{"id":"https://openalex.org/W4405182677","doi":"https://doi.org/10.1145/3658644.3670281","title":"Elephants Do Not Forget: Differential Privacy with State Continuity for Privacy Budget","display_name":"Elephants Do Not Forget: Differential Privacy with State Continuity for Privacy Budget","publication_year":2024,"publication_date":"2024-12-02","ids":{"openalex":"https://openalex.org/W4405182677","doi":"https://doi.org/10.1145/3658644.3670281"},"language":"en","primary_location":{"id":"doi:10.1145/3658644.3670281","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3670281","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3670281","source":null,"license":"cc-by-nd","license_id":"https://openalex.org/licenses/cc-by-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3670281","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047825364","display_name":"Jiankai Jin","orcid":null},"institutions":[{"id":"https://openalex.org/I165779595","display_name":"The University of Melbourne","ror":"https://ror.org/01ej9dk98","country_code":"AU","type":"education","lineage":["https://openalex.org/I165779595"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Jiankai Jin","raw_affiliation_strings":["The University of Melbourne, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"The University of Melbourne, Melbourne, Australia","institution_ids":["https://openalex.org/I165779595"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091908047","display_name":"Chitchanok Chuengsatiansup","orcid":"https://orcid.org/0000-0002-0329-2681"},"institutions":[{"id":"https://openalex.org/I165779595","display_name":"The University of Melbourne","ror":"https://ror.org/01ej9dk98","country_code":"AU","type":"education","lineage":["https://openalex.org/I165779595"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Chitchanok Chuengsatiansup","raw_affiliation_strings":["The University of Melbourne, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"The University of Melbourne, Melbourne, Australia","institution_ids":["https://openalex.org/I165779595"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043210393","display_name":"Toby Murray","orcid":"https://orcid.org/0000-0002-8271-0289"},"institutions":[{"id":"https://openalex.org/I165779595","display_name":"The University of Melbourne","ror":"https://ror.org/01ej9dk98","country_code":"AU","type":"education","lineage":["https://openalex.org/I165779595"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Toby Murray","raw_affiliation_strings":["The University of Melbourne, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"The University of Melbourne, Melbourne, Australia","institution_ids":["https://openalex.org/I165779595"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078824132","display_name":"Benjamin I. P. Rubinstein","orcid":"https://orcid.org/0000-0002-2947-6980"},"institutions":[{"id":"https://openalex.org/I165779595","display_name":"The University of Melbourne","ror":"https://ror.org/01ej9dk98","country_code":"AU","type":"education","lineage":["https://openalex.org/I165779595"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Benjamin I. P. Rubinstein","raw_affiliation_strings":["The University of Melbourne, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"The University of Melbourne, Melbourne, Australia","institution_ids":["https://openalex.org/I165779595"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056484605","display_name":"Yuval Yarom","orcid":"https://orcid.org/0000-0003-0401-4197"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Yuval Yarom","raw_affiliation_strings":["Ruhr University Bochum, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Ruhr University Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011082117","display_name":"Olga Ohrimenko","orcid":"https://orcid.org/0000-0002-9735-0538"},"institutions":[{"id":"https://openalex.org/I165779595","display_name":"The University of Melbourne","ror":"https://ror.org/01ej9dk98","country_code":"AU","type":"education","lineage":["https://openalex.org/I165779595"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Olga Ohrimenko","raw_affiliation_strings":["The University of Melbourne, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"The University of Melbourne, Melbourne, Australia","institution_ids":["https://openalex.org/I165779595"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5047825364"],"corresponding_institution_ids":["https://openalex.org/I165779595"],"apc_list":null,"apc_paid":null,"fwci":1.366,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.85046101,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1909","last_page":"1923"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.7585597038269043},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5612253546714783},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5360629558563232},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5337038636207581},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.5231375098228455},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.5112795829772949},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49304935336112976},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.07246354222297668}],"concepts":[{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.7585597038269043},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5612253546714783},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5360629558563232},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5337038636207581},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.5231375098228455},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.5112795829772949},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49304935336112976},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.07246354222297668},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3658644.3670281","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3670281","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3670281","source":null,"license":"cc-by-nd","license_id":"https://openalex.org/licenses/cc-by-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3658644.3670281","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3670281","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3670281","source":null,"license":"cc-by-nd","license_id":"https://openalex.org/licenses/cc-by-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5856086275","display_name":null,"funder_award_id":"EXC 2092 CASA - 390781972","funder_id":"https://openalex.org/F4320323817","funder_display_name":"Universitas Brawijaya"}],"funders":[{"id":"https://openalex.org/F4320323817","display_name":"Universitas Brawijaya","ror":"https://ror.org/01wk3d929"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4405182677.pdf"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W1557855942","https://openalex.org/W1794148987","https://openalex.org/W1873763122","https://openalex.org/W2042946599","https://openalex.org/W2049913483","https://openalex.org/W2093460657","https://openalex.org/W2095135670","https://openalex.org/W2096870293","https://openalex.org/W2103131117","https://openalex.org/W2110868467","https://openalex.org/W2159915142","https://openalex.org/W2167372639","https://openalex.org/W2577111091","https://openalex.org/W2606774910","https://openalex.org/W2761138375","https://openalex.org/W3031749496","https://openalex.org/W4212774754","https://openalex.org/W4288057781","https://openalex.org/W4300449316","https://openalex.org/W4308633695","https://openalex.org/W4308642193","https://openalex.org/W4389609557","https://openalex.org/W6775830128"],"related_works":["https://openalex.org/W2584827882","https://openalex.org/W2528109871","https://openalex.org/W3027166605","https://openalex.org/W3134350841","https://openalex.org/W3136495642","https://openalex.org/W3129454145","https://openalex.org/W3153181207","https://openalex.org/W2110748233","https://openalex.org/W2240244939","https://openalex.org/W3094057321"],"abstract_inverted_index":{"Current":[0],"implementations":[1],"of":[2,27,156,221,238],"differentially-private":[3],"(DP)":[4],"systems":[5],"either":[6],"lack":[7],"support":[8],"to":[9,21,34,42,52,75,96,125,135,186,230,240,245],"track":[10],"the":[11,24,66,98,106,129,142,154,157,161,176,191,222,232],"global":[12,107],"privacy":[13,37,130],"budget":[14,38,131,164,192],"consumed":[15],"on":[16,120],"a":[17,36,58,64,84,92,102,121,133,181,204,214,228,236],"dataset,":[18],"or":[19],"fail":[20],"faithfully":[22,136],"maintain":[23,35,241],"state":[25,122,159,183,242],"continuity":[26,123],"this":[28],"budget.":[29,143],"We":[30,89,169],"show":[31],"that":[32,72,94,171],"failure":[33],"enables":[39],"an":[40,114,200,246],"adversary":[41],"mount":[43],"replay,":[44],"rollback":[45],"and":[46,132,140,160,166,184,196,219,235,253],"fork":[47],"attacks":[48],"---":[49,77],"obtaining":[50],"answers":[51],"many":[53],"more":[54],"queries":[55,187],"than":[56],"what":[57],"secure":[59],"system":[60,93,118],"would":[61,210],"allow.":[62],"As":[63],"result":[65],"attacker":[67,201],"can":[68,178],"reconstruct":[69],"secret":[70],"data":[71],"DP":[73,80,108,138,197,233,259],"aims":[74,95],"protect":[76],"even":[78],"if":[79],"code":[81,139,234],"runs":[82],"in":[83,105,113],"Trusted":[85],"Execution":[86],"Environment":[87],"(TEE).":[88],"propose":[90],"ElephantDP,":[91],"provide":[97,126,145],"same":[99],"guarantees":[100],"as":[101,188,190,206,208,227],"trusted":[103,215],"curator":[104],"model":[109],"would,":[110],"albeit":[111],"set":[112],"untrusted":[115],"environment.":[116],"Our":[117,217],"relies":[119],"module":[124],"protection":[127],"for":[128,257],"TEE":[134,229],"execute":[137],"update":[141],"To":[144],"security,":[146],"our":[147],"protocol":[148,177,223],"makes":[149],"several":[150],"design":[151],"choices":[152],"including":[153],"content":[155],"persistent":[158],"order":[162],"between":[163],"updates":[165],"query":[167],"answers.":[168],"prove":[170],"ElephantDP":[172],"provides":[173],"liveness":[174],"(i.e.,":[175,199],"restart":[179],"from":[180,211],"correct":[182],"respond":[185],"long":[189],"is":[193],"not":[194],"exceeded)":[195],"confidentiality":[198],"learns":[202],"about":[203],"dataset":[205],"much":[207],"it":[209],"interacting":[212],"with":[213],"curator).":[216],"implementation":[218],"evaluation":[220],"use":[224],"Intel":[225],"SGX":[226],"run":[231],"network":[237],"TEEs":[239],"continuity.":[243],"Compared":[244],"insecure":[247],"baseline,":[248],"we":[249],"observe":[250],"1.1--3.2\u00d7":[251],"overheads":[252,256],"lower":[254],"relative":[255],"complex":[258],"queries.":[260]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
