Paper 2025/218

LSM Trees in Adversarial Environments

Hayder Tirmazi
Abstract

The Log Structured Merge (LSM) Tree is a popular choice for key-value stores that focus on optimized write throughput while maintaining performant, production-ready read latencies. To optimize read performance, LSM stores rely on a probabilistic data structure called the Bloom Filter (BF). In this paper, we focus on adversarial workloads that lead to a sharp degradation in read performance by impacting the accuracy of BFs used within the LSM store. Our evaluation shows up to increase in the read latency of lookups for popular LSM stores. We define adversarial models and security definitions for LSM stores. We implement adversary resilience into two popular LSM stores, LevelDB and RocksDB. We use our implementations to demonstrate how performance degradation under adversarial workloads can be mitigated.

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Preprint.
Keywords
LSM storesStorage SecurityBloom FiltersCryptography
Contact author(s)
hayder research @ gmail com
History
2025-02-14: revised
2025-02-12: received
See all versions
Short URL
https://ia.cr/2025/218
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/218,
      author = {Hayder Tirmazi},
      title = {{LSM} Trees in Adversarial Environments},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/218},
      year = {2025},
      url = {https://eprint.iacr.org/2025/218}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.