{"id":"https://openalex.org/W4205685321","doi":"https://doi.org/10.1109/bigdata52589.2021.9671388","title":"Securing Kafka with Encryption-at-Rest","display_name":"Securing Kafka with Encryption-at-Rest","publication_year":2021,"publication_date":"2021-12-15","ids":{"openalex":"https://openalex.org/W4205685321","doi":"https://doi.org/10.1109/bigdata52589.2021.9671388"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata52589.2021.9671388","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata52589.2021.9671388","pdf_url":null,"source":{"id":"https://openalex.org/S4363607718","display_name":"2021 IEEE International Conference on Big Data (Big Data)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053063022","display_name":"Chris Giblin","orcid":"https://orcid.org/0000-0003-1871-3693"},"institutions":[{"id":"https://openalex.org/I4210126328","display_name":"IBM Research - Zurich","ror":"https://ror.org/02js37d36","country_code":"CH","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210126328"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"Chris Giblin","raw_affiliation_strings":["IBM Research \u2013 Zurich"],"affiliations":[{"raw_affiliation_string":"IBM Research \u2013 Zurich","institution_ids":["https://openalex.org/I4210126328"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038726171","display_name":"Se\u00e1n Rooney","orcid":"https://orcid.org/0009-0003-9861-5918"},"institutions":[{"id":"https://openalex.org/I4210126328","display_name":"IBM Research - Zurich","ror":"https://ror.org/02js37d36","country_code":"CH","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210126328"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Sean Rooney","raw_affiliation_strings":["IBM Research \u2013 Zurich"],"affiliations":[{"raw_affiliation_string":"IBM Research \u2013 Zurich","institution_ids":["https://openalex.org/I4210126328"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077744289","display_name":"Pascal Vetsch","orcid":null},"institutions":[{"id":"https://openalex.org/I4210126328","display_name":"IBM Research - Zurich","ror":"https://ror.org/02js37d36","country_code":"CH","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210126328"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Pascal Vetsch","raw_affiliation_strings":["IBM Research \u2013 Zurich"],"affiliations":[{"raw_affiliation_string":"IBM Research \u2013 Zurich","institution_ids":["https://openalex.org/I4210126328"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110554554","display_name":"Adrian Preston","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Adrian Preston","raw_affiliation_strings":["IBM Cloud"],"affiliations":[{"raw_affiliation_string":"IBM Cloud","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5053063022"],"corresponding_institution_ids":["https://openalex.org/I4210126328"],"apc_list":null,"apc_paid":null,"fwci":1.4181,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.82896474,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"5378","last_page":"5387"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8747202157974243},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6830850839614868},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.5779786109924316},{"id":"https://openalex.org/keywords/rest","display_name":"Rest (music)","score":0.5520043969154358},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5374394655227661},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.5315808057785034},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4858236312866211},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.47512155771255493},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.4564642012119293},{"id":"https://openalex.org/keywords/56-bit-encryption","display_name":"56-bit encryption","score":0.4215439260005951},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.419264554977417},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.41343551874160767},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12110283970832825}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8747202157974243},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6830850839614868},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.5779786109924316},{"id":"https://openalex.org/C77265313","wikidata":"https://www.wikidata.org/wiki/Q879844","display_name":"Rest (music)","level":2,"score":0.5520043969154358},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5374394655227661},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.5315808057785034},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4858236312866211},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.47512155771255493},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.4564642012119293},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.4215439260005951},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.419264554977417},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.41343551874160767},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12110283970832825},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C164705383","wikidata":"https://www.wikidata.org/wiki/Q10379","display_name":"Cardiology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bigdata52589.2021.9671388","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata52589.2021.9671388","pdf_url":null,"source":{"id":"https://openalex.org/S4363607718","display_name":"2021 IEEE International Conference on Big Data (Big Data)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2361619969","https://openalex.org/W1025240641","https://openalex.org/W4309584611","https://openalex.org/W3118757263","https://openalex.org/W4379801595","https://openalex.org/W2370942914","https://openalex.org/W4308784203","https://openalex.org/W2380438667","https://openalex.org/W4360994575","https://openalex.org/W4242647006"],"abstract_inverted_index":{"Over":[0],"the":[1,49,91,102,112],"last":[2],"decade":[3],"Kafka":[4,15,45,87,106],"has":[5],"become":[6],"a":[7,20,27,105],"key":[8,118,120],"component":[9],"of":[10,22,29,80,104],"Big":[11],"Data":[12],"processing":[13],"pipelines.":[14],"is":[16,67,70],"increasingly":[17],"used":[18],"as":[19,26,55,61],"store":[21],"data,":[23],"not":[24,71],"just":[25],"means":[28,43],"transferring":[30],"it":[31],"from":[32],"one":[33],"location":[34],"to":[35,48,83],"another.":[36],"For":[37],"cloud":[38],"providers":[39],"and":[40,52,88,122],"enterprises":[41],"this":[42],"that":[44],"must":[46],"conform":[47],"same":[50],"security":[51],"compliance":[53],"requirements":[54],"conventional":[56],"data":[57,123],"storage":[58],"systems":[59],"such":[60],"relational":[62],"databases.":[63],"One":[64],"important":[65],"requirement":[66],"encryption-at-rest":[68,100],"which":[69],"currently":[72],"supported":[73],"by":[74],"Kafka.":[75],"We":[76,110],"present":[77],"an":[78],"analysis":[79],"different":[81],"ways":[82],"implement":[84],"encryption":[85,116],"in":[86,114,125],"then":[89],"describe":[90],"first":[92],"c":[93],"omplete":[94],"s":[95],"ystem":[96],"f":[97],"or":[98],"implementing":[99,115],"at":[101,108],"granularity":[103],"topic":[107],"scale.":[109],"demonstrate":[111],"challenges":[113],"policy,":[117],"distribution,":[119],"rotation":[121],"re-encryption":[124],"Kafka,":[126],"using":[127],"our":[128],"working":[129],"implementation":[130],"for":[131],"illustration.":[132]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
