{"id":"https://openalex.org/W3149592999","doi":"https://doi.org/10.14778/3450980.3450986","title":"Software-defined data protection","display_name":"Software-defined data protection","publication_year":2021,"publication_date":"2021-03-01","ids":{"openalex":"https://openalex.org/W3149592999","doi":"https://doi.org/10.14778/3450980.3450986","mag":"3149592999"},"language":"en","primary_location":{"id":"doi:10.14778/3450980.3450986","is_oa":false,"landing_page_url":"https://doi.org/10.14778/3450980.3450986","pdf_url":null,"source":{"id":"https://openalex.org/S4210226185","display_name":"Proceedings of the VLDB Endowment","issn_l":"2150-8097","issn":["2150-8097"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the VLDB Endowment","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082765592","display_name":"Zsolt Istv\u00e1n","orcid":"https://orcid.org/0000-0002-4127-8573"},"institutions":[{"id":"https://openalex.org/I83467386","display_name":"IT University of Copenhagen","ror":"https://ror.org/02309jg23","country_code":"DK","type":"education","lineage":["https://openalex.org/I83467386"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Zsolt Istv\u00e1n","raw_affiliation_strings":["IT University of Copenhagen"],"affiliations":[{"raw_affiliation_string":"IT University of Copenhagen","institution_ids":["https://openalex.org/I83467386"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071385539","display_name":"Soujanya Ponnapalli","orcid":"https://orcid.org/0009-0006-1449-1447"},"institutions":[{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Soujanya Ponnapalli","raw_affiliation_strings":["University of Texas at Austin"],"affiliations":[{"raw_affiliation_string":"University of Texas at Austin","institution_ids":["https://openalex.org/I86519309"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010361101","display_name":"Vijay Chidambaram","orcid":"https://orcid.org/0000-0001-7985-6087"},"institutions":[{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vijay Chidambaram","raw_affiliation_strings":["University of Texas at Austin"],"affiliations":[{"raw_affiliation_string":"University of Texas at Austin","institution_ids":["https://openalex.org/I86519309"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5082765592"],"corresponding_institution_ids":["https://openalex.org/I83467386"],"apc_list":null,"apc_paid":null,"fwci":1.9036,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.88046626,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":"14","issue":"7","first_page":"1167","last_page":"1174"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9829000234603882,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9782999753952026,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5152192711830139},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4538485109806061},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3521685004234314},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3107560873031616}],"concepts":[{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5152192711830139},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4538485109806061},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3521685004234314},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3107560873031616}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.14778/3450980.3450986","is_oa":false,"landing_page_url":"https://doi.org/10.14778/3450980.3450986","pdf_url":null,"source":{"id":"https://openalex.org/S4210226185","display_name":"Proceedings of the VLDB Endowment","issn_l":"2150-8097","issn":["2150-8097"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the VLDB Endowment","raw_type":"journal-article"},{"id":"pmh:oai:pure.atira.dk:openaire/b105200d-f2e4-4058-8fcb-08e7d7fe4185","is_oa":false,"landing_page_url":"https://pure.itu.dk/portal/da/publications/b105200d-f2e4-4058-8fcb-08e7d7fe4185","pdf_url":null,"source":{"id":"https://openalex.org/S4377196680","display_name":"IT University Of Copenhagen (IT University of Copenhagen)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I83467386","host_organization_name":"IT University of Copenhagen","host_organization_lineage":["https://openalex.org/I83467386"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Istv\u00e1n, Z, Ponnapalli, S & Chidambaram, V 2021, 'Software-Defined Data Protection: Low Overhead Policy Compliance at the Storage Layer is Within Reach!', Proceedings of the VLDB Endowment, vol. 14, no. 7, pp. 1167-1174. https://doi.org/10.14778/3450980.3450986","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:tubiblio.ulb.tu-darmstadt.de:136062","is_oa":false,"landing_page_url":"http://tubiblio.ulb.tu-darmstadt.de/136062/","pdf_url":null,"source":{"id":"https://openalex.org/S4377196390","display_name":"TUbilio (Technical University of Darmstadt)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I31512782","host_organization_name":"Technische Universit\u00e4t Darmstadt","host_organization_lineage":["https://openalex.org/I31512782"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Artikel"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W171996078","https://openalex.org/W1556873914","https://openalex.org/W1598409309","https://openalex.org/W1965159911","https://openalex.org/W1980347087","https://openalex.org/W1981490327","https://openalex.org/W2022063165","https://openalex.org/W2047235211","https://openalex.org/W2078069481","https://openalex.org/W2286264920","https://openalex.org/W2466434324","https://openalex.org/W2507744471","https://openalex.org/W2542189141","https://openalex.org/W2547860654","https://openalex.org/W2753147542","https://openalex.org/W2761070740","https://openalex.org/W2766040387","https://openalex.org/W2798786426","https://openalex.org/W2887050046","https://openalex.org/W2896227706","https://openalex.org/W2900463239","https://openalex.org/W2913648972","https://openalex.org/W2917199883","https://openalex.org/W2924173660","https://openalex.org/W2946710172","https://openalex.org/W2948847334","https://openalex.org/W2951152347","https://openalex.org/W2961314609","https://openalex.org/W2965117823","https://openalex.org/W2975461126","https://openalex.org/W2978817023","https://openalex.org/W2981442692","https://openalex.org/W2981810231","https://openalex.org/W2996000302","https://openalex.org/W3011082615","https://openalex.org/W3012258699","https://openalex.org/W3021475380","https://openalex.org/W3028978361","https://openalex.org/W3082662217","https://openalex.org/W3125140672","https://openalex.org/W3162769608"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Most":[0],"modern":[1],"data":[2,39,63,117],"processing":[3,59,64],"pipelines":[4],"run":[5],"on":[6],"top":[7],"of":[8],"a":[9,150],"distributed":[10,104],"storage":[11,20,106,130],"layer,":[12],"and":[13,18,36,41,54,58,115,140,180],"securing":[14],"the":[15,19,49,74,79,110,124,167],"whole":[16],"system,":[17],"layer":[21],"in":[22,61,166],"particular,":[23],"against":[24],"accidental":[25],"or":[26,145],"malicious":[27],"misuse":[28],"is":[29,92,149],"crucial":[30],"to":[31,34,51,108,123,132,158],"ensuring":[32],"compliance":[33],"rules":[35,139],"regulations.":[37],"Enforcing":[38],"protection":[40,118],"privacy":[42],"rules,":[43],"however,":[44],"stands":[45],"at":[46,112],"odds":[47],"with":[48],"requirement":[50],"achieve":[52],"higher":[53,55],"access":[56],"bandwidths":[57],"rates":[60],"large":[62],"pipelines.":[65],"In":[66],"this":[67,160],"work":[68],"we":[69,164],"describe":[70],"our":[71,84],"proposal":[72],"for":[73,137],"path":[75],"forward":[76],"that":[77],"reconciles":[78],"two":[80],"goals.":[81],"We":[82],"call":[83],"approach":[85],"\"Software-Defined":[86],"Data":[87],"Protection\"":[88],"(SDP).":[89],"Its":[90],"premise":[91],"simple,":[93],"yet":[94],"powerful:":[95],"decoupling":[96],"often":[97],"changing":[98],"policies":[99],"from":[100],"request-level":[101],"enforcement":[102,134],"allows":[103,129],"smart":[105],"nodes":[107,131],"implement":[109],"latter":[111],"line-rate.":[113],"Existing":[114],"future":[116],"frameworks":[119],"can":[120],"be":[121],"translated":[122],"same":[125],"hardware":[126,182],"interface":[127],"which":[128],"offload":[133],"efficiently":[135],"both":[136],"company-specific":[138],"regulations,":[141],"such":[142],"as":[143],"GDPR":[144],"CCPA.":[146],"While":[147],"SDP":[148],"promising":[151],"approach,":[152],"there":[153],"are":[154],"several":[155,175],"remaining":[156],"challenges":[157],"making":[159],"vision":[161],"reality.":[162],"As":[163],"explain":[165],"paper,":[168],"overcoming":[169],"these":[170],"will":[171],"require":[172],"collaboration":[173],"across":[174],"domains,":[176],"including":[177],"security,":[178],"databases":[179],"specialized":[181],"design.":[183]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":2}],"updated_date":"2026-02-26T08:16:20.718346","created_date":"2025-10-10T00:00:00"}
