{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T05:36:56Z","timestamp":1775281016582,"version":"3.50.1"},"reference-count":56,"publisher":"Association for Computing Machinery (ACM)","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. VLDB Endow."],"published-print":{"date-parts":[[2018,11]]},"abstract":"<jats:p>\n            A private data federation is a set of autonomous databases that share a unified query interface offering\n            <jats:italic>in-situ<\/jats:italic>\n            evaluation of SQL queries over the union of the sensitive data of its members. Owing to privacy concerns, these systems do not have a trusted data collector that can see all their data and their member databases cannot learn about individual records of other engines. Federations currently achieve this goal by evaluating queries obliviously using secure multiparty computation. This hides the intermediate result cardinality of each query operator by exhaustively padding it. With cascades of such operators, this padding accumulates to a blow-up in the output size of each operator and a proportional loss in query performance. Hence, existing private data federations do not scale well to complex SQL queries over large datasets.\n          <\/jats:p>\n          <jats:p>We introduce Shrinkwrap, a private data federation that offers data owners a differentially private view of the data held by others to improve their performance over oblivious query processing. Shrinkwrap uses computational differential privacy to minimize the padding of intermediate query results, achieving up to a 35X performance improvement over oblivious query processing. When the query needs differentially private output, Shrinkwrap provides a trade-off between result accuracy and query evaluation performance.<\/jats:p>","DOI":"10.14778\/3291264.3291274","type":"journal-article","created":{"date-parts":[[2019,2,4]],"date-time":"2019-02-04T13:13:43Z","timestamp":1549286023000},"page":"307-320","source":"Crossref","is-referenced-by-count":74,"title":["Shrinkwrap"],"prefix":"10.14778","volume":"12","author":[{"given":"Johes","family":"Bater","sequence":"first","affiliation":[{"name":"Northwestern University"}]},{"given":"Xi","family":"He","sequence":"additional","affiliation":[{"name":"University of Waterloo"}]},{"given":"William","family":"Ehrich","sequence":"additional","affiliation":[{"name":"Northwestern University"}]},{"given":"Ashwin","family":"Machanavajjhala","sequence":"additional","affiliation":[{"name":"Duke University"}]},{"given":"Jennie","family":"Rogers","sequence":"additional","affiliation":[{"name":"Northwestern University"}]}],"member":"320","published-online":{"date-parts":[[2018,11]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"CIDR","author":"Arasu A.","year":"2013","unstructured":"A. Arasu , S. Blanas , K. Eguro , R. Kaushik , D. Kossmann , R. Ramamurthy , and R. Venkatesan . Orthogonal Security with Cipherbase . CIDR , 2013 . A. Arasu, S. Blanas, K. Eguro, R. Kaushik, D. Kossmann, R. Ramamurthy, and R. Venkatesan. Orthogonal Security with Cipherbase. CIDR, 2013."},{"key":"e_1_2_1_2_1","first-page":"26","volume-title":"ICDT","author":"Arasu A.","year":"2014","unstructured":"A. Arasu and R. Kaushik . Oblivious Query Processing . ICDT , pages 26 -- 37 , 2014 . A. Arasu and R. Kaushik. Oblivious Query Processing. ICDT, pages 26--37, 2014."},{"issue":"189","key":"e_1_2_1_3_1","first-page":"120","article-title":"The BGW protocol for perfectly-secure multiparty computation","volume":"10","author":"Asharov G.","year":"2013","unstructured":"G. Asharov and Y. Lindell . The BGW protocol for perfectly-secure multiparty computation . Cryptology and Information Security Series , 10 ( 189 ): 120 -- 167 , 2013 . G. Asharov and Y. Lindell. The BGW protocol for perfectly-secure multiparty computation. Cryptology and Information Security Series, 10(189):120--167, 2013.","journal-title":"Cryptology and Information Security Series"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14778\/3055330.3055334"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100287"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.39"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14778\/3236187.3236217"},{"key":"e_1_2_1_8_1","first-page":"30","volume-title":"Annual Privacy Forum","author":"Bogdanov D.","year":"2014","unstructured":"D. Bogdanov , L. Kamm , S. Laur , P. Pruulmann-Vengerfeldt , R. Talviste , and J. Willemson . Privacy-preserving statistical data analysis on federated databases . In Annual Privacy Forum , pages 30 -- 55 . Springer , 2014 . D. Bogdanov, L. Kamm, S. Laur, P. Pruulmann-Vengerfeldt, R. Talviste, and J. Willemson. Privacy-preserving statistical data analysis on federated databases. In Annual Privacy Forum, pages 30--55. Springer, 2014."},{"key":"e_1_2_1_9_1","volume-title":"SgxPectre Attacks: Leaking Enclave Secrets via Speculative Execution","author":"Chen G.","year":"2018","unstructured":"G. Chen , S. Chen , Y. Xiao , Y. Zhang , Z. Lin , and T. H. Lai . SgxPectre Attacks: Leaking Enclave Secrets via Speculative Execution . 2018 . G. Chen, S. Chen, Y. Xiao, Y. Zhang, Z. Lin, and T. H. Lai. SgxPectre Attacks: Leaking Enclave Secrets via Speculative Execution. 2018."},{"key":"e_1_2_1_10_1","volume-title":"NDSS","author":"Chow S. S.","year":"2009","unstructured":"S. S. Chow , J. -H. Lee , and L. Subramanian . Two-party computation model for privacy-preserving queries over distributed databases . In NDSS , 2009 . S. S. Chow, J. -H. Lee, and L. Subramanian. Two-party computation model for privacy-preserving queries over distributed databases. In NDSS, 2009."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772867"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133967"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.84"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037739"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28416"},{"key":"e_1_2_1_19_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511721656","volume-title":"Foundations of Cryptography","author":"Goldreich O.","year":"2004","unstructured":"O. Goldreich . Foundations of Cryptography : Volume 2 , Basic Applications. Cambridge University Press , New York, NY, USA, 2004 . O. Goldreich. Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press, New York, NY, USA, 2004."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2027223.2027282"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134030"},{"key":"e_1_2_1_23_1","volume-title":"The ADAPTABLE Trial and PCORnet: shining light on a new research paradigm. Annals of internal medicine, 163(8):635--636","author":"Hernandez A. F.","year":"2015","unstructured":"A. F. Hernandez , R. L. Fleurence , and R. L. Rothman . The ADAPTABLE Trial and PCORnet: shining light on a new research paradigm. Annals of internal medicine, 163(8):635--636 , 2015 . A. F. Hernandez, R. L. Fleurence, and R. L. Rothman. The ADAPTABLE Trial and PCORnet: shining light on a new research paradigm. Annals of internal medicine, 163(8):635--636, 2015."},{"key":"e_1_2_1_24_1","first-page":"2011","article-title":"Faster secure two-party computation using garbled circuits","author":"Huang Y.","year":"2011","unstructured":"Y. Huang , D. Evans , J. Katz , and L. Malka . Faster secure two-party computation using garbled circuits . In USENIX Security 2011 , 2011 . Y. Huang, D. Evans, J. Katz, and L. Malka. Faster secure two-party computation using garbled circuits. In USENIX Security 2011, 2011.","journal-title":"USENIX Security"},{"key":"e_1_2_1_25_1","first-page":"145","volume-title":"LNCS","author":"Ishai Y.","year":"2003","unstructured":"Y. Ishai , J. Kilian , K. Nissim , and E. Petrank . Extending oblivious transfers efficiently. In CRYPTO , LNCS , pages 145 -- 161 , 2003 . Y. Ishai, J. Kilian, K. Nissim, and E. Petrank. Extending oblivious transfers efficiently. In CRYPTO, LNCS, pages 145--161, 2003."},{"key":"e_1_2_1_26_1","volume-title":"Network and Distributed System Security Symposium (NDSS","author":"Islam M. S.","year":"2012","unstructured":"M. S. Islam , M. Kuzu , and M. Kantarcioglu . Access pattern disclosure on searchable encryption: Ramification, attack and mitigation . In Network and Distributed System Security Symposium (NDSS , 2012 . M. S. Islam, M. Kuzu, and M. Kantarcioglu. Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. In Network and Distributed System Security Symposium (NDSS, 2012."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3187009.3177733"},{"key":"e_1_2_1_28_1","volume-title":"Spectre Attacks: Exploiting Speculative Execution","author":"Kocher P.","year":"2018","unstructured":"P. Kocher , D. Genkin , D. Gruss , W. Haas , M. Hamburg , M. Lipp , S. Mangard , T. Prescher , M. Schwarz , and Y. Yarom . Spectre Attacks: Exploiting Speculative Execution . 2018 . P. Kocher, D. Genkin, D. Gruss, W. Haas, M. Hamburg, M. Lipp, S. Mangard, T. Prescher, M. Schwarz, and Y. Yarom. Spectre Attacks: Exploiting Speculative Execution. 2018."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_6"},{"key":"e_1_2_1_30_1","first-page":"262","volume-title":"Round-efficient Oblivious Database Manipulation. ISC'11","author":"Laur S.","year":"2011","unstructured":"S. Laur , J. Willemson , and B. Zhang . Round-efficient Oblivious Database Manipulation. ISC'11 , pages 262 -- 277 , 2011 . S. Laur, J. Willemson, and B. Zhang. Round-efficient Oblivious Database Manipulation. ISC'11, pages 262--277, 2011."},{"key":"e_1_2_1_31_1","first-page":"549","volume-title":"USENIX Security","author":"Lipp M.","year":"2016","unstructured":"M. Lipp , D. Gruss , R. Spreitzer , C. Maurice , and S. Mangard . ARMageddon : Cache Attacks on Mobile Devices . USENIX Security , pages 549 -- 564 , 2016 . M. Lipp, D. Gruss, R. Spreitzer, C. Maurice, and S. Mangard. ARMageddon : Cache Attacks on Mobile Devices. USENIX Security, pages 549--564, 2016."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.46"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.29"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497436"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.14778\/3231751.3231769"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_8"},{"key":"e_1_2_1_38_1","first-page":"14","volume-title":"Proceedings of the 10th USENIX Symposium","author":"Narayan A.","year":"2012","unstructured":"A. Narayan and A. Haeberlen . DJoin: Differentially private join queries over distributed databases . Proceedings of the 10th USENIX Symposium , page 14 , 2012 . A. Narayan and A. Haeberlen. DJoin: Differentially private join queries over distributed databases. Proceedings of the 10th USENIX Symposium, page 14, 2012."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813651"},{"key":"e_1_2_1_40_1","unstructured":"K. Nayak X. S. Wang S. Ioannidis U. Weinsberg N. Taft and E. Shi. GraphSC : Parallel Secure Computation Made Easy.  K. Nayak X. S. Wang S. Ioannidis U. Weinsberg N. Taft and E. Shi. GraphSC : Parallel Secure Computation Made Easy."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516751"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.30"},{"key":"e_1_2_1_43_1","first-page":"14122","article-title":"Characterizing the Effects of Recurrent Clostridium Difficile Infection on Patients. IRB Protocol","author":"PCORI","year":"2015","unstructured":"PCORI . Characterizing the Effects of Recurrent Clostridium Difficile Infection on Patients. IRB Protocol , ORA : 14122 , 2015 . PCORI. Characterizing the Effects of Recurrent Clostridium Difficile Infection on Patients. IRB Protocol, ORA: 14122, 2015.","journal-title":"ORA"},{"key":"e_1_2_1_44_1","volume-title":"IRB Protocol","author":"PCORI.","year":"2015","unstructured":"PCORI. Exchanging de-identified data between hospitals for city-wide health analysis in the Chicago Area HealthLNK data repository (HDR) . IRB Protocol , 2015 . PCORI. Exchanging de-identified data between hospitals for city-wide health analysis in the Chicago Area HealthLNK data repository (HDR). IRB Protocol, 2015."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"e_1_2_1_46_1","volume-title":"Recent Results in Scalable Multi-Party Computation","author":"Saia J.","year":"2014","unstructured":"J. Saia and M. Zamani . Recent Results in Scalable Multi-Party Computation . 2014 . J. Saia and M. Zamani. Recent Results in Scalable Multi-Party Computation. 2014."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/582095.582099"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57048-8_7"},{"key":"e_1_2_1_49_1","first-page":"991","volume-title":"Proceedings of the 27th USENIX Security Symposium","author":"Bulck J. Van","year":"2018","unstructured":"J. Van Bulck , M. Minkin , O. Weisse , D. Genkin , B. Kasikci , F. Piessens , M. Silberstein , T. F. Wenisch , Y. Yarom , R. Strackx , and K. Leuven . Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution . Proceedings of the 27th USENIX Security Symposium , pages 991 -- 1008 , 2018 . J. Van Bulck, M. Minkin, O. Weisse, D. Genkin, B. Kasikci, F. Piessens, M. Silberstein, T. F. Wenisch, Y. Yarom, R. Strackx, and K. Leuven. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. Proceedings of the 27th USENIX Security Symposium, pages 991--1008, 2018."},{"key":"e_1_2_1_50_1","volume-title":"Conclave Workflow Manager for MPC","author":"Volgushev N.","year":"2018","unstructured":"N. Volgushev , M. Schwarzkopf , B. Getchell , A. Lapets , M. Varia , and A. Bestavros . Conclave Workflow Manager for MPC , 2018 . N. Volgushev, M. Schwarzkopf, B. Getchell, A. Lapets, M. Varia, and A. Bestavros. Conclave Workflow Manager for MPC, 2018."},{"key":"e_1_2_1_51_1","volume-title":"EMP-Toolkit: Efficient Multiparty Computation Toolkit. https:\/\/github.com\/emp-toolkit","author":"Wang X.","year":"2016","unstructured":"X. Wang , A. J. Malozemoff , and J. Katz . EMP-Toolkit: Efficient Multiparty Computation Toolkit. https:\/\/github.com\/emp-toolkit , 2016 . X. Wang, A. J. Malozemoff, and J. Katz. EMP-Toolkit: Efficient Multiparty Computation Toolkit. https:\/\/github.com\/emp-toolkit, 2016."},{"key":"e_1_2_1_52_1","doi-asserted-by":"crossref","unstructured":"X. Wang A. J. Malozemoff and J. Katz. Faster secure two-party computation in the single-execution setting. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10212 LNCS:399--424 2017.  X. Wang A. J. Malozemoff and J. Katz. Faster secure two-party computation in the single-execution setting. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10212 LNCS:399--424 2017.","DOI":"10.1007\/978-3-319-56617-7_14"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660314"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3193111.3193115"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.5555\/1382436.1382751"},{"key":"e_1_2_1_56_1","first-page":"283","volume-title":"Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation, NSDI'17","author":"Zheng W.","year":"2017","unstructured":"W. Zheng , A. Dave , J. G. Beekman , R. A. Popa , J. E. Gonzalez , and I. Stoica . Opaque: An oblivious and encrypted distributed analytics platform . In Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation, NSDI'17 , pages 283 -- 298 , Berkeley, CA, USA , 2017 . USENIX Association. W. Zheng, A. Dave, J. G. Beekman, R. A. Popa, J. E. Gonzalez, and I. Stoica. Opaque: An oblivious and encrypted distributed analytics platform. In Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation, NSDI'17, pages 283--298, Berkeley, CA, USA, 2017. USENIX Association."}],"container-title":["Proceedings of the VLDB Endowment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.14778\/3291264.3291274","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T10:11:47Z","timestamp":1672222307000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.14778\/3291264.3291274"}},"subtitle":["efficient SQL query processing in differentially private data federations"],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":56,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["10.14778\/3291264.3291274"],"URL":"https:\/\/doi.org\/10.14778\/3291264.3291274","relation":{},"ISSN":["2150-8097"],"issn-type":[{"value":"2150-8097","type":"print"}],"subject":[],"published":{"date-parts":[[2018,11]]}}}