2023
DOI: 10.1145/3589774
|View full text |Cite
|
Sign up to set email alerts
|

VeDB: A Software and Hardware Enabled Trusted Relational Database

Abstract: Blockchain-like ledger databases emerge in recent years as a more efficient alternative to permissioned blockchains. Conventional ledger databases mostly rely on authenticated structures such as the Merkle tree and transparency logs for supporting auditability, and hence they suffer from the performance problem. As opposed to conventional ledger DBMSes, we design VeDB - a high-performance verifiable software (Ve-S) and hardware (Ve-H) enabled DBMS with rigorous auditability for better user options and broad ap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 28 publications
0
3
0
Order By: Relevance
“…In [11], the literature provides a comprehensive exploration of VeDB, a trusted relational database system that integrates both software (Ve-S) and hardware (Ve-H) enabled solutions for data notarization and lineage. It discusses the improvement of latency through the use of Intel Converged Security and Management Engine (CSME) and the implementation of a Physical Secure Timer in ARM architecture and Risc-V enclave.…”
Section: A Related Workmentioning
confidence: 99%
“…In [11], the literature provides a comprehensive exploration of VeDB, a trusted relational database system that integrates both software (Ve-S) and hardware (Ve-H) enabled solutions for data notarization and lineage. It discusses the improvement of latency through the use of Intel Converged Security and Management Engine (CSME) and the implementation of a Physical Secure Timer in ARM architecture and Risc-V enclave.…”
Section: A Related Workmentioning
confidence: 99%
“…A threat model is essential for evaluating and enhancing the security of a system or application [23], [24]. Threat modeling involves identifying potential threats, assessing how these threats can impact the system, and developing strategies to mitigate or manage these threats.…”
Section: Threat Modelmentioning
confidence: 99%
“…Allouch et al [22] proposed a lightweight security solution based on blockchain to ensure data security when UAV systems are connected to the Internet. At the same time, LedgerDB [23] and VeDB [24], as the latest ledger databases, provide tamper-evidence and non-repudiation features with high performance. It has strong auditability and wide verification scope, and can flexibly support tamper-proof applications.…”
Section: Related Workmentioning
confidence: 99%