Paper 2025/218
LSM Trees in Adversarial Environments
Abstract
The Log Structured Merge (LSM) Tree is a popular choice for key-value stores that focus on optimized write throughput while maintaining performant, production-ready read latencies. To optimize read performance, LSM stores rely on a probabilistic data structure called the Bloom Filter (BF). In this paper, we focus on adversarial workloads that lead to a sharp degradation in read performance by impacting the accuracy of BFs used within the LSM store. Our evaluation shows up to $800\%$ increase in the read latency of lookups for popular LSM stores. We define adversarial models and security definitions for LSM stores. We implement adversary resilience into two popular LSM stores, LevelDB and RocksDB. We use our implementations to demonstrate how performance degradation under adversarial workloads can be mitigated.
Metadata
- Available format(s)
-
PDF
- Category
- Applications
- Publication info
- Preprint.
- Keywords
- LSM storesStorage SecurityBloom FiltersCryptography
- Contact author(s)
- hayder research @ gmail com
- History
- 2025-02-14: revised
- 2025-02-12: received
- See all versions
- Short URL
- https://ia.cr/2025/218
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2025/218, author = {Hayder Tirmazi}, title = {{LSM} Trees in Adversarial Environments}, howpublished = {Cryptology {ePrint} Archive, Paper 2025/218}, year = {2025}, url = {https://eprint.iacr.org/2025/218} }