{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T11:48:43Z","timestamp":1771588123624,"version":"3.50.1"},"reference-count":46,"publisher":"Association for Computing Machinery (ACM)","issue":"7","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. VLDB Endow."],"published-print":{"date-parts":[[2021,3]]},"abstract":"<jats:p>Most modern data processing pipelines run on top of a distributed storage layer, and securing the whole system, and the storage layer in particular, against accidental or malicious misuse is crucial to ensuring compliance to rules and regulations. Enforcing data protection and privacy rules, however, stands at odds with the requirement to achieve higher and higher access bandwidths and processing rates in large data processing pipelines.<\/jats:p>\n          <jats:p>In this work we describe our proposal for the path forward that reconciles the two goals. We call our approach \"Software-Defined Data Protection\" (SDP). Its premise is simple, yet powerful: decoupling often changing policies from request-level enforcement allows distributed smart storage nodes to implement the latter at line-rate. Existing and future data protection frameworks can be translated to the same hardware interface which allows storage nodes to offload enforcement efficiently both for company-specific rules and regulations, such as GDPR or CCPA.<\/jats:p>\n          <jats:p>While SDP is a promising approach, there are several remaining challenges to making this vision reality. As we explain in the paper, overcoming these will require collaboration across several domains, including security, databases and specialized hardware design.<\/jats:p>","DOI":"10.14778\/3450980.3450986","type":"journal-article","created":{"date-parts":[[2021,4,12]],"date-time":"2021-04-12T16:17:16Z","timestamp":1618244236000},"page":"1167-1174","source":"Crossref","is-referenced-by-count":14,"title":["Software-defined data protection"],"prefix":"10.14778","volume":"14","author":[{"given":"Zsolt","family":"Istv\u00e1n","sequence":"first","affiliation":[{"name":"IT University of Copenhagen"}]},{"given":"Soujanya","family":"Ponnapalli","sequence":"additional","affiliation":[{"name":"University of Texas at Austin"}]},{"given":"Vijay","family":"Chidambaram","sequence":"additional","affiliation":[{"name":"University of Texas at Austin"}]}],"member":"320","published-online":{"date-parts":[[2021,4,12]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Amazon. 2020. AWS announces AQUA for Amazon Redshift (preview). https:\/\/aws.amazon.com\/about-aws\/whats-new\/2020\/12\/aws-announces-aqua-for-amazon-redshift-preview\/.  Amazon. 2020. AWS announces AQUA for Amazon Redshift (preview). https:\/\/aws.amazon.com\/about-aws\/whats-new\/2020\/12\/aws-announces-aqua-for-amazon-redshift-preview\/."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113304"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/3323298.3323315"},{"key":"e_1_2_1_4_1","volume-title":"European Conference on Parallel Processing. Springer, 733--744","author":"Bauer Wolfgang","year":"2018"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267323.3268954"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267569.1267578"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/3195638.3195647"},{"key":"e_1_2_1_8_1","first-page":"100","article-title":"California Consumer Privacy Act. California Civil Code","volume":"1798","author":"CCPA.","year":"2018","journal-title":"Section"},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of 10th International Workshop on Accelerating Analytics and Data Management Systems (ADMS).","author":"Chapman Keith","year":"2019"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3286588"},{"key":"e_1_2_1_11_1","unstructured":"Bob Duncan. 2019. EU General Data Protection Regulation Compliance Challenges for Cloud Users.  Bob Duncan. 2019. EU General Data Protection Regulation Compliance Challenges for Cloud Users."},{"key":"e_1_2_1_12_1","first-page":"1","article-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46","volume":"59","author":"GDPR.","year":"2016","journal-title":"Official Journal of the European Union"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1025123.1025852"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2018.00029"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2016.61"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.14778\/3137628.3137632"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2930611.2930639"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2019.2947124"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.14778\/2994509.2994512"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2898996"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.3390\/sci2020022"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378490"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3123939.3124553"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190518"},{"key":"e_1_2_1_25_1","volume-title":"SchengenDB - A Data Protection Database Proposal. Poly\/DMAH@VLDB","author":"Kraska Tim","year":"2019"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/3357062.3357085"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132756"},{"key":"e_1_2_1_29_1","volume-title":"Continuous Requirements: An Example Using GDPR. In 27th International Requirements Engineering Conference Workshops (REW). 144--149","author":"Li Z. S."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385896"},{"key":"e_1_2_1_31_1","volume-title":"Mitigator: Privacy policy compliance using Intel SGX.","author":"Mazmudar Miti","year":"2019"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179559.1179572"},{"key":"e_1_2_1_33_1","volume-title":"Scalable and Efficient Data Authentication for Decentralized Systems. arXiv preprint arXiv:1909.11590","author":"Ponnapalli Soujanya","year":"2019"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277332.3277342"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2018.5293"},{"key":"e_1_2_1_36_1","unstructured":"Samsung. 2020. Samsung SmartSSD Product Brief. https:\/\/www.nimbix.net\/wp-content\/uploads\/2020\/02\/SmartSSD_ProductBrief_12.pdf.  Samsung. 2020. Samsung SmartSSD Product Brief. https:\/\/www.nimbix.net\/wp-content\/uploads\/2020\/02\/SmartSSD_ProductBrief_12.pdf."},{"key":"e_1_2_1_37_1","volume-title":"Position: Gdpr compliance by construction. In Heterogeneous Data Management, Polystores, and Analytics for Healthcare","author":"Schwarzkopf Malte","year":"2019"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.28"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/3357062.3357068"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.14778\/3384345.3384354"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/3357034.3357036"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522723"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2723721"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2741948.2741958"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/3323234.3323285"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066203"}],"container-title":["Proceedings of the VLDB Endowment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.14778\/3450980.3450986","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T10:15:40Z","timestamp":1672222540000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.14778\/3450980.3450986"}},"subtitle":["low overhead policy compliance at the storage layer is within reach!"],"short-title":[],"issued":{"date-parts":[[2021,3]]},"references-count":46,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["10.14778\/3450980.3450986"],"URL":"https:\/\/doi.org\/10.14778\/3450980.3450986","relation":{},"ISSN":["2150-8097"],"issn-type":[{"value":"2150-8097","type":"print"}],"subject":[],"published":{"date-parts":[[2021,3]]}}}