{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T22:00:13Z","timestamp":1769205613107,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T00:00:00Z","timestamp":1656288000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,27]]},"DOI":"10.1145\/3538643.3539748","type":"proceedings-article","created":{"date-parts":[[2022,6,23]],"date-time":"2022-06-23T22:31:06Z","timestamp":1656023466000},"page":"9-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Rethinking block storage encryption with virtual disks"],"prefix":"10.1145","author":[{"given":"Danny","family":"Harnik","sequence":"first","affiliation":[{"name":"IBM Research"}]},{"given":"Effi","family":"Ofer","sequence":"additional","affiliation":[{"name":"IBM Research"}]},{"given":"Oded","family":"Naor","sequence":"additional","affiliation":[{"name":"Technion"}]},{"given":"Or","family":"Ozery","sequence":"additional","affiliation":[{"name":"IBM Research"}]}],"member":"320","published-online":{"date-parts":[[2022,6,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Apple. [n.d.]. https:\/\/support.apple.com\/en-us\/HT204837 Accessed: 2022-03-20.  Apple. [n.d.]. https:\/\/support.apple.com\/en-us\/HT204837 Accessed: 2022-03-20."},{"key":"e_1_3_2_1_2_1","volume-title":"SEC","volume":"529","author":"Bro\u017e Milan","year":"2018","unstructured":"Milan Bro\u017e , Mikul\u00e1s Patocka , and Vashek Maty\u00e1s . [n.d.]. Practical Cryptographic Data Integrity Protection with Full Disk Encryption. In ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference , SEC 2018 , Vol. 529 . 79--93. Milan Bro\u017e, Mikul\u00e1s Patocka, and Vashek Maty\u00e1s. [n.d.]. Practical Cryptographic Data Integrity Protection with Full Disk Encryption. In ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Vol. 529. 79--93."},{"key":"e_1_3_2_1_3_1","unstructured":"Android documentation. [n.d.]. https:\/\/source.android.com\/security\/encryption Accessed: 2022-03-20.  Android documentation. [n.d.]. https:\/\/source.android.com\/security\/encryption Accessed: 2022-03-20."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Morris Dworkin. 2010. Recommendation for Block Cipher Modes of Operation: the XTS-AES Mode for Confidentiality on Storage Devices - NIST SP 800-38E.  Morris Dworkin. 2010. Recommendation for Block Cipher Modes of Operation: the XTS-AES Mode for Confidentiality on Storage Devices - NIST SP 800-38E.","DOI":"10.6028\/NIST.SP.800-38e"},{"key":"e_1_3_2_1_5_1","first-page":"074","article-title":"Message verification and transmission error detection by block chaining","volume":"4","author":"Ehrsam William F","year":"1978","unstructured":"William F Ehrsam , Carl HW Meyer , John L Smith , and Walter L Tuchman . 1978 . Message verification and transmission error detection by block chaining . US Patent 4 , 074 ,066. William F Ehrsam, Carl HW Meyer, John L Smith, and Walter L Tuchman. 1978. Message verification and transmission error detection by block chaining. US Patent 4,074,066.","journal-title":"US Patent"},{"key":"e_1_3_2_1_6_1","unstructured":"Clemens Fruhwirth. 2018. LUKS1 On-Disk Format Specification. https:\/\/gitlab.com\/cryptsetup\/cryptsetup\/-\/wikis\/LUKS-standard\/on-disk-format.pdf  Clemens Fruhwirth. 2018. LUKS1 On-Disk Format Specification. https:\/\/gitlab.com\/cryptsetup\/cryptsetup\/-\/wikis\/LUKS-standard\/on-disk-format.pdf"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"e_1_3_2_1_8_1","volume-title":"Extending EME to Handle Arbitrary-Length Messages with Associated Data (INDOCRYPT'04)","author":"Halevi Shai","unstructured":"Shai Halevi . 2004. EME* : Extending EME to Handle Arbitrary-Length Messages with Associated Data (INDOCRYPT'04) . Springer-Verlag , Berlin, Heidelberg , 315--327. Shai Halevi. 2004. EME*: Extending EME to Handle Arbitrary-Length Messages with Associated Data (INDOCRYPT'04). Springer-Verlag, Berlin, Heidelberg, 315--327."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2021.9457235"},{"key":"e_1_3_2_1_10_1","unstructured":"Linux. [n.d.]. https:\/\/gitlab.com\/cryptsetup\/cryptsetup\/-\/wikis\/ DMCrypt Accessed: 2022-03-20.  Linux. [n.d.]. https:\/\/gitlab.com\/cryptsetup\/cryptsetup\/-\/wikis\/ DMCrypt Accessed: 2022-03-20."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9073-y"},{"key":"e_1_3_2_1_12_1","volume-title":"The Galois\/counter mode of operation (GCM). submission to NIST Modes of Operation Process 20","author":"McGrew David","year":"2004","unstructured":"David McGrew and John Viega . 2004. The Galois\/counter mode of operation (GCM). submission to NIST Modes of Operation Process 20 ( 2004 ), 0278--0070. David McGrew and John Viega. 2004. The Galois\/counter mode of operation (GCM). submission to NIST Modes of Operation Process 20 (2004), 0278--0070."},{"key":"e_1_3_2_1_13_1","volume-title":"Fluhrer","author":"McGrew David A.","year":"2007","unstructured":"David A. McGrew and Scott R . Fluhrer . 2007 . The Security of the Extended Codebook (XCB) Mode of Operation. In Selected Areas in Cryptography . 311--327. David A. McGrew and Scott R. Fluhrer. 2007. The Security of the Extended Codebook (XCB) Mode of Operation. In Selected Areas in Cryptography. 311--327."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30556-9_27"},{"key":"e_1_3_2_1_15_1","unstructured":"Microsoft. [n.d.]. https:\/\/docs.microsoft.com\/en-us\/windows\/security\/information-protection\/bitlocker\/bitlocker-overview Accessed: 2022-03-20.  Microsoft. [n.d.]. https:\/\/docs.microsoft.com\/en-us\/windows\/security\/information-protection\/bitlocker\/bitlocker-overview Accessed: 2022-03-20."},{"key":"e_1_3_2_1_16_1","unstructured":"Bro\u017e Milan. 2018. LUKS2 On-Disk Format Specification. https:\/\/gitlab.com\/cryptsetup\/LUKS2-docs  Bro\u017e Milan. 2018. LUKS2 On-Disk Format Specification. https:\/\/gitlab.com\/cryptsetup\/LUKS2-docs"},{"key":"e_1_3_2_1_17_1","volume-title":"You Don't Want XTS. https:\/\/sockpuppet.org\/blog\/2014\/04\/30\/you-dont-want-xts\/. (Retrieved","author":"Ptacek Thomas H.","year":"2021","unstructured":"Thomas H. Ptacek . 2014. You Don't Want XTS. https:\/\/sockpuppet.org\/blog\/2014\/04\/30\/you-dont-want-xts\/. (Retrieved Feb. 2021 ). Thomas H. Ptacek. 2014. You Don't Want XTS. https:\/\/sockpuppet.org\/blog\/2014\/04\/30\/you-dont-want-xts\/. (Retrieved Feb. 2021)."},{"key":"e_1_3_2_1_18_1","volume-title":"Advances in Cryptology - ASIACRYPT","author":"Rogaway Phillip","year":"2004","unstructured":"Phillip Rogaway . 2004. Efficient Instantiations of Tweakable Block-ciphers and Refinements to Modes OCB and PMAC . In Advances in Cryptology - ASIACRYPT 2004 , Pil Joong Lee (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg, 16--31. Phillip Rogaway. 2004. Efficient Instantiations of Tweakable Block-ciphers and Refinements to Modes OCB and PMAC. In Advances in Cryptology - ASIACRYPT 2004, Pil Joong Lee (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 16--31."},{"key":"e_1_3_2_1_19_1","unstructured":"Ceph website. [n.d.]. https:\/\/docs.ceph.com\/en\/latest\/radosgw\/encryption\/ Accessed: 2022-03-20.  Ceph website. [n.d.]. https:\/\/docs.ceph.com\/en\/latest\/radosgw\/encryption\/ Accessed: 2022-03-20."},{"key":"e_1_3_2_1_20_1","unstructured":"fio website. [n.d.]. https:\/\/fio.readthedocs.io\/ Accessed: 2022-03-15.  fio website. [n.d.]. https:\/\/fio.readthedocs.io\/ Accessed: 2022-03-15."},{"key":"e_1_3_2_1_21_1","unstructured":"RocksDB website. [n.d.]. http:\/\/rocksdb.org\/ Accessed: 2022-03-15.  RocksDB website. [n.d.]. http:\/\/rocksdb.org\/ Accessed: 2022-03-15."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 7th symposium on Operating systems design and implementation. 307--320","author":"Weil Sage A","year":"2006","unstructured":"Sage A Weil , Scott A Brandt , Ethan L Miller , Darrell DE Long , and Carlos Maltzahn . 2006 . Ceph: A scalable, high-performance distributed file system . In Proceedings of the 7th symposium on Operating systems design and implementation. 307--320 . Sage A Weil, Scott A Brandt, Ethan L Miller, Darrell DE Long, and Carlos Maltzahn. 2006. Ceph: A scalable, high-performance distributed file system. In Proceedings of the 7th symposium on Operating systems design and implementation. 307--320."},{"key":"e_1_3_2_1_23_1","unstructured":"NVM Express Workgroup. 2014. NVM Express\u00ae Base Specification revision 1.2. https:\/\/nvmexpress.org\/developers\/nvme-specification\/  NVM Express Workgroup. 2014. NVM Express\u00ae Base Specification revision 1.2. https:\/\/nvmexpress.org\/developers\/nvme-specification\/"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCBDA49378.2020.9095700"}],"event":{"name":"HotStorage '22: 14th ACM Workshop on Hot Topics in Storage and File Systems","location":"Virtual Event","acronym":"HotStorage '22","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 14th ACM Workshop on Hot Topics in Storage and File Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3538643.3539748","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3538643.3539748","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:03:02Z","timestamp":1750186982000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3538643.3539748"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,27]]},"references-count":24,"alternative-id":["10.1145\/3538643.3539748","10.1145\/3538643"],"URL":"https:\/\/doi.org\/10.1145\/3538643.3539748","relation":{},"subject":[],"published":{"date-parts":[[2022,6,27]]},"assertion":[{"value":"2022-06-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}