Netinfo Security ›› 2025, Vol. 25 ›› Issue (11): 1707-1717.doi: 10.3969/j.issn.1671-1122.2025.11.005

Previous Articles     Next Articles

Research on Key-Value Data Storage and Operation Optimization Method Based on Confidential Computing

REN Fengyuan1,2, ZHANG Xinyue1, LEI Zhuoyi1, LIU Xin1()   

  1. 1. School of Information Science & Engineering, Lanzhou University, Lanzhou 730099, China
    2. School of Information Science and Technology, Tsinghua University, Beijing 100084, China
  • Received:2025-07-27 Online:2025-11-10 Published:2025-12-02

Abstract:

Confidential computing aims to protect data in use by making it inaccessible to applications in main memory through a hardware-based TEE. To optimize the paging overhead and system I/O performance of confidential computing technology during operation, this article implemented a key-value data storage and operation optimization method based on confidential computing in light of SGX1 technology for key-value data query and update operations. This approach stored frequently queried key-value data in plaintext within the TEE’s min-heap, while the primary data structures were maintained as ciphertext hash tables in unprotected main memory. By leveraging the TEE to optimize hot data queries, the method also enhanced cold data queries and updates in main memory through the use of data tags. Experimental results demonstrate that this method is more efficient than directly encrypting and decrypting key-value data for query and update operations, effectively reducing paging overhead and improving system I/O performance.

Key words: confidential computing, SGX, key-value data storage

CLC Number: