{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T12:59:18Z","timestamp":1761569958317,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,20]]},"DOI":"10.1145\/3755881.3755927","type":"proceedings-article","created":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T11:46:17Z","timestamp":1761565577000},"page":"186-197","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["DeFS: A Decentralized and High-Performance File System for Consortium Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-0483-913X","authenticated-orcid":false,"given":"Yitong","family":"Cheng","sequence":"first","affiliation":[{"name":"Shanghai JiaoTong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3991-0343","authenticated-orcid":false,"given":"Shenglong","family":"Zhao","sequence":"additional","affiliation":[{"name":"Shanghai JiaoTong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5904-5115","authenticated-orcid":false,"given":"Yang","family":"Yu","sequence":"additional","affiliation":[{"name":"Shanghai JiaoTong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2211-9120","authenticated-orcid":false,"given":"Zhichao","family":"Hua","sequence":"additional","affiliation":[{"name":"Shanghai JiaoTong University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2025,10,27]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590326"},{"key":"e_1_3_3_1_3_2","first-page":"1303","volume-title":"2018 17th IEEE international conference on trust, security and privacy in computing and communications\/12th IEEE international conference on big data science and engineering (TrustCom\/BigDataSE)","author":"Ali Saqib","year":"2018","unstructured":"Saqib Ali, Guojun Wang, Bebo White, and Roger\u00a0Leslie Cottrell. 2018. A blockchain-based decentralized data storage and access framework for pinger. In 2018 17th IEEE international conference on trust, security and privacy in computing and communications\/12th IEEE international conference on big data science and engineering (TrustCom\/BigDataSE). IEEE, 1303\u20131308."},{"key":"e_1_3_3_1_4_2","unstructured":"Tiago Alves and Don Felton. 2004. TrustZone: Integrated hardware and software security. ARM white paper 3 4 (2004) 18\u201324."},{"key":"e_1_3_3_1_5_2","first-page":"1","volume-title":"2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P)","author":"Amann Bernhard","year":"2010","unstructured":"Bernhard Amann and Thomas Fuhrmann. 2010. Cryptographically Enforced Permissions for Fully Decentralized File Systems. In 2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P). IEEE, 1\u201310."},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/OBD.2016.11"},{"key":"e_1_3_3_1_7_2","unstructured":"Juan Benet. 2014. Ipfs-content addressed versioned p2p file system. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1407.3561 (2014)."},{"key":"e_1_3_3_1_8_2","unstructured":"bitcoin. [n. d.]. Bitcoin is an innovative payment network and a new kind of money. https:\/\/bitcoin.org\/en\/. Referenced Dec 2023."},{"key":"e_1_3_3_1_9_2","unstructured":"Richard\u00a0G Brown. [n. d.]. R3 Corda: A Distributed Ledger Designed for Financial Services. https:\/\/www.finyear.com\/R3-Corda-A-Distributed-Ledger-Designed-for-Financial-Services_a35855.html. Referenced Apr 2023."},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/CloudCom2018.2018.00027","volume-title":"2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)","author":"Burihabwa Dorian","year":"2018","unstructured":"Dorian Burihabwa, Pascal Felber, Hugues Mercier, and Valerio Schiavoni. 2018. SGX-FS: hardening a file system in user-space with Intel SGX. In 2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, 67\u201372."},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","unstructured":"Min Chen Yixue Hao Kai Hwang Lu Wang and Lin Wang. 2017. Disease Prediction by Machine Learning Over Big Data From Healthcare Communities. IEEE Access 5 (2017) 8869\u20138879. 10.1109\/ACCESS.2017.2694446","DOI":"10.1109\/ACCESS.2017.2694446"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Min Chen Shiwen Mao and Yunhao Liu. 2014. Big Data: A Survey. Mob. Netw. Appl. 19 2 (2014) 171\u2013209.","DOI":"10.1007\/s11036-013-0489-0"},{"key":"e_1_3_3_1_13_2","unstructured":"Intel Corporation. [n. d.]. Intel(R) Software Guard Extensions for Linux* OS. https:\/\/github.com\/intel\/linux-sgx. Referenced Apr 2023."},{"key":"e_1_3_3_1_14_2","unstructured":"Victor Costan and Srinivas Devadas. 2016. Intel SGX explained. Cryptology ePrint Archive (2016)."},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"crossref","unstructured":"Frank Dabek M\u00a0Frans Kaashoek David Karger Robert Morris and Ion Stoica. 2001. Wide-area cooperative storage with CFS. ACM SIGOPS Operating Systems Review 35 5 (2001) 202\u2013215.","DOI":"10.1145\/502059.502054"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems: First InternationalWorkshop, IPTPS 2002 Cambridge, MA, USA, March 7\u20138, 2002 Revised Papers 1","author":"Douceur John\u00a0R","year":"2002","unstructured":"John\u00a0R Douceur. 2002. The sybil attack. In Peer-to-Peer Systems: First InternationalWorkshop, IPTPS 2002 Cambridge, MA, USA, March 7\u20138, 2002 Revised Papers 1. Springer, 251\u2013260."},{"key":"e_1_3_3_1_17_2","unstructured":"Peter\u00a0C Earle Max Gulker and Edward\u00a0P Stringham. 2022. Decentralized Marketplaces with Privately Enforced Contracts: A Case Study of OpenBazaar. Journal of Private Enterprise 37 4 (2022)."},{"key":"e_1_3_3_1_18_2","first-page":"275","volume-title":"15th { USENIX} Symposium on Operating Systems Design and Implementation ({ OSDI} 21)","author":"Feng Erhu","year":"2021","unstructured":"Erhu Feng, Xu Lu, Dong Du, Bicheng Yang, Xueqiang Jiang, Yubin Xia, Binyu Zang, and Haibo Chen. 2021. Scalable Memory Protection in the PENGLAI Enclave. In 15th { USENIX} Symposium on Operating Systems Design and Implementation ({ OSDI} 21). 275\u2013294."},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945450"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","unstructured":"D. Gong S. Liu and Xiaochun Lu. 2015. Modelling the Impacts of Resource Sharing on Supply Chain Efficiency. International Journal of Simulation Modelling 14 (12 2015) 744\u2013755. 10.2507\/IJSIMM14(4)CO20","DOI":"10.2507\/IJSIMM14(4)CO20"},{"key":"e_1_3_3_1_21_2","unstructured":"Habu. [n. d.]. State of Data Collaboration Report. https:\/\/app.hubspot.com\/documents\/6897883\/view\/312616125?accessId=b224a4. Referenced Apr 2023."},{"key":"e_1_3_3_1_22_2","first-page":"143","volume-title":"Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation-Volume 2","author":"Haeberlen Andreas","year":"2005","unstructured":"Andreas Haeberlen, Alan Mislove, and Peter Druschel. 2005. Glacier: Highly durable, decentralized storage despite massive correlated failures. In Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation-Volume 2. 143\u2013158."},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"crossref","unstructured":"Zhichao Hua Yang Yu Jinyu Gu Yubin Xia Haibo Chen and Binyu Zang. 2021. TZ-container: Protecting container from untrusted OS with ARM TrustZone. Science China Information Sciences 64 9 (2021) 192101.","DOI":"10.1007\/s11432-019-2707-6"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3409934.3409948"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"crossref","unstructured":"AMD Inc.2013. AMD Memory Encryption white paper. http:\/\/amd-dev.wpengine.netdna-cdn.com\/wordpress\/media\/2013\/12\/AMD_Memory_Encryption_Whitepaper_v7-Public.pdf.","DOI":"10.1016\/S0969-4765(13)70077-8"},{"key":"e_1_3_3_1_26_2","unstructured":"Intel. [n. d.]. Introduction to Intel\u00ae SGX Sealing. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/introduction-to-intel-sgx-sealing.html. Referenced Dec 2023."},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1109\/ICEBE.2017.35","volume-title":"2017 IEEE 14th International Conference on e-business Engineering (ICEBE)","author":"Jemel Mayssa","year":"2017","unstructured":"Mayssa Jemel and Ahmed Serhrouchni. 2017. Decentralized access control mechanism with temporal dimension based on blockchain. In 2017 IEEE 14th International Conference on e-business Engineering (ICEBE). IEEE, 177\u2013182."},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","unstructured":"Ghassan Karame Mario Cagalj and Srdjan Capkun. 2009. Small Coalitions: Lightweight Collaboration for Efficient P2P Downloads. 278\u2013283. 10.1109\/NCA.2009.25","DOI":"10.1109\/NCA.2009.25"},{"key":"e_1_3_3_1_29_2","unstructured":"Karthik Kashyap. [n. d.]. Data Collaboration Between Businesses To Increase in the Future. https:\/\/www.spiceworks.com\/tech\/data-management\/articles\/data-collaboration-between-businesses-will-increase-in-the-future. Referenced Apr 2023."},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"crossref","unstructured":"Paul Kocher Jann Horn Anders Fogh Daniel Genkin Daniel Gruss Werner Haas Mike Hamburg Moritz Lipp Stefan Mangard Thomas Prescher et\u00a0al. 2020. Spectre attacks: Exploiting speculative execution. Commun. ACM 63 7 (2020) 93\u2013101.","DOI":"10.1145\/3399742"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"crossref","unstructured":"John Kubiatowicz David Bindel Yan Chen Steven Czerwinski Patrick Eaton Dennis Geels Ramakrishna Gummadi Sean Rhea Hakim Weatherspoon Westley Weimer et\u00a0al. 2000. Oceanstore: An architecture for global-scale persistent storage. ACM SIGOPS Operating Systems Review 34 5 (2000) 190\u2013201.","DOI":"10.1145\/384264.379239"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3471621.3471840"},{"key":"e_1_3_3_1_33_2","unstructured":"Christopher Lesniewski-Laas and M\u00a0Frans Kaashoek. 2010. Whanau: A sybil-proof distributed hash table. (2010)."},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"crossref","unstructured":"Guoxin Liu Haiying Shen and Lee Ward. 2013. An efficient and trustworthy P2P and social network integrated file sharing system. IEEE transactions on computers 64 1 (2013) 54\u201370.","DOI":"10.1109\/TC.2013.201"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/3-540-45748-8_5","volume-title":"Peer-to-Peer Systems: First InternationalWorkshop, IPTPS 2002 Cambridge, MA, USA, March 7\u20138, 2002 Revised Papers","author":"Maymounkov Petar","year":"2002","unstructured":"Petar Maymounkov and David Mazieres. 2002. Kademlia: A peer-to-peer information system based on the xor metric. In Peer-to-Peer Systems: First InternationalWorkshop, IPTPS 2002 Cambridge, MA, USA, March 7\u20138, 2002 Revised Papers. Springer, 53\u201365."},{"key":"e_1_3_3_1_36_2","unstructured":"European Parliament and Council of\u00a0the European\u00a0Union. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation). https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj. Referenced Apr 2023."},{"key":"e_1_3_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00025"},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-S50200.2020.00043"},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"crossref","unstructured":"Lila Rajabion Abdusalam\u00a0Abdulla Shaltooki Masoud Taghikhah Amirhossein Ghasemi and Arshad Badfar. 2019. Healthcare big data processing mechanisms: The role of cloud computing. International Journal of Information Management 49 (2019) 271\u2013289.","DOI":"10.1016\/j.ijinfomgt.2019.05.017"},{"key":"e_1_3_3_1_40_2","volume-title":"25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018","author":"Roos Stefanie","year":"2018","unstructured":"Stefanie Roos, Pedro Moreno-Sanchez, Aniket Kate, and Ian Goldberg. 2018. Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018. The Internet Society."},{"key":"e_1_3_3_1_41_2","first-page":"1096","volume-title":"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)","author":"Ruj Sushmita","year":"2018","unstructured":"Sushmita Ruj, Mohammad\u00a0Shahriar Rahman, Anirban Basu, and Shinsaku Kiyomoto. 2018. Blockstore: A secure decentralized storage framework on blockchain. In 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA). IEEE, 1096\u20131103."},{"key":"e_1_3_3_1_42_2","doi-asserted-by":"crossref","unstructured":"Sushmita Ruj Milos Stojmenovic and Amiya Nayak. 2013. Decentralized access control with anonymous authentication of data stored in clouds. IEEE transactions on parallel and distributed systems 25 2 (2013) 384\u2013394.","DOI":"10.1109\/TPDS.2013.38"},{"key":"e_1_3_3_1_43_2","unstructured":"Hani Salah Stefanie Roos and Thorsten Strufe. 2014. A Lightweight Approach for Improving the Lookup Performance in Kademlia-type Systems. arxiv:https:\/\/arXiv.org\/abs\/1408.3079\u00a0[cs.NI]"},{"key":"e_1_3_3_1_44_2","doi-asserted-by":"crossref","unstructured":"Sehrish Shafeeq Masoom Alam and Abid Khan. 2019. Privacy aware decentralized access control system. Future Generation Computer Systems 101 (2019) 420\u2013433.","DOI":"10.1016\/j.future.2019.06.025"},{"key":"e_1_3_3_1_45_2","doi-asserted-by":"crossref","unstructured":"Meng Shen Junxian Duan Liehuang Zhu Jie Zhang Xiaojiang Du and Mohsen Guizani. 2020. Blockchain-Based Incentives for Secure and Collaborative Data Sharing in Multiple Clouds. IEEE Journal on Selected Areas in Communications 38 6 (2020) 1229\u20131241.","DOI":"10.1109\/JSAC.2020.2986619"},{"key":"e_1_3_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378469"},{"key":"e_1_3_3_1_47_2","doi-asserted-by":"crossref","first-page":"21\u2013es","DOI":"10.1145\/1133572.1133613","volume-title":"Proceedings of the 11th workshop on ACM SIGOPS European workshop","author":"Singh Atul","year":"2004","unstructured":"Atul Singh, Miguel Castro, Peter Druschel, and Antony Rowstron. 2004. Defending against eclipse attacks on overlay networks. In Proceedings of the 11th workshop on ACM SIGOPS European workshop. 21\u2013es."},{"key":"e_1_3_3_1_48_2","doi-asserted-by":"crossref","unstructured":"Atul Singh Tsuen-Wan Ngan Peter Druschel Dan\u00a0S Wallach et\u00a0al. 2006. Eclipse attacks on overlay networks: Threats and defenses. (2006).","DOI":"10.1109\/INFOCOM.2006.231"},{"key":"e_1_3_3_1_49_2","doi-asserted-by":"crossref","first-page":"1499","DOI":"10.1109\/Cybermatics_2018.2018.00253","volume-title":"2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)","author":"Steichen Mathis","year":"2018","unstructured":"Mathis Steichen, Beltran Fiz, Robert Norvill, Wazen Shbair, and Radu State. 2018. Blockchain-based, decentralized access control for IPFS. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, 1499\u20131506."},{"key":"e_1_3_3_1_50_2","doi-asserted-by":"crossref","unstructured":"Ion Stoica Robert Morris David Karger M\u00a0Frans Kaashoek and Hari Balakrishnan. 2001. Chord: A scalable peer-to-peer lookup service for internet applications. ACM SIGCOMM computer communication review 31 4 (2001) 149\u2013160.","DOI":"10.1145\/964723.383071"},{"key":"e_1_3_3_1_51_2","unstructured":"Bill Tolson. 2019. What is Data Sovereignty and the GDPR: Do You Know Where Your Data is Located? https:\/\/www.archive360.com\/blog\/data-sovereignty-and-the-gdpr-do-you-know-where-your-data-is. Referenced Apr 2023."},{"key":"e_1_3_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544232"},{"key":"e_1_3_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00031"},{"key":"e_1_3_3_1_54_2","first-page":"645","volume-title":"USENIX Annual Technical Conference","author":"Tsai Chia-Che","year":"2017","unstructured":"Chia-Che Tsai, Donald\u00a0E Porter, and Mona Vij. 2017. Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX.. In USENIX Annual Technical Conference. 645\u2013658."},{"key":"e_1_3_3_1_55_2","unstructured":"David Vorick and Luke Champine. 2014. Sia: Simple decentralized storage. Retrieved May 8 (2014) 2018."},{"key":"e_1_3_3_1_56_2","doi-asserted-by":"crossref","unstructured":"Shangping Wang Yinglong Zhang and Yaling Zhang. 2018. A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. Ieee Access 6 (2018) 38437\u201338450.","DOI":"10.1109\/ACCESS.2018.2851611"},{"key":"e_1_3_3_1_57_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134038"},{"key":"e_1_3_3_1_58_2","unstructured":"Shawn Wilkinson Jim Lowry and Tome Boshevski. 2014. Metadisk a blockchain-based decentralized file storage application. Storj Labs Inc. Technical Report hal (2014) 1\u201311."},{"key":"e_1_3_3_1_59_2","first-page":"719","volume-title":"23rd { USENIX} Security Symposium ({ USENIX} Security 14)","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner. 2014. FLUSH+ RELOAD: A high resolution, low noise, L3 cache side-channel attack. In 23rd { USENIX} Security Symposium ({ USENIX} Security 14). 719\u2013732."},{"key":"e_1_3_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2011.6108091"},{"key":"e_1_3_3_1_61_2","doi-asserted-by":"publisher","DOI":"10.1145\/3448016.3457308"}],"event":{"name":"Internetware 2025: the 16th International Conference on Internetware","location":"Trondheim Norway","acronym":"Internetware 2025","sponsor":["SIGSOFT ACM Special Interest Group on Artificial Intelligence"]},"container-title":["Proceedings of the 16th International Conference on Internetware"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3755881.3755927","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T11:48:36Z","timestamp":1761565716000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3755881.3755927"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,20]]},"references-count":60,"alternative-id":["10.1145\/3755881.3755927","10.1145\/3755881"],"URL":"https:\/\/doi.org\/10.1145\/3755881.3755927","relation":{},"subject":[],"published":{"date-parts":[[2025,6,20]]},"assertion":[{"value":"2025-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}