Authenticated key-value stores with hardware enclaves

4Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Authenticated data storage on an untrusted platform is an important computing paradigm for cloud applications ranging from data outsourcing, to cryptocurrency and general transparency logs. These modern applications increasingly feature update-intensive workloads, whereas existing authenticated data structures (ADSs) designed with in-place updates are inefficient to handle such workloads. This work addresses the issue and presents a novel authenticated log-structured merge tree (eLSM) based key-value store built on Intel SGX. We present a system design that runs the code of eLSM store inside enclave. To circumvent the limited enclave memory (128 MB with the latest Intel CPUs), we propose to place the memory buffer of the eLSM store outside the enclave and protect the buffer using a new authenticated data structure by digesting individual LSM-tree levels. We design protocols to support data integrity, (range) query completeness, and freshness. Our protocol causes small proofs by including the Merkle proofs at selected levels. We implement eLSM on top of Google LevelDB and Facebook RocksDB with minimal code change and performance interference. We evaluate the performance of eLSM under the YCSB workload benchmark and show a performance advantage of up to 4.5X speedup.

Cite

CITATION STYLE

APA

Li, K., Tang, Y., Zhang, Q., Xu, J., & Chen, J. (2021). Authenticated key-value stores with hardware enclaves. In Middleware 2021 Industry Track - Proceedings of the 2021 International Middleware Conference Industrial Track (pp. 1–8). Association for Computing Machinery, Inc. https://doi.org/10.1145/3491084.3491425

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free