems Using Modern Processor and Storage Architectures (ADMS'19)","author":"Chapman K.","year":"2019","unstructured":"K. Chapman , M. Nik , B. Robatmili , S. Mirkhani , and M. Lavasani . Computational storage for big data analytics . In Tenth International Workshop on Accelerating Analytics and Data Management Systems Using Modern Processor and Storage Architectures (ADMS'19) , 2019 . K. Chapman, M. Nik, B. Robatmili, S. Mirkhani, and M. Lavasani. Computational storage for big data analytics. In Tenth International Workshop on Accelerating Analytics and Data Management Systems Using Modern Processor and Storage Architectures (ADMS'19), 2019."},{"key":"e_1_3_2_1_8_1","volume-title":"A random rotation perturbation approach to privacy preserving data classification","author":"Chen K.","year":"2005","unstructured":"K. Chen and L. Liu . A random rotation perturbation approach to privacy preserving data classification . 2005 . K. Chen and L. Liu. A random rotation perturbation approach to privacy preserving data classification. 2005."},{"key":"e_1_3_2_1_9_1","volume-title":"Geometric data perturbation for privacy preserving outsourced data mining. Knowledge and information systems, 29(3):657--695","author":"Chen K.","year":"2011","unstructured":"K. Chen and L. Liu . Geometric data perturbation for privacy preserving outsourced data mining. Knowledge and information systems, 29(3):657--695 , 2011 . K. Chen and L. Liu. Geometric data perturbation for privacy preserving outsourced data mining. Knowledge and information systems, 29(3):657--695, 2011."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2903741"},{"key":"e_1_3_2_1_11_1","volume-title":"Advances in Neural Information Processing Systems","author":"Ding B.","year":"2017","unstructured":"B. Ding , J. Kulkarni , and S. Yekhanin . Collecting telemetry data privately . In Advances in Neural Information Processing Systems 30, December 2017 . B. Ding, J. Kulkarni, and S. Yekhanin. Collecting telemetry data privately. In Advances in Neural Information Processing Systems 30, December 2017."},{"volume-title":"SIGMOD'13","author":"Do J.","key":"e_1_3_2_1_12_1","unstructured":"J. Do , Y.-S. Kee , J. M. Patel , Query processing on smart SSDs: opportunities and challenges . In SIGMOD'13 . J. Do, Y.-S. Kee, J. M. Patel, et al. Query processing on smart SSDs: opportunities and challenges. In SIGMOD'13."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.979982"},{"key":"e_1_3_2_1_14_1","volume-title":"Algorithm 235: Random permutation. Communications of the ACM, 7(7):420","author":"Durstenfeld R.","year":"1964","unstructured":"R. Durstenfeld . Algorithm 235: Random permutation. Communications of the ACM, 7(7):420 , 1964 . R. Durstenfeld. Algorithm 235: Random permutation. Communications of the ACM, 7(7):420, 1964."},{"key":"e_1_3_2_1_15_1","first-page":"265","volume-title":"Languages and Programming","author":"Dwork C.","year":"2006","unstructured":"C. Dwork . Differential privacy. Automata , Languages and Programming , pages 265 -- 284 , 2006 . C. Dwork. Differential privacy. Automata, Languages and Programming, pages 265--284, 2006."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_1_18_1","volume-title":"IBM Netezza data warehouse appliances","author":"IBM.","year":"2012","unstructured":"IBM. IBM Netezza data warehouse appliances , 2012 . http:\/\/www.ibm.com\/software\/data\/netezza\/. IBM. IBM Netezza data warehouse appliances, 2012. http:\/\/www.ibm.com\/software\/data\/netezza\/."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2018.00029"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.14778\/3137628.3137632"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.14778\/2994509.2994512"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2749469.2750412"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2003.1250908"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190518"},{"key":"e_1_3_2_1_25_1","volume-title":"11th {USENIX} Workshop on Hot Topics in Storage and File Systems (HotStorage 19)","author":"Kuhring L.","year":"2019","unstructured":"L. Kuhring , E. Garcia , and Z. Istv\u00e1n . Specialize in moderation---building application-aware storage services using fpgas in the datacenter . In 11th {USENIX} Workshop on Hot Topics in Storage and File Systems (HotStorage 19) , 2019 . L. Kuhring, E. Garcia, and Z. Istv\u00e1n. Specialize in moderation---building application-aware storage services using fpgas in the datacenter. In 11th {USENIX} Workshop on Hot Topics in Storage and File Systems (HotStorage 19), 2019."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132756"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"e_1_3_2_1_28_1","first-page":"1463","volume-title":"26th {USENIX} Security Symposium ({USENIX} Security 17)","author":"Mehta A.","year":"2017","unstructured":"A. Mehta , E. Elnikety , K. Harvey , D. Garg , and P. Druschel . Qapla: Policy compliance for database-backed systems . In 26th {USENIX} Security Symposium ({USENIX} Security 17) , pages 1463 -- 1479 , 2017 . A. Mehta, E. Elnikety, K. Harvey, D. Garg, and P. Druschel. Qapla: Policy compliance for database-backed systems. In 26th {USENIX} Security Symposium ({USENIX} Security 17), pages 1463--1479, 2017."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213876"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/2765472.2765479"},{"issue":"1","key":"e_1_3_2_1_31_1","first-page":"37","article-title":"Privacy preserving clustering by data transformation","volume":"1","author":"Oliveira S. R.","year":"2010","unstructured":"S. R. Oliveira and O. R. Zaiane . Privacy preserving clustering by data transformation . Journal of Information and Data Management , 1 ( 1 ): 37 -- 37 , 2010 . S. R. Oliveira and O. R. Zaiane. Privacy preserving clustering by data transformation. Journal of Information and Data Management, 1(1):37--37, 2010.","journal-title":"Journal of Information and Data Management"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151030.1151053"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2017.04.018"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2016.11.009"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3289602.3294007"},{"key":"e_1_3_2_1_36_1","first-page":"615","volume-title":"16th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 19)","author":"Wang F.","year":"2019","unstructured":"F. Wang , R. Ko , and J. Mickens . Riverbed: enforcing user-defined privacy constraints in distributed web services . In 16th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 19) , pages 615 -- 630 , 2019 . F. Wang, R. Ko, and J. Mickens. Riverbed: enforcing user-defined privacy constraints in distributed web services. In 16th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 19), pages 615--630, 2019."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.14778\/3025111.3025113"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1977.1055714"}],"event":{"name":"SYSTOR '21: The 14th ACM International Systems and Storage Conference","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","Technion Israel Institute of Technology","USENIX Assoc USENIX Assoc"],"location":"Haifa Israel","acronym":"SYSTOR '21"},"container-title":["Proceedings of the 14th ACM International Conference on Systems and Storage"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3456727.3463769","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3456727.3463769","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:46:56Z","timestamp":1750193216000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3456727.3463769"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,14]]},"references-count":38,"alternative-id":["10.1145\/3456727.3463769","10.1145\/3456727"],"URL":"https:\/\/doi.org\/10.1145\/3456727.3463769","relation":{},"subject":[],"published":{"date-parts":[[2021,6,14]]},"assertion":[{"value":"2021-06-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}