{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:16:59Z","timestamp":1759331819550,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,14]],"date-time":"2021-06-14T00:00:00Z","timestamp":1623628800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,14]]},"DOI":"10.1145\/3456727.3463773","type":"proceedings-article","created":{"date-parts":[[2021,6,6]],"date-time":"2021-06-06T12:34:14Z","timestamp":1622982854000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["S2Dedup"],"prefix":"10.1145","author":[{"given":"Mariana","family":"Miranda","sequence":"first","affiliation":[{"name":"INESC TEC &amp; U. Minho"}]},{"given":"T\u00e2nia","family":"Esteves","sequence":"additional","affiliation":[{"name":"INESC TEC &amp; U. Minho"}]},{"given":"Bernardo","family":"Portela","sequence":"additional","affiliation":[{"name":"NOVA LINCS &amp; U. Porto"}]},{"given":"Jo\u00e3o","family":"Paulo","sequence":"additional","affiliation":[{"name":"INESC TEC &amp; U. Minho"}]}],"member":"320","published-online":{"date-parts":[[2021,6,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2017. A More Protected Cloud Environment: IBM Announces Cloud Data Guard Featuring Intel SGX. https:\/\/itpeernetwork.intel.com\/ibm-cloud-data-guard-intel-sgx\/#gs.oejhq1.  2017. A More Protected Cloud Environment: IBM Announces Cloud Data Guard Featuring Intel SGX. https:\/\/itpeernetwork.intel.com\/ibm-cloud-data-guard-intel-sgx\/#gs.oejhq1."},{"key":"e_1_3_2_1_2_1","unstructured":"2018. Azure confidential computing. https:\/\/azure.microsoft.com\/en-us\/blog\/azure-confidential-computing.  2018. Azure confidential computing. https:\/\/azure.microsoft.com\/en-us\/blog\/azure-confidential-computing."},{"key":"e_1_3_2_1_3_1","unstructured":"2020. DEDISbench. https:\/\/github.com\/jtpaulo\/dedisbench.  2020. DEDISbench. https:\/\/github.com\/jtpaulo\/dedisbench."},{"key":"e_1_3_2_1_4_1","unstructured":"2020. Libiscsi. https:\/\/github.com\/sahlberg\/libiscsi.git.  2020. Libiscsi. https:\/\/github.com\/sahlberg\/libiscsi.git."},{"key":"e_1_3_2_1_5_1","unstructured":"Accessed: 2019-09-19. Intel Software Guard Extensions (Intel SGX). https:\/\/www.intel.com\/content\/www\/us\/en\/architecture-and-technology\/software-guard-extensions.html.  Accessed: 2019-09-19. Intel Software Guard Extensions (Intel SGX). https:\/\/www.intel.com\/content\/www\/us\/en\/architecture-and-technology\/software-guard-extensions.html."},{"key":"e_1_3_2_1_6_1","unstructured":"Accessed: 2019-11-26. Glib. https:\/\/github.com\/GNOME\/glib.git.  Accessed: 2019-11-26. Glib. https:\/\/github.com\/GNOME\/glib.git."},{"key":"e_1_3_2_1_7_1","unstructured":"Accessed: 2020-03-16. LevelDB. https:\/\/github.com\/google\/leveldb.git.  Accessed: 2020-03-16. LevelDB. https:\/\/github.com\/google\/leveldb.git."},{"key":"e_1_3_2_1_8_1","unstructured":"Accessed: 2020-05-15. Spdk github. https:\/\/github.com\/spdk\/spdk.  Accessed: 2020-05-15. Spdk github. https:\/\/github.com\/spdk\/spdk."},{"key":"e_1_3_2_1_9_1","unstructured":"Accessed: 2020-05-15. Storage performance development kit. https:\/\/spdk.io\/.  Accessed: 2020-05-15. Storage performance development kit. https:\/\/spdk.io\/."},{"key":"e_1_3_2_1_10_1","unstructured":"Accessed: 2020-08-27. FIU IODedup. http:\/\/iotta.snia.org\/traces\/391.  Accessed: 2020-08-27. FIU IODedup. http:\/\/iotta.snia.org\/traces\/391."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.05.123"},{"key":"e_1_3_2_1_12_1","volume-title":"Trustzone: Integrated hardware and software security. White paper","author":"Alves Tiago","year":"2004","unstructured":"Tiago Alves . 2004 . Trustzone: Integrated hardware and software security. White paper (2004). Tiago Alves. 2004. Trustzone: Integrated hardware and software security. White paper (2004)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053019"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70972-7_27"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46447-2_23"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_18"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2470221"},{"key":"e_1_3_2_1_18_1","first-page":"1","article-title":"Intel SGX Explained","volume":"2016","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas . 2016 . Intel SGX Explained . IACR Cryptology ePrint Archive 2016 , 086 (2016), 1 -- 118 . Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptology ePrint Archive 2016, 086 (2016), 1--118.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00110"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2017.18"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48063.2020.00061"},{"key":"e_1_3_2_1_24_1","volume-title":"Securing the storage data path with SGX enclaves. arXiv preprint arXiv:1806.10883","author":"Harnik Danny","year":"2018","unstructured":"Danny Harnik , Eliad Tsfadia , Doron Chen , and Ronen Kat . 2018. Securing the storage data path with SGX enclaves. arXiv preprint arXiv:1806.10883 ( 2018 ). Danny Harnik, Eliad Tsfadia, Doron Chen, and Ronen Kat. 2018. Securing the storage data path with SGX enclaves. arXiv preprint arXiv:1806.10883 (2018)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1842733.1842751"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3231594"},{"volume-title":"Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security 13). 179--194.","author":"Keelveedhi Sriram","key":"e_1_3_2_1_27_1","unstructured":"Sriram Keelveedhi , Mihir Bellare , and Thomas Ristenpart . 2013. Dup-LESS: server-aided encryption for deduplicated storage . In Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security 13). 179--194. Sriram Keelveedhi, Mihir Bellare, and Thomas Ristenpart. 2013. Dup-LESS: server-aided encryption for deduplicated storage. In Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security 13). 179--194."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978386"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2834050.2834100"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837915.1837921"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.28"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387531"},{"key":"e_1_3_2_1_33_1","unstructured":"Takanori Machida Dai Yamamoto Ikuya Morikawa Hirotaka Kokubo and Hisashi Kojima. [n.d.]. Poster: A Novel Framework for User-Key Provisioning to Secure Enclaves on Intel SGX. ([n. d.]).  Takanori Machida Dai Yamamoto Ikuya Morikawa Hirotaka Kokubo and Hisashi Kojima. [n.d.]. Poster: A Novel Framework for User-Key Provisioning to Secure Enclaves on Intel SGX. ([n. d.])."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078861.2078864"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2611778"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2876509"},{"key":"e_1_3_2_1_37_1","volume-title":"OTM Confederated International Conferences\" On the Move to Meaningful Internet Systems\". Springer, 584--601","author":"Paulo Joao","year":"2012","unstructured":"Joao Paulo , Pedro Reis , Jose Pereira , and Antonio Sousa . 2012 . DEDIS-bench: A benchmark for deduplicated storage systems . In OTM Confederated International Conferences\" On the Move to Meaningful Internet Systems\". Springer, 584--601 . Joao Paulo, Pedro Reis, Jose Pereira, and Antonio Sousa. 2012. DEDIS-bench: A benchmark for deduplicated storage systems. In OTM Confederated International Conferences\" On the Move to Meaningful Internet Systems\". Springer, 584--601."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2018.8406888"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2018.2795621"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.10"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3177872"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.53"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3140659.3080208"},{"key":"e_1_3_2_1_44_1","unstructured":"Dag Wieers. [n.d.]. Dstat: Versatile resource statistics tool. http:\/\/dag.wiee.rs\/home-made\/dstat ([n.d.]).  Dag Wieers. [n.d.]. Dstat: Versatile resource statistics tool. http:\/\/dag.wiee.rs\/home-made\/dstat ([n.d.])."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2571298"},{"key":"e_1_3_2_1_46_1","volume-title":"SmartDedup: Optimizing Deduplication for Resource-constrained Devices. In 2019 USENIX Annual Technical Conference (USENIX ATC 19)","author":"Yang Qirui","year":"2019","unstructured":"Qirui Yang , Runyu Jin , and Ming Zhao . 2019 . SmartDedup: Optimizing Deduplication for Resource-constrained Devices. In 2019 USENIX Annual Technical Conference (USENIX ATC 19) . USENIX Association, Renton, WA, 633--646. https:\/\/www.usenix.org\/conference\/atc19\/presentation\/yang-qirui Qirui Yang, Runyu Jin, and Ming Zhao. 2019. SmartDedup: Optimizing Deduplication for Resource-constrained Devices. In 2019 USENIX Annual Technical Conference (USENIX ATC 19). USENIX Association, Renton, WA, 633--646. https:\/\/www.usenix.org\/conference\/atc19\/presentation\/yang-qirui"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2594070"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2830772.2830787"},{"key":"e_1_3_2_1_49_1","volume-title":"Joseph E Gonzalez, and Ion Stoica.","author":"Zheng Wenting","year":"2017","unstructured":"Wenting Zheng , Ankur Dave , Jethro G Beekman , Raluca Ada Popa , Joseph E Gonzalez, and Ion Stoica. 2017 . Opaque : An oblivious and encrypted distributed analytics platform. In 14th {USENIX} Symposium on Networked Systems Design and Implementation ( {NSDI} 17). 283--298. Wenting Zheng, Ankur Dave, Jethro G Beekman, Raluca Ada Popa, Joseph E Gonzalez, and Ion Stoica. 2017. Opaque: An oblivious and encrypted distributed analytics platform. In 14th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 17). 283--298."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1085126.1085127"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2800763"}],"event":{"name":"SYSTOR '21: The 14th ACM International Systems and Storage Conference","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","Technion Israel Institute of Technology","USENIX Assoc USENIX Assoc"],"location":"Haifa Israel","acronym":"SYSTOR '21"},"container-title":["Proceedings of the 14th ACM International Conference on Systems and Storage"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3456727.3463773","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3456727.3463773","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:46:56Z","timestamp":1750193216000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3456727.3463773"}},"subtitle":["SGX-enabled secure deduplication"],"short-title":[],"issued":{"date-parts":[[2021,6,14]]},"references-count":49,"alternative-id":["10.1145\/3456727.3463773","10.1145\/3456727"],"URL":"https:\/\/doi.org\/10.1145\/3456727.3463773","relation":{},"subject":[],"published":{"date-parts":[[2021,6,14]]},"assertion":[{"value":"2021-06-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}