Paper 2025/218
LSM Trees in Adversarial Environments
Abstract
The Log Structured Merge (LSM) Tree is a popular choice for key-value stores that focus on optimized write throughput while maintaining performant, production-ready read latencies. To optimize read performance, LSM stores rely on a probabilistic data structure called the Bloom Filter (BF). In this paper, we focus on adversarial workloads that lead to a sharp degradation in read performance by impacting the accuracy of BFs used within the LSM store. Our evaluation shows up to
Metadata
- Available format(s)
-
PDF
- Category
- Applications
- Publication info
- Preprint.
- Keywords
- LSM storesStorage SecurityBloom FiltersCryptography
- Contact author(s)
- hayder research @ gmail com
- History
- 2025-02-14: revised
- 2025-02-12: received
- See all versions
- Short URL
- https://ia.cr/2025/218
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2025/218, author = {Hayder Tirmazi}, title = {{LSM} Trees in Adversarial Environments}, howpublished = {Cryptology {ePrint} Archive, Paper 2025/218}, year = {2025}, url = {https://eprint.iacr.org/2025/218} }