{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T22:30:42Z","timestamp":1763591442710},"reference-count":62,"publisher":"Association for Computing Machinery (ACM)","issue":"10","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. VLDB Endow."],"published-print":{"date-parts":[[2018,6]]},"abstract":"<jats:p>Existing data storage systems offer a wide range of functionalities to accommodate an equally diverse range of applications. However, new classes of applications have emerged, e.g., blockchain and collaborative analytics, featuring data versioning, fork semantics, tamper-evidence or any combination thereof. They present new opportunities for storage systems to efficiently support such applications by embedding the above requirements into the storage.<\/jats:p>\n          <jats:p>\n            In this paper, we present\n            <jats:italic>ForkBase<\/jats:italic>\n            , a storage engine designed for blockchain and forkable applications. By integrating core application properties into the storage,\n            <jats:italic>ForkBase<\/jats:italic>\n            not only delivers high performance but also reduces development effort. The storage manages multiversion data and supports two variants of fork semantics which enable different fork worklflows.\n            <jats:italic>ForkBase<\/jats:italic>\n            is fast and space efficient, due to a novel index class that supports efficient queries as well as effective detection of duplicate content across data objects, branches and versions. We demonstrate\n            <jats:italic>ForkBase<\/jats:italic>\n            's performance using three applications: a blockchain platform, a wiki engine and a collaborative analytics application. We conduct extensive experimental evaluation against respective state-of-the-art solutions. The results show that\n            <jats:italic>ForkBase<\/jats:italic>\n            achieves superior performance while significantly lowering the development effort.\n          <\/jats:p>","DOI":"10.14778\/3231751.3231762","type":"journal-article","created":{"date-parts":[[2018,7,27]],"date-time":"2018-07-27T12:21:07Z","timestamp":1532694067000},"page":"1137-1150","source":"Crossref","is-referenced-by-count":83,"title":["Forkbase"],"prefix":"10.14778","volume":"11","author":[{"given":"Sheng","family":"Wang","sequence":"first","affiliation":[{"name":"National University of Singapore"}]},{"given":"Tien Tuan Anh","family":"Dinh","sequence":"additional","affiliation":[{"name":"National University of Singapore"}]},{"given":"Qian","family":"Lin","sequence":"additional","affiliation":[{"name":"National University of Singapore"}]},{"given":"Zhongle","family":"Xie","sequence":"additional","affiliation":[{"name":"National University of Singapore"}]},{"given":"Meihui","family":"Zhang","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology"}]},{"given":"Qingchao","family":"Cai","sequence":"additional","affiliation":[{"name":"National University of Singapore"}]},{"given":"Gang","family":"Chen","sequence":"additional","affiliation":[{"name":"Zhejiang University"}]},{"given":"Beng Chin","family":"Ooi","sequence":"additional","affiliation":[{"name":"National University of Singapore"}]},{"given":"Pingcheng","family":"Ruan","sequence":"additional","affiliation":[{"name":"National University of Singapore"}]}],"member":"320","published-online":{"date-parts":[[2018,6]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Chainalysis - blockchain analysis. https:\/\/www.chainalysis.com.  Chainalysis - blockchain analysis. https:\/\/www.chainalysis.com."},{"key":"e_1_2_1_2_1","unstructured":"Ethereum. https:\/\/www.ethereum.org.  Ethereum. https:\/\/www.ethereum.org."},{"key":"e_1_2_1_3_1","unstructured":"Github. https:\/\/github.com.  Github. https:\/\/github.com."},{"key":"e_1_2_1_4_1","unstructured":"Googledocs. https:\/\/www.docs.google.com.  Googledocs. https:\/\/www.docs.google.com."},{"key":"e_1_2_1_5_1","unstructured":"Hyperledger. https:\/\/www.hyperledger.org.  Hyperledger. https:\/\/www.hyperledger.org."},{"key":"e_1_2_1_6_1","unstructured":"LevelDB. https:\/\/github.com\/google\/leveldb.  LevelDB. https:\/\/github.com\/google\/leveldb."},{"key":"e_1_2_1_7_1","unstructured":"MongoDB. http:\/\/mongodb.com.  MongoDB. http:\/\/mongodb.com."},{"key":"e_1_2_1_8_1","unstructured":"Redis. http:\/\/redis.io.  Redis. http:\/\/redis.io."},{"key":"e_1_2_1_9_1","unstructured":"RocksDB. http:\/\/rocksdb.org.  RocksDB. http:\/\/rocksdb.org."},{"key":"e_1_2_1_10_1","unstructured":"The Morning Paper review on ForkBase. https:\/\/blog.acolyer.org\/2018\/06\/01\/forkbase-an-efficient-storage-engine-for-blockchain-and-forkable-applications.  The Morning Paper review on ForkBase. https:\/\/blog.acolyer.org\/2018\/06\/01\/forkbase-an-efficient-storage-engine-for-blockchain-and-forkable-applications."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/16856.16864"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064030"},{"key":"e_1_2_1_13_1","volume-title":"CIDR","author":"Bhardwaj A.","year":"2015","unstructured":"A. Bhardwaj , S. Bhattacherjee , A. Chavan , A. Deshpande , A. J. Elmore , S. Madden , and A. Parameswaran . Datahub: Collaborative data science & dataset version mangement at scale . In CIDR , 2015 . A. Bhardwaj, S. Bhattacherjee, A. Chavan, A. Deshpande, A. J. Elmore, S. Madden, and A. Parameswaran. Datahub: Collaborative data science & dataset version mangement at scale. In CIDR, 2015."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.14778\/2824032.2824035"},{"key":"e_1_2_1_15_1","first-page":"49","volume-title":"USENIX ATC","author":"Bronson N.","year":"2013","unstructured":"N. Bronson , Z. Amsden , G. Cabrera , P. Chakka , P. Dimov , H. Ding , J. Ferris , A. Giardullo , S. Kullkarni , H. Li , M. Marchukov , D. Petrov , L. Puzar , Y. J. Song , and V. Venkataramani . Tao: Facebook's distributed data store for the social graph . In USENIX ATC , pages 49 -- 60 , 2013 . N. Bronson, Z. Amsden, G. Cabrera, P. Chakka, P. Dimov, H. Ding, J. Ferris, A. Giardullo, S. Kullkarni, H. Li, M. Marchukov, D. Petrov, L. Puzar, Y. J. Song, and V. Venkataramani. Tao: Facebook's distributed data store for the social graph. In USENIX ATC, pages 49--60, 2013."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1365815.1365816"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064056"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/256163.256168"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/356770.356776"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.14778\/1454159.1454167"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882951"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294281"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064033"},{"key":"e_1_2_1_24_1","volume-title":"UStore: A distributed storage with rich semantics. CoRR, abs\/1702.02799","author":"Dinh T. T. A.","year":"2017","unstructured":"T. T. A. Dinh , J. Wang , S. Wang , G. Chen , W.-N. Chin , Q. Lin , B. C. Ooi , P. Ruan , K.-L. Tan , Z. Xie , and M. Zhang . UStore: A distributed storage with rich semantics. CoRR, abs\/1702.02799 , 2017 . T. T. A. Dinh, J. Wang, S. Wang, G. Chen, W.-N. Chin, Q. Lin, B. C. Ooi, P. Ruan, K.-L. Tan, Z. Xie, and M. Zhang. UStore: A distributed storage with rich semantics. CoRR, abs\/1702.02799, 2017."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2781227"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398827"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(89)90034-2"},{"key":"e_1_2_1_28_1","first-page":"139","volume-title":"Annual International Cryptology Conference","author":"Dwork C.","year":"1992","unstructured":"C. Dwork and M. Naor . Pricing via processing or combatting junk mail . In Annual International Cryptology Conference , pages 139 -- 147 , 1992 . C. Dwork and M. Naor. Pricing via processing or combatting junk mail. In Annual International Cryptology Conference, pages 139--147, 1992."},{"key":"e_1_2_1_30_1","first-page":"63","volume-title":"USENIX Summer","author":"Guy R. G.","year":"1990","unstructured":"R. G. Guy , J. S. Heidemann , W.-K. Mak , T. W. Page Jr , G. J. Popek , D. Rothmeier , Implementation of the Ficus replicated file system . In USENIX Summer , pages 63 -- 72 , 1990 . R. G. Guy, J. S. Heidemann, W.-K. Mak, T. W. Page Jr, G. J. Popek, D. Rothmeier, et al. Implementation of the Ficus replicated file system. In USENIX Summer, pages 63--72, 1990."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.14778\/3115404.3115417"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2013.6544853"},{"key":"e_1_2_1_33_1","volume-title":"The BT-tree: A branched and temporal access method","author":"Jiang L.","year":"2000","unstructured":"L. Jiang , B. Salzberg , D. Lomet , and M. Barrena . The BT-tree: A branched and temporal access method . 2000 . L. Jiang, B. Salzberg, D. Lomet, and M. Barrena. The BT-tree: A branched and temporal access method. 2000."},{"key":"e_1_2_1_34_1","first-page":"29","volume-title":"FAST","author":"Kallahalla M.","year":"2003","unstructured":"M. Kallahalla , E. Riedely , R. Swaminathan , Q. Wangz , and K. Fux . Plutus: Scalable secure file sharing on untrusted storage . In FAST , pages 29 -- 42 , 2003 . M. Kallahalla, E. Riedely, R. Swaminathan, Q. Wangz, and K. Fux. Plutus: Scalable secure file sharing on untrusted storage. In FAST, pages 29--42, 2003."},{"key":"e_1_2_1_35_1","volume-title":"BlockSci: Design and applications of a blockchain analysis platform. CoRR, abs\/1709.02489","author":"Kalodner H.","year":"2017","unstructured":"H. Kalodner , S. Goldfeder , A. Chator , M. M\u00f6ser , and A. Narayanan . BlockSci: Design and applications of a blockchain analysis platform. CoRR, abs\/1709.02489 , 2017 . H. Kalodner, S. Goldfeder, A. Chator, M. M\u00f6ser, and A. Narayanan. BlockSci: Design and applications of a blockchain analysis platform. CoRR, abs\/1709.02489, 2017."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/2700550"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2011.5767867"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1773912.1773922"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/115790.115861"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142488"},{"key":"e_1_2_1_41_1","volume-title":"OSDI","author":"Li J.","year":"2004","unstructured":"J. Li , M. Krohn , D. Mazieres , and D. Shasha . Secure untrusted data repository . In OSDI , 2004 . J. Li, M. Krohn, D. Mazieres, and D. Shasha. Secure untrusted data repository. In OSDI, 2004."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043593"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.14778\/2947618.2947619"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/646752.704751"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/502059.502052"},{"key":"e_1_2_1_46_1","doi-asserted-by":"crossref","unstructured":"E. W. Myers. An O(ND) difference algorithm and its variations. Algorithmica 1(1--4):251--266 1986.  E. W. Myers. An O(ND) difference algorithm and its variations. Algorithmica 1(1--4):251--266 1986.","DOI":"10.1007\/BF01840446"},{"key":"e_1_2_1_47_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf","author":"Nakamoto S.","year":"2009","unstructured":"S. Nakamoto . Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf , 2009 . S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf, 2009."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2742787"},{"key":"e_1_2_1_49_1","volume-title":"Cambridge University Press","author":"Okasaki C.","year":"1999","unstructured":"C. Okasaki . Purely functional data structures . Cambridge University Press , 1999 . C. Okasaki. Purely functional data structures. Cambridge University Press, 1999."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/s002360050048"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066204"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2611778"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1326542.1326544"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/319806.319816"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.5555\/822076.822447"},{"key":"e_1_2_1_56_1","volume-title":"Oliver Wyman and JP Morgan","author":"Shah S.","year":"2016","unstructured":"S. Shah , A. Dockx , A. Baldet , F. Bi , C. Allchin , S. Misra , M. Huebner , B. Sherpherd , and B. Holroyd . Unlocking economic advantage with blockchain: a guide for asset managers . Oliver Wyman and JP Morgan , 2016 . S. Shah, A. Dockx, A. Baldet, F. Bi, C. Allchin, S. Misra, M. Huebner, B. Sherpherd, and B. Holroyd. Unlocking economic advantage with blockchain: a guide for asset managers. Oliver Wyman and JP Morgan, 2016."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_32"},{"key":"e_1_2_1_58_1","volume-title":"FAST","author":"Soules C. A. N.","year":"2003","unstructured":"C. A. N. Soules , G. R. Goodson , J. D. Strunk , and G. R. Ganger . Metadata efficiency in versioning file systems . In FAST , 2003 . C. A. N. Soules, G. R. Goodson, J. D. Strunk, and G. R. Ganger. Metadata efficiency in versioning file systems. In FAST, 2003."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/16894.16888"},{"key":"e_1_2_1_60_1","volume-title":"OSDI","author":"Strunk J. D.","year":"2000","unstructured":"J. D. Strunk , G. R. Goodson , M. L. Scheinholtz , C. A. N. Soules , and G. R. Ganger . Self-securing storage: Protecting data in compromised system . In OSDI , 2000 . J. D. Strunk, G. R. Goodson, M. L. Scheinholtz, C. A. N. Soules, and G. R. Ganger. Self-securing storage: Protecting data in compromised system. In OSDI, 2000."},{"key":"e_1_2_1_61_1","volume-title":"Temporal databases: Theory, design, and implementation","author":"Tansel A. U.","year":"1993","unstructured":"A. U. Tansel , J. Clifford , S. Gadia , S. Jajodia , A. Segev , and R. Snodgrass . Temporal databases: Theory, design, and implementation . Benjamin-Cummings Publishing Co., Inc. , 1993 . A. U. Tansel, J. Clifford, S. Gadia, S. Jajodia, A. Segev, and R. Snodgrass. Temporal databases: Theory, design, and implementation. Benjamin-Cummings Publishing Co., Inc., 1993."},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2571298"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3035938"}],"container-title":["Proceedings of the VLDB Endowment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.14778\/3231751.3231762","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T10:41:45Z","timestamp":1672224105000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.14778\/3231751.3231762"}},"subtitle":["an efficient storage engine for blockchain and forkable applications"],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":62,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["10.14778\/3231751.3231762"],"URL":"https:\/\/doi.org\/10.14778\/3231751.3231762","relation":{},"ISSN":["2150-8097"],"issn-type":[{"value":"2150-8097","type":"print"}],"subject":[],"published":{"date-parts":[[2018,6]]}}}