{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T18:10:03Z","timestamp":1755886203931,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"NSF","award":["CNS-2220434, CNS-2220433, OAC-2319988"],"award-info":[{"award-number":["CNS-2220434, CNS-2220433, OAC-2319988"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,4]]},"DOI":"10.1145\/3627106.3627181","type":"proceedings-article","created":{"date-parts":[[2023,12,2]],"date-time":"2023-12-02T18:13:22Z","timestamp":1701540802000},"page":"772-786","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Differentially Private Resource Allocation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-0787-058X","authenticated-orcid":false,"given":"Joann Qiongna","family":"Chen","sequence":"first","affiliation":[{"name":"University of California, Irvine, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9017-7947","authenticated-orcid":false,"given":"Tianhao","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Virginia, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7208-3392","authenticated-orcid":false,"given":"Zhikun","family":"Zhang","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Germany and Stanford University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3612-7348","authenticated-orcid":false,"given":"Yang","family":"Zhang","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5877-0436","authenticated-orcid":false,"given":"Somesh","family":"Jha","sequence":"additional","affiliation":[{"name":"University of Wisconsin, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9401-1012","authenticated-orcid":false,"given":"Zhou","family":"Li","sequence":"additional","affiliation":[{"name":"University of California, Irvine, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Measuring anonymity: The disclosure attack","author":"Agrawal Dakshi","year":"2003","unstructured":"Dakshi Agrawal and Dogan Kesdogan. 2003. Measuring anonymity: The disclosure attack. IEEE Security & privacy 1, 6 (2003), 27\u201334."},{"volume-title":"11th { USENIX} Symposium on Operating Systems Design and Implementation ({ OSDI} 14). 233\u2013248.","author":"Angel Sebastian","key":"e_1_3_2_1_2_1","unstructured":"Sebastian Angel, Hitesh Ballani, Thomas Karagiannis, Greg O\u2019Shea, and Eno Thereska. 2014. End-to-end performance isolation through virtual datacenters. In 11th { USENIX} Symposium on Operating Systems Design and Implementation ({ OSDI} 14). 233\u2013248."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00065"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267323.3268958"},{"key":"e_1_3_2_1_5_1","volume-title":"Privacy amplification by subsampling: Tight analyses via couplings and divergences. Advances in Neural Information Processing Systems 31","author":"Balle Borja","year":"2018","unstructured":"Borja Balle, Gilles Barthe, and Marco Gaboardi. 2018. Privacy amplification by subsampling: Tight analyses via couplings and divergences. Advances in Neural Information Processing Systems 31 (2018)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26951-7_22"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14778\/3291264.3291274"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485371"},{"key":"e_1_3_2_1_9_1","volume-title":"Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing. Future generation computer systems 28, 5","author":"Beloglazov Anton","year":"2012","unstructured":"Anton Beloglazov, Jemal Abawajy, and Rajkumar Buyya. 2012. Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing. Future generation computer systems 28, 5 (2012), 755\u2013768."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-006-0001-y"},{"key":"e_1_3_2_1_11_1","first-page":"15676","article-title":"The discrete gaussian for differential privacy","volume":"33","author":"Canonne L","year":"2020","unstructured":"Cl\u00e9ment\u00a0L Canonne, Gautam Kamath, and Thomas Steinke. 2020. The discrete gaussian for differential privacy. Advances in Neural Information Processing Systems 33 (2020), 15676\u201315688.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975482.150"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484769"},{"key":"e_1_3_2_1_14_1","unstructured":"Joann\u00a0Qiongna Chen. 2023. Code of this project. https:\/\/github.com\/dpra-dp\/dpra."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48995-6_21"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0028"},{"volume-title":"Theory of cryptography conference","author":"Dwork Cynthia","key":"e_1_3_2_1_17_1","unstructured":"Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In Theory of cryptography conference. Springer, 265\u2013284."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.12"},{"key":"e_1_3_2_1_19_1","volume-title":"Amplification by Shuffling: From Local to Central Differential Privacy via Anonymity. arXiv preprint arXiv:1811.12469","author":"Erlingsson \u00dalfar","year":"2018","unstructured":"\u00dalfar Erlingsson, Vitaly Feldman, Ilya Mironov, Ananth Raghunathan, Kunal Talwar, and Abhradeep Thakurta. 2018. Amplification by Shuffling: From Local to Central Differential Privacy via Anonymity. arXiv preprint arXiv:1811.12469 (2018)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975482.151"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2018.00056"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2013.40"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2504972"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1137\/09076828X"},{"key":"e_1_3_2_1_26_1","first-page":"11631","article-title":"Numerical composition of differential privacy","volume":"34","author":"Gopi Sivakanth","year":"2021","unstructured":"Sivakanth Gopi, Yin\u00a0Tat Lee, and Lukas Wutschitz. 2021. Numerical composition of differential privacy. Advances in Neural Information Processing Systems 34 (2021), 11631\u201311642.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-014-0407-8"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134030"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591796.2591826"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.parco.2013.09.009"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2018.000036"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833672"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1287\/moor.1040.0091"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Laura Kang and David\u00a0C Parkes. 2006. Passive verification of the strategyproofness of mechanisms in open environments. In Proceedings of the 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers obstacles and limitations to conducting successful business on the internet. 19\u201330.","DOI":"10.1145\/1151454.1151473"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the twenty-sixth annual ACM-SIAM symposium on Discrete algorithms. SIAM","author":"Kannan Sampath","year":"2014","unstructured":"Sampath Kannan, Jamie Morgenstern, Aaron Roth, and Zhiwei\u00a0Steven Wu. 2014. Approximately stable, school optimal, and student-truthful many-to-one matchings (via differential privacy). In Proceedings of the twenty-sixth annual ACM-SIAM symposium on Discrete algorithms. SIAM, 1890\u20131903."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2554797.2554834"},{"key":"e_1_3_2_1_37_1","volume-title":"A fast storage allocator. Commun. ACM 8, 10","author":"Knowlton C","year":"1965","unstructured":"Kenneth\u00a0C Knowlton. 1965. A fast storage allocator. Commun. ACM 8, 10 (1965)."},{"key":"e_1_3_2_1_38_1","volume-title":"Differentially Oblivious Turing Machines. In 12th Innovations in Theoretical Computer Science Conference (ITCS","author":"Komargodski Ilan","year":"2021","unstructured":"Ilan Komargodski and Elaine Shi. 2021. Differentially Oblivious Turing Machines. In 12th Innovations in Theoretical Computer Science Conference (ITCS 2021). Schloss Dagstuhl-Leibniz-Zentrum f\u00fcr Informatik."},{"key":"e_1_3_2_1_39_1","volume-title":"An efficient max-min resource allocator and task scheduling algorithm in cloud computing environment. arXiv preprint arXiv:1611.08864","author":"Konjaang J\u00a0Kok","year":"2016","unstructured":"J\u00a0Kok Konjaang, JY Maipan-uku, and Kumangkem\u00a0Kennedy Kubuga. 2016. An efficient max-min resource allocator and task scheduling algorithm in cloud computing environment. arXiv preprint arXiv:1611.08864 (2016)."},{"key":"e_1_3_2_1_40_1","volume-title":"Differentially private hierarchical count-of-counts histograms. arXiv preprint arXiv:1804.00370","author":"Kuo Yu-Hsuan","year":"2018","unstructured":"Yu-Hsuan Kuo, Cho-Chun Chiu, Daniel Kifer, Michael Hay, and Ashwin Machanavajjhala. 2018. Differentially private hierarchical count-of-counts histograms. arXiv preprint arXiv:1804.00370 (2018)."},{"key":"e_1_3_2_1_41_1","volume-title":"Karaoke: Distributed private messaging immune to passive traffic analysis. In 13th { USENIX} Symposium on Operating Systems Design and Implementation ({ OSDI} 18). 711\u2013725.","author":"Lazar David","year":"2018","unstructured":"David Lazar, Yossi Gilad, and Nickolai Zeldovich. 2018. Karaoke: Distributed private messaging immune to passive traffic analysis. In 13th { USENIX} Symposium on Operating Systems Design and Implementation ({ OSDI} 18). 711\u2013725."},{"key":"e_1_3_2_1_42_1","volume-title":"Alpenhorn: Bootstrapping secure communication without leaking metadata. In 12th { USENIX} Symposium on Operating Systems Design and Implementation ({ OSDI} 16). 571\u2013586.","author":"Lazar David","year":"2016","unstructured":"David Lazar and Nickolai Zeldovich. 2016. Alpenhorn: Bootstrapping secure communication without leaking metadata. In 12th { USENIX} Symposium on Operating Systems Design and Implementation ({ OSDI} 16). 571\u2013586."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2015.7056024"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/571697.571724"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16435-4_17"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23400-2_38"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243851"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2017.11"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140436"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/336992.337028"},{"volume-title":"10th { USENIX} Symposium on Operating Systems Design and Implementation ({ OSDI} 12). 149\u2013162.","author":"Narayan Arjun","key":"e_1_3_2_1_51_1","unstructured":"Arjun Narayan and Andreas Haeberlen. 2012. DJoin: Differentially private join queries over distributed databases. In 10th { USENIX} Symposium on Operating Systems Design and Implementation ({ OSDI} 12). 149\u2013162."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00069"},{"key":"e_1_3_2_1_53_1","unstructured":"Pytorch. 2022. Opacus RDP. https:\/\/github.com\/pytorch\/opacus\/blob\/main\/opacus\/accountants\/rdp.py."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.14778\/3574245.3574267"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2600057.2602856"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2013.6736719"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971753"},{"key":"e_1_3_2_1_58_1","unstructured":"Thomas Steinke and Jonathan Ullman. 2021. Open problem - avoiding the union bound for multiple queries. https:\/\/differentialprivacy.org\/open-problem-avoid-union\/."},{"key":"e_1_3_2_1_59_1","volume-title":"Overlook: Differentially Private Exploratory Visualization for Big Data. arXiv preprint arXiv:2006.12018","author":"Thaker Pratiksha","year":"2020","unstructured":"Pratiksha Thaker, Mihai Budiu, Parikshit Gopalan, Udi Wieder, and Matei Zaharia. 2020. Overlook: Differentially Private Exploratory Visualization for Big Data. arXiv preprint arXiv:2006.12018 (2020)."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132783"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815417"},{"key":"e_1_3_2_1_62_1","unstructured":"VMware. 2019. Managing Resource Pools. https:\/\/docs.vmware.com\/en\/VMware-vSphere\/8.0\/vsphere-resource-management\/GUID-60077B40-66FF-4625-934A-641703ED7601.html."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0032"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813645"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3193111.3193115"},{"key":"e_1_3_2_1_66_1","volume-title":"USENIX Security Symposium","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner. 2014. FLUSH+ RELOAD: A high resolution, low noise, L3 cache side-channel attack. In USENIX Security Symposium 2014."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23210"}],"event":{"name":"ACSAC '23: Annual Computer Security Applications Conference","acronym":"ACSAC '23","location":"Austin TX USA"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627106.3627181","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3627106.3627181","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:40:51Z","timestamp":1755884451000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627106.3627181"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,4]]},"references-count":67,"alternative-id":["10.1145\/3627106.3627181","10.1145\/3627106"],"URL":"https:\/\/doi.org\/10.1145\/3627106.3627181","relation":{},"subject":[],"published":{"date-parts":[[2023,12,4]]},"assertion":[{"value":"2023-12-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}