{"id":"https://openalex.org/W3149389418","doi":"https://doi.org/10.1145/3448016.3457306","title":"DP-Sync: Hiding Update Patterns in Secure Outsourced Databases with Differential Privacy","display_name":"DP-Sync: Hiding Update Patterns in Secure Outsourced Databases with Differential Privacy","publication_year":2021,"publication_date":"2021-06-09","ids":{"openalex":"https://openalex.org/W3149389418","doi":"https://doi.org/10.1145/3448016.3457306","mag":"3149389418"},"language":"en","primary_location":{"id":"doi:10.1145/3448016.3457306","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3448016.3457306","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3448016.3457306","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 International Conference on Management of Data","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3448016.3457306","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Chenghong Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I170897317","display_name":"Duke University","ror":"https://ror.org/00py81415","country_code":"US","type":"education","lineage":["https://openalex.org/I170897317"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Chenghong Wang","raw_affiliation_strings":["Duke University, Durham, NC, USA"],"affiliations":[{"raw_affiliation_string":"Duke University, Durham, NC, USA","institution_ids":["https://openalex.org/I170897317"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Johes Bater","orcid":null},"institutions":[{"id":"https://openalex.org/I170897317","display_name":"Duke University","ror":"https://ror.org/00py81415","country_code":"US","type":"education","lineage":["https://openalex.org/I170897317"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Johes Bater","raw_affiliation_strings":["Duke University, Durham, NC, USA"],"affiliations":[{"raw_affiliation_string":"Duke University, Durham, NC, USA","institution_ids":["https://openalex.org/I170897317"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Kartik Nayak","orcid":null},"institutions":[{"id":"https://openalex.org/I170897317","display_name":"Duke University","ror":"https://ror.org/00py81415","country_code":"US","type":"education","lineage":["https://openalex.org/I170897317"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kartik Nayak","raw_affiliation_strings":["Duke University, Durham, NC, USA"],"affiliations":[{"raw_affiliation_string":"Duke University, Durham, NC, USA","institution_ids":["https://openalex.org/I170897317"]}]},{"author_position":"last","author":{"id":null,"display_name":"Ashwin Machanavajjhala","orcid":null},"institutions":[{"id":"https://openalex.org/I170897317","display_name":"Duke University","ror":"https://ror.org/00py81415","country_code":"US","type":"education","lineage":["https://openalex.org/I170897317"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ashwin Machanavajjhala","raw_affiliation_strings":["Duke University, Durham, NC, USA"],"affiliations":[{"raw_affiliation_string":"Duke University, Durham, NC, USA","institution_ids":["https://openalex.org/I170897317"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I170897317"],"apc_list":null,"apc_paid":null,"fwci":0.6998,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.75458951,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1892","last_page":"1905"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.6000999808311462},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.5855000019073486},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.578499972820282},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5730999708175659},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.43050000071525574},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.3587000072002411},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.3546000123023987},{"id":"https://openalex.org/keywords/distributed-database","display_name":"Distributed database","score":0.3537999987602234}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.777899980545044},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.6000999808311462},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.588100016117096},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.5855000019073486},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.578499972820282},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5730999708175659},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4480000138282776},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.43050000071525574},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.3587000072002411},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3546000123023987},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.3537999987602234},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.3353999853134155},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3237999975681305},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.31700000166893005},{"id":"https://openalex.org/C2778553114","wikidata":"https://www.wikidata.org/wiki/Q1035293","display_name":"Database security","level":2,"score":0.3093999922275543},{"id":"https://openalex.org/C139458680","wikidata":"https://www.wikidata.org/wiki/Q12184942","display_name":"Interoperation","level":3,"score":0.30820000171661377},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.2840000092983246},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.2709999978542328},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.2667999863624573},{"id":"https://openalex.org/C12439846","wikidata":"https://www.wikidata.org/wiki/Q4809258","display_name":"Database theory","level":3,"score":0.2621000111103058},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.25540000200271606},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.2508000135421753}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3448016.3457306","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3448016.3457306","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3448016.3457306","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 International Conference on Management of Data","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2103.15942","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2103.15942","pdf_url":"https://arxiv.org/pdf/2103.15942","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"doi:10.1145/3448016.3457306","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3448016.3457306","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3448016.3457306","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 International Conference on Management of Data","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5532983302","display_name":null,"funder_award_id":"N66001-15-C-4067","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"},{"id":"https://openalex.org/G6373713604","display_name":"RAPID: Poirot: From Contact Tracing to Private Exposure Detection","funder_award_id":"2029853","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6586958180","display_name":null,"funder_award_id":"2016393, 2029853","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6888569891","display_name":null,"funder_award_id":"2016393","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3149389418.pdf","grobid_xml":"https://content.openalex.org/works/W3149389418.grobid-xml"},"referenced_works_count":62,"referenced_works":["https://openalex.org/W1502927489","https://openalex.org/W1539859404","https://openalex.org/W1556683487","https://openalex.org/W1895952394","https://openalex.org/W1993536048","https://openalex.org/W2001347093","https://openalex.org/W2009611335","https://openalex.org/W2011212169","https://openalex.org/W2016575873","https://openalex.org/W2031533839","https://openalex.org/W2033092546","https://openalex.org/W2033165262","https://openalex.org/W2033341683","https://openalex.org/W2043508455","https://openalex.org/W2047656932","https://openalex.org/W2054922243","https://openalex.org/W2086763678","https://openalex.org/W2124202597","https://openalex.org/W2136720346","https://openalex.org/W2152516507","https://openalex.org/W2154448764","https://openalex.org/W2154496743","https://openalex.org/W2161214567","https://openalex.org/W2169691038","https://openalex.org/W2532292902","https://openalex.org/W2539944395","https://openalex.org/W2578791853","https://openalex.org/W2595058628","https://openalex.org/W2599541228","https://openalex.org/W2751501713","https://openalex.org/W2765463836","https://openalex.org/W2766202013","https://openalex.org/W2788385473","https://openalex.org/W2792158747","https://openalex.org/W2794508460","https://openalex.org/W2891020614","https://openalex.org/W2891250116","https://openalex.org/W2891311364","https://openalex.org/W2891392853","https://openalex.org/W2898477690","https://openalex.org/W2915016908","https://openalex.org/W2922166054","https://openalex.org/W2945387244","https://openalex.org/W2946109000","https://openalex.org/W2946905885","https://openalex.org/W2947185594","https://openalex.org/W2950674756","https://openalex.org/W2962868942","https://openalex.org/W2962901170","https://openalex.org/W2962933337","https://openalex.org/W2963053811","https://openalex.org/W2965057263","https://openalex.org/W2970408474","https://openalex.org/W2984157150","https://openalex.org/W2986992030","https://openalex.org/W2990722039","https://openalex.org/W3000984796","https://openalex.org/W3101806178","https://openalex.org/W4248861293","https://openalex.org/W4301521827","https://openalex.org/W6769655387","https://openalex.org/W6778209916"],"related_works":[],"abstract_inverted_index":{"In":[0],"this":[1,54],"paper,":[2],"we":[3,56],"consider":[4,42],"privacy-preserving":[5],"update":[6,50],"strategies":[7],"for":[8,64,86],"secure":[9,60],"outsourced":[10,21,61],"growing":[11,65],"databases.":[12],"Such":[13],"databases":[14,77],"allow":[15],"appendonly":[16],"data":[17,22],"updates":[18,81],"on":[19,105],"the":[20,43],"structure":[23],"while":[24,82],"analysis":[25],"is":[26],"ongoing.":[27],"Despite":[28],"a":[29,58,71],"plethora":[30],"of":[31,74,97],"solutions":[32],"to":[33],"securely":[34],"outsource":[35],"database":[36,62],"computation,":[37],"existing":[38,75],"techniques":[39],"do":[40],"not":[41],"information":[44],"that":[45],"can":[46],"be":[47],"leaked":[48],"via":[49],"patterns.":[51],"To":[52],"address":[53],"problem,":[55],"design":[57],"novel":[59],"framework":[63],"data,":[66],"DP-Sync,":[67],"which":[68],"interoperate":[69],"with":[70,101],"large":[72],"class":[73],"encrypted":[76],"and":[78,99],"supports":[79],"efficient":[80],"providing":[83],"differentially-private":[84],"guarantees":[85],"any":[87],"single":[88],"update.":[89],"We":[90],"demonstrate":[91],"DP-Sync's":[92],"practical":[93],"feasibility":[94],"in":[95],"terms":[96],"performance":[98],"accuracy":[100],"extensive":[102],"empirical":[103],"evaluations":[104],"real":[106],"world":[107],"datasets.":[108]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2021-04-13T00:00:00"}
