{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:52Z","timestamp":1750219852894,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T00:00:00Z","timestamp":1685059200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,5,26]]},"DOI":"10.1145\/3603781.3603806","type":"proceedings-article","created":{"date-parts":[[2023,7,27]],"date-time":"2023-07-27T18:02:29Z","timestamp":1690480949000},"page":"145-150","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["QuickStorage: A Write-optimized Efficient Storage System for Trusted Execution Environments"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-4982-0367","authenticated-orcid":false,"given":"Xinyuan","family":"Luo","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, National University of Defense Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6450-8485","authenticated-orcid":false,"given":"Yiming","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Xiamen University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,7,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Intel Software Guard Extensions (Intel SGX). https:\/\/www.intel.com.au\/content\/www\/au\/en\/architecture-and-technology\/software-guard-extensions.html. Accessed: 2023-02-21.  Intel Software Guard Extensions (Intel SGX). https:\/\/www.intel.com.au\/content\/www\/au\/en\/architecture-and-technology\/software-guard-extensions.html. Accessed: 2023-02-21."},{"key":"e_1_3_2_1_2_1","unstructured":"AMD Secure Encrypted Virtualization (SEV). https:\/\/developer.amd.com\/sev\/. Accessed: 2023-02-21.  AMD Secure Encrypted Virtualization (SEV). https:\/\/developer.amd.com\/sev\/. Accessed: 2023-02-21."},{"key":"e_1_3_2_1_3_1","unstructured":"ARM TrustZone. https:\/\/www.arm.com\/technologies\/trustzone-for-cortex-a. Accessed: 2023-02-21.  ARM TrustZone. https:\/\/www.arm.com\/technologies\/trustzone-for-cortex-a. Accessed: 2023-02-21."},{"key":"e_1_3_2_1_4_1","first-page":"310","volume-title":"Wendel Voigt. Confidential Computing for OpenPOWER. In Proceedings of the Sixteenth European Conference on Computer Systems, EuroSys \u201921","author":"Hunt Guerney D. H.","year":"2021","unstructured":"Guerney D. H. Hunt , Ramachandra Pai , Michael V. Le , Hani Jamjoom , Sukadev Bhattiprolu , Rick Boivie , Laurent Dufour , Brad Frey , Mohit Kapur , Kenneth A. Goldman , Ryan Grimm , Janani Janakirman , John M. Ludden , Paul Mackerras , Cathy May , Elaine R. Palmer , Bharata Bhasker Rao , Lawrence Roy , William A. Starke , Jeff Stuecheli , Enriquillo Valdez , and Wendel Voigt. Confidential Computing for OpenPOWER. In Proceedings of the Sixteenth European Conference on Computer Systems, EuroSys \u201921 , page 294\u2013 310 , New York, NY, USA , 2021 . Association for Computing Machinery. Guerney D. H. Hunt, Ramachandra Pai, Michael V.Le, Hani Jamjoom, Sukadev Bhattiprolu, Rick Boivie, Laurent Dufour, Brad Frey, Mohit Kapur, Kenneth A. Goldman, Ryan Grimm, Janani Janakirman, John M.Ludden, Paul Mackerras, Cathy May, Elaine R. Palmer, Bharata Bhasker Rao, Lawrence Roy, William A. Starke, Jeff Stuecheli, Enriquillo Valdez, and Wendel Voigt. Confidential Computing for OpenPOWER. In Proceedings of the Sixteenth European Conference on Computer Systems, EuroSys \u201921, page 294\u2013310, New York, NY, USA, 2021. Association for Computing Machinery."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"key":"e_1_3_2_1_6_1","unstructured":"Intel Protected File System. https:\/\/github.com\/intel\/linux-sgx\/tree\/master\/sdk\/protected_fs. Accessed: 2023-02-21.  Intel Protected File System. https:\/\/github.com\/intel\/linux-sgx\/tree\/master\/sdk\/protected_fs. Accessed: 2023-02-21."},{"key":"e_1_3_2_1_7_1","volume-title":"CRYPTO","author":"C.","year":"1988","unstructured":"Merkle, R. C. ( 1988 ), A Digital Signature Based on a Conventional Encryption Function. In: Pomerance, C. (eds) Advances in Cryptology \u2014 CRYPTO \u201987 . CRYPTO 1987. Lecture Notes in Computer Science, vol 293. Springer, Berlin, Heidelberg. Merkle, R.C. (1988), A Digital Signature Based on a Conventional Encryption Function. In: Pomerance, C. (eds) Advances in Cryptology \u2014 CRYPTO \u201987. CRYPTO 1987. Lecture Notes in Computer Science, vol 293. Springer, Berlin, Heidelberg."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s002360050048"},{"key":"e_1_3_2_1_9_1","first-page":"15","volume-title":"Proceedings of the Thirteenth ACM Symposium on Operating System Principles, SOSP 1991, Asilomar Conference Center","author":"Rosenblum Mendel","year":"1991","unstructured":"Mendel Rosenblum and John K. Ousterhout . The design and implementation of a log-structured file system. In Henry M. Levy, editor , Proceedings of the Thirteenth ACM Symposium on Operating System Principles, SOSP 1991, Asilomar Conference Center , Pacific Grove, California, USA , October 13-16, 1991 , pages 1\u2013 15 . ACM, 1991. Mendel Rosenblum and John K. Ousterhout. The design and implementation of a log-structured file system. In Henry M. Levy, editor, Proceedings of the Thirteenth ACM Symposium on Operating System Principles, SOSP 1991, Asilomar Conference Center, Pacific Grove, California, USA, October 13-16, 1991, pages 1\u201315. ACM, 1991."},{"key":"e_1_3_2_1_10_1","first-page":"286","volume-title":"Proceedings of the 13th USENIX Conference on File and Storage Technologies, FAST 2015","author":"Lee Changman","year":"2015","unstructured":"Changman Lee , Dongho Sim , Joo Young Hwang , and Sangyeun Cho . F2FS : A new file system for flash storage. In Jiri Schindler and Erez Zadok, editors , Proceedings of the 13th USENIX Conference on File and Storage Technologies, FAST 2015 , Santa Clara, CA, USA , February 16-19, 2015 , pages 273\u2013 286 . USENIX Association,2015. Changman Lee, Dongho Sim, Joo Young Hwang, and Sangyeun Cho. F2FS: A new file system for flash storage. In Jiri Schindler and Erez Zadok, editors, Proceedings of the 13th USENIX Conference on File and Storage Technologies, FAST 2015, Santa Clara, CA, USA, February 16-19, 2015, pages 273\u2013286. USENIX Association,2015."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3365839"},{"key":"e_1_3_2_1_12_1","volume-title":"C (Oct","author":"Xu Fangliang","year":"2018","unstructured":"Fangliang Xu , Yijie Wang , and Xingkong Ma. 2018. Incremental encoding for erasure-coded cross-datacenters cloud storage. Future Gener. Comput. Syst. 87 , C (Oct 2018 ), 527\u2013537. Fangliang Xu, Yijie Wang, and Xingkong Ma. 2018. Incremental encoding for erasure-coded cross-datacenters cloud storage. Future Gener. Comput. Syst. 87, C (Oct 2018), 527\u2013537."},{"key":"e_1_3_2_1_13_1","unstructured":"RocksDB. https:\/\/github.com\/facebook\/rocksdb. Accessed: 2023-02-21.  RocksDB. https:\/\/github.com\/facebook\/rocksdb. Accessed: 2023-02-21."},{"key":"e_1_3_2_1_14_1","unstructured":"Redis. https:\/\/github.com\/redis\/redis. Accessed: 2023-02-21.  Redis. https:\/\/github.com\/redis\/redis. Accessed: 2023-02-21."},{"key":"e_1_3_2_1_15_1","unstructured":"Tair. https:\/\/github.com\/alibaba\/tair. Accessed: 2023-02-24.  Tair. https:\/\/github.com\/alibaba\/tair. Accessed: 2023-02-24."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/170035.170081"}],"event":{"name":"CNIOT'23: 2023 4th International Conference on Computing, Networks and Internet of Things","acronym":"CNIOT'23","location":"Xiamen China"},"container-title":["Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603781.3603806","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603781.3603806","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:09Z","timestamp":1750178829000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603781.3603806"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,26]]},"references-count":16,"alternative-id":["10.1145\/3603781.3603806","10.1145\/3603781"],"URL":"https:\/\/doi.org\/10.1145\/3603781.3603806","relation":{},"subject":[],"published":{"date-parts":[[2023,5,26]]},"assertion":[{"value":"2023-07-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}