{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T03:05:53Z","timestamp":1774926353688,"version":"3.50.1"},"reference-count":60,"publisher":"Association for Computing Machinery (ACM)","issue":"10","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. VLDB Endow."],"published-print":{"date-parts":[[2025,6]]},"abstract":"<jats:p>Data regulations like GDPR require systems to support data erasure but leave the definition of \"erasure\" open to interpretation. This ambiguity makes compliance challenging, especially in databases where data dependencies can lead to erased data being inferred from remaining data. We formally define a precise notion of data erasure that ensures any inference about deleted data, through dependencies, remains bounded to what could have been inferred before its insertion. We design erasure mechanisms that enforce this guarantee at minimal cost. Additionally, we explore strategies to balance cost and throughput, batch multiple erasures, and proactively compute data retention times when possible. We demonstrate the practicality and scalability of our algorithms using both real and synthetic datasets.<\/jats:p>","DOI":"10.14778\/3748191.3748206","type":"journal-article","created":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T13:50:16Z","timestamp":1756993816000},"page":"3435-3448","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Meaningful Data Erasure in the Presence of Dependencies"],"prefix":"10.14778","volume":"18","author":[{"given":"Vishal","family":"Chakraborty","sequence":"first","affiliation":[{"name":"University of California (UC), Irvine"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Youri","family":"Kaminsky","sequence":"additional","affiliation":[{"name":"Hasso Plattner Institute, University of Potsdam"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sharad","family":"Mehrotra","sequence":"additional","affiliation":[{"name":"UC, Irvine"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Felix","family":"Naumann","sequence":"additional","affiliation":[{"name":"Hasso Plattner Institute, University of Potsdam"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Faisal","family":"Nawab","sequence":"additional","affiliation":[{"name":"UC, Irvine"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Primal","family":"Pappachan","sequence":"additional","affiliation":[{"name":"Portland State University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohammad","family":"Sadoghi","sequence":"additional","affiliation":[{"name":"UC, Davis"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nalini","family":"Venkatasubramanian","sequence":"additional","affiliation":[{"name":"UC, Irvine"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2025,9,4]]},"reference":[{"key":"e_1_2_1_1_1","first-page":"958","article-title":"Retrofitting GDPR Compliance onto Legacy Databases","volume":"15","author":"Agarwal Archita","year":"2022","unstructured":"Archita Agarwal, Marilyn George, Aaron Jeyaraj, and Malte Schwarzkopf. 2022. Retrofitting GDPR Compliance onto Legacy Databases. PVLDB 15, 4 (2022), 958\u2013970.","journal-title":"PVLDB"},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the 17th USENIX Symposium on Operating Systems Design and Implementation (OSDI 23)","author":"Albab Kinan Dak","year":"2023","unstructured":"Kinan Dak Albab, Ishan Sharma, Justus Adam, Benjamin Kilimnik, Aaron Jeyaraj, Raj Paul, Artem Agvanian, Leonhard Spiegelberg, and Malte Schwarzkopf. 2023. K9db: Privacy-Compliant Storage for Web Applications by Construction. In Proceedings of the 17th USENIX Symposium on Operating Systems Design and Implementation (OSDI 23). USENIX Association, Boston, MA, USA, 99\u2013116."},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of the Symposium on Principles of Database Systems (PODS). ACM","author":"Arenas Marcelo","year":"1999","unstructured":"Marcelo Arenas, Leopoldo Bertossi, and Jan Chomicki. 1999. Consistent Query Answers in Inconsistent Databases. In Proceedings of the Symposium on Principles of Database Systems (PODS). ACM, New York, NY, 68\u201379. 10.1145\/303976.303983"},{"key":"e_1_2_1_4_1","first-page":"21","article-title":"Building Deletion-Compliant Data Systems","volume":"45","author":"Athanassoulis Manos","year":"2022","unstructured":"Manos Athanassoulis, Subhadeep Sarkar, Zichen Zhu, and Dimitris Staratzis. 2022. Building Deletion-Compliant Data Systems. IEEE Data Engineering Bulletin 45, 1 (2022), 21\u201336. http:\/\/sites.computer.org\/debull\/A22mar\/p21.pdf","journal-title":"IEEE Data Engineering Bulletin"},{"key":"e_1_2_1_5_1","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1145\/1147376.1147391","article-title":"Consistent Query Answering in Databases","volume":"35","author":"Bertossi Leopoldo","year":"2006","unstructured":"Leopoldo Bertossi. 2006. Consistent Query Answering in Databases. ACM SIGMOD Record 35, 2 (2006), 68\u201376.","journal-title":"ACM SIGMOD Record"},{"key":"e_1_2_1_6_1","volume-title":"Database Repairing and Consistent Query Answering","author":"Bertossi Leopoldo","unstructured":"Leopoldo Bertossi. 2011. Database Repairing and Consistent Query Answering. Morgan & Claypool Publishers."},{"key":"e_1_2_1_7_1","first-page":"311","article-title":"Efficient denial constraint discovery with Hydra","volume":"11","author":"Bleifu\u00df Tobias","year":"2017","unstructured":"Tobias Bleifu\u00df, Sebastian Kruse, and Felix Naumann. 2017. Efficient denial constraint discovery with Hydra. PVLDB 11, 3 (2017), 311\u2013323.","journal-title":"PVLDB"},{"key":"e_1_2_1_8_1","first-page":"1","volume-title":"Proceedings of the International Conference on Management of Data (SIGMOD) 2","author":"Bleifu\u00df Tobias","year":"2024","unstructured":"Tobias Bleifu\u00df, Thorsten Papenbrock, Thomas Bl\u00e4sius, Martin Schirneck, and Felix Naumann. 2024. Discovering Functional Dependencies through Hitting Set Enumeration. Proceedings of the International Conference on Management of Data (SIGMOD) 2, 1 (2024), 1\u201324."},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of the IEEE International Conference on Data Engineering (ICDE). IEEE, 746\u2013755","author":"Bohannon Philip","year":"2007","unstructured":"Philip Bohannon, Wenfei Fan, Floris Geerts, Xibei Jia, and Anastasios Kementsietsidis. 2007. Conditional Functional Dependencies for Data Cleaning. In Proceedings of the IEEE International Conference on Data Engineering (ICDE). IEEE, 746\u2013755."},{"key":"e_1_2_1_10_1","volume-title":"Machine Unlearning. In Proceedings of the 2021 IEEE Symposium on Security and Privacy (S&P). IEEE, 141\u2013159","author":"Bourtoule Lucas","year":"2021","unstructured":"Lucas Bourtoule, Varun Chandrasekaran, Christopher A. Choquette-Choo, Hengrui Jia, Adelin Travers, Baiwu Zhang, David Lie, and Nicolas Papernot. 2021. Machine Unlearning. In Proceedings of the 2021 IEEE Symposium on Security and Privacy (S&P). IEEE, 141\u2013159."},{"key":"e_1_2_1_11_1","unstructured":"Brazil. 2018. Lei Geral de Prote\u00e7\u00e3o de Dados (LGPD) - Article 18(IV). https:\/\/www.gov.br\/cidadania\/pt-br\/acesso-a-informacao\/lgpd Brazilian Federal Law No. 13 709\/2018. Last accessed on 2025-01-10."},{"key":"e_1_2_1_12_1","unstructured":"California. 2018. Title 1.81.5. California Consumer Privacy Act of 2018 [1798.100-1798.199.100]. California Legislative Information. https:\/\/leginfo.legislature.ca.gov\/faces\/codes_displayText.xhtml?division=3.&part=4.&lawCode=CIV&title=1.81.5 California Civil Code. Last accessed on 2025-01-10."},{"key":"e_1_2_1_13_1","volume-title":"Personal Information Protection and Electronic Documents Act (S.C","year":"2000","unstructured":"Canada. 2000. Personal Information Protection and Electronic Documents Act (S.C. 2000, c. 5). https:\/\/laws-lois.justice.gc.ca\/ENG\/ACTS\/P-8.6\/index.html Justice Laws Website. Last accessed on 2025-01-10."},{"key":"e_1_2_1_14_1","volume-title":"Proceedings of the 2022 IEEE Symposium on Security and Privacy (S&P). IEEE","author":"Carlini Nicholas","year":"2022","unstructured":"Nicholas Carlini, Steve Chien, Milad Nasr, Shuang Song, Andreas Terzis, and Florian Tramer. 2022. Membership Inference Attacks from First Principles. In Proceedings of the 2022 IEEE Symposium on Security and Privacy (S&P). IEEE, 1897\u20131914."},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the International Conference on Extending Database Technology (EDBT). OpenProceedings","author":"Chakraborty Vishal","year":"2024","unstructured":"Vishal Chakraborty, Stacy Ann-Elvy, Sharad Mehrotra, Faisal Nawab, Mohammad Sadoghi, Shantanu Sharma, Nalini Venkatsubhramanian, and Farhan Saeed. 2024. Data-CASE: Grounding Data Regulations for Compliant Data Processing Systems. In Proceedings of the International Conference on Extending Database Technology (EDBT). OpenProceedings, Paestum, Italy, 108\u2013115. https:\/\/openproceedings.org\/2024\/conf\/edbt\/Camera_EDBT_Data_CASE_4.pdf"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1561\/1900000006"},{"key":"e_1_2_1_17_1","first-page":"1","article-title":"Minimal-Change Integrity Maintenance Using Tuple Deletions","volume":"197","author":"Chomicki Jan","year":"2005","unstructured":"Jan Chomicki and Jerzy Marcinkowski. 2005. Minimal-Change Integrity Maintenance Using Tuple Deletions. Information and Computation 197, 1\u20132 (2005), 90\u2013121.","journal-title":"Information and Computation"},{"key":"e_1_2_1_18_1","volume-title":"Proceedings of the 29th USENIX Conference on Security Symposium (SEC). USENIX, USA, Article 60","author":"Cohn-Gordon Katriel","year":"2020","unstructured":"Katriel Cohn-Gordon, Georgios Damaskinos, Divino Neto, Joshi Cordova, Beno\u00eet Reitz, Benjamin Strahs, Daniel Obenshain, Paul Pearce, and Ioannis Papagiannis. 2020. DELF: Safeguarding Deletion Correctness in Online Social Networks. In Proceedings of the 29th USENIX Conference on Security Symposium (SEC). USENIX, USA, Article 60, 18 pages."},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of the International Conference on Management of Data (SIGMOD). ACM","author":"Dallachiesa Michele","year":"2013","unstructured":"Michele Dallachiesa, Amr Ebaid, Ahmed Eldawy, Ahmed Elmagarmid, Ihab F. Ilyas, Mourad Ouzzani, and Nan Tang. 2013. NADEEF: A Commodity Data Cleaning System. In Proceedings of the International Conference on Management of Data (SIGMOD). ACM, New York, NY, USA, 541\u2013552."},{"key":"e_1_2_1_20_1","unstructured":"Ghana Data Protection Commission. 2012. Data Protection Act. https:\/\/nca.org.gh\/wp-content\/uploads\/2020\/09\/Data-Protection-Act-2012.pdf Accessed: 2025-04-02."},{"key":"e_1_2_1_21_1","unstructured":"enryu43. 2023. Twitter 100 Million Tweets Dataset. https:\/\/huggingface.co\/datasets\/enryu43\/twitter100m_tweets Accessed: 2025-01-25."},{"key":"e_1_2_1_22_1","unstructured":"European Parliament and Council of the European Union. 2016. Regulation (EU) 2016\/679 (General Data Protection Regulation). https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj Official Journal of the European Union. Last accessed on 2025-01-10."},{"key":"e_1_2_1_23_1","unstructured":"European Parliament and Council of the European Union. 2024. Regulation (EU) 2024\/1689: Artificial Intelligence Act. https:\/\/eur-lex.europa.eu\/eli\/reg\/2024\/1689\/oj\/eng Official Journal of the European Union. Last accessed on 2025-01-10."},{"key":"e_1_2_1_24_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2877202","article-title":"Declarative Cleaning of Inconsistencies in Information Extraction","volume":"41","author":"Fagin Ronald","year":"2016","unstructured":"Ronald Fagin, Benny Kimelfeld, Frederick Reiss, and Stijn Vansummeren. 2016. Declarative Cleaning of Inconsistencies in Information Extraction. ACM Transactions on Database Systems (TODS) 41, 1 (2016), 1\u201344.","journal-title":"ACM Transactions on Database Systems (TODS)"},{"key":"e_1_2_1_25_1","first-page":"1","article-title":"Conditional functional dependencies for capturing data inconsistencies","volume":"33","author":"Fan Wenfei","year":"2008","unstructured":"Wenfei Fan, Floris Geerts, Xibei Jia, and Anastasios Kementsietsidis. 2008. Conditional functional dependencies for capturing data inconsistencies. ACM Transactions on Database Systems (TODS) 33, 2 (2008), 1\u201348.","journal-title":"ACM Transactions on Database Systems (TODS)"},{"key":"e_1_2_1_26_1","volume-title":"Proceedings of the International Conference on Very Large Databases (VLDB)","author":"Galhardas Helena","year":"2001","unstructured":"Helena Galhardas, Daniela Florescu, Dennis Shasha, Eric Simon, and Cristian-Augustin Saita. 2001. Declarative Data Cleaning: Language, Model, and Algorithms. In Proceedings of the International Conference on Very Large Databases (VLDB) (2013). Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 371\u2013380."},{"key":"e_1_2_1_27_1","volume-title":"Database Systems: The Complete Book","author":"Garcia-Molina Hector","year":"2009","unstructured":"Hector Garcia-Molina, Jeffrey D. Ullman, and Jennifer Widom. 2009. Database Systems: The Complete Book (2nd ed.). Pearson Education.","edition":"2"},{"key":"e_1_2_1_28_1","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/0890-5401(91)90077-F","article-title":"Axioms and algorithms for inferences involving probabilistic independence","volume":"91","author":"Geiger Dan","year":"1991","unstructured":"Dan Geiger, Azaria Paz, and Judea Pearl. 1991. Axioms and algorithms for inferences involving probabilistic independence. Information and Computation 91, 1 (1991), 128\u2013141.","journal-title":"Information and Computation"},{"key":"e_1_2_1_29_1","volume-title":"Proceedings of the International Conference on Management of Data (SIGMOD). ACM","author":"Gilad Amir","year":"2020","unstructured":"Amir Gilad, Daniel Deutch, and Sudeepa Roy. 2020. On Multiple Semantics for Declarative Database Repairs. In Proceedings of the International Conference on Management of Data (SIGMOD). ACM, New York, NY, USA, 817\u2013831."},{"key":"e_1_2_1_30_1","volume-title":"Provenance Semirings. In Proceedings of the Twenty-Sixth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS '07)","author":"Green Todd J.","year":"2007","unstructured":"Todd J. Green, Grigoris Karvounarakis, Zachary G. Ives, and Val Tannen. 2007. Provenance Semirings. In Proceedings of the Twenty-Sixth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS '07) (Beijing, China). ACM, New York, NY, USA, 31\u201340."},{"key":"e_1_2_1_31_1","volume-title":"Proceedings of the International Conference on Very Large Databases (VLDB). ACM","author":"Green Todd J.","year":"2007","unstructured":"Todd J. Green, Grigoris Karvounarakis, Zachary G. Ives, and Val Tannen. 2007. Update Exchange with Mappings and Provenance. In Proceedings of the International Conference on Very Large Databases (VLDB). ACM, New York, NY, USA, 675\u2013686."},{"key":"e_1_2_1_32_1","doi-asserted-by":"crossref","first-page":"1807","DOI":"10.14778\/3407790.3407791","article-title":"Smart-Bench: a benchmark for data management in smart spaces","volume":"13","author":"Gupta Peeyush","year":"2020","unstructured":"Peeyush Gupta, Michael J Carey, Sharad Mehrotra, and oberto Yus. 2020. Smart-Bench: a benchmark for data management in smart spaces. Proceedings of the VLDB Endowment 13, 12 (2020), 1807\u20131820.","journal-title":"Proceedings of the VLDB Endowment"},{"key":"e_1_2_1_33_1","volume-title":"Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD). ACM","author":"Ilyas Ihab F.","year":"2004","unstructured":"Ihab F. Ilyas, Volker Markl, Peter Haas, Paul Brown, and Ashraf Aboulnaga. 2004. CORDS: automatic discovery of correlations and soft functional dependencies. In Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD). ACM, New York, NY, USA, 647\u2013658."},{"key":"e_1_2_1_34_1","first-page":"1","volume-title":"Proceedings of the International Conference on Management of Data (SIGMOD) 1","author":"Kaminsky Youri","year":"2023","unstructured":"Youri Kaminsky, Eduardo HM Pena, and Felix Naumann. 2023. Discovering similarity inclusion dependencies. Proceedings of the International Conference on Management of Data (SIGMOD) 1, 1 (2023), 1\u201324."},{"key":"e_1_2_1_35_1","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1016\/j.jcss.2007.06.019","article-title":"Vertex cover might be hard to approximate to within 2-\u03b5","volume":"74","author":"Khot Subhash","year":"2008","unstructured":"Subhash Khot and Oded Regev. 2008. Vertex cover might be hard to approximate to within 2-\u03b5. J. Comput. System Sci. 74, 3 (2008), 335\u2013349.","journal-title":"J. Comput. System Sci."},{"key":"e_1_2_1_36_1","volume-title":"HotCRP: Conference Review System. https:\/\/github.com\/kohler\/hotcrp Accessed: 2025-01-25","author":"Kohler Eddie","year":"2024","unstructured":"Eddie Kohler. 2024. HotCRP: Conference Review System. https:\/\/github.com\/kohler\/hotcrp Accessed: 2025-01-25."},{"key":"e_1_2_1_37_1","volume-title":"Proceedings of the IEEE International Conference on Blockchain (Blockchain). IEEE","author":"Kuperberg Michael","year":"2020","unstructured":"Michael Kuperberg. 2020. Towards Enabling Deletion in Append-Only Blockchains to Support Data Growth Management and GDPR Compliance. In Proceedings of the IEEE International Conference on Blockchain (Blockchain). IEEE, Piscataway, NJ, USA, 393\u2013400."},{"key":"e_1_2_1_38_1","volume-title":"Proceedings of the International Conference on Database Theory (ICDT). Springer","author":"Lopatenko Andrei","year":"2007","unstructured":"Andrei Lopatenko and Leopoldo Bertossi. 2007. Complexity of Consistent Query Answering in Databases under Cardinality-Based and Incremental Repair Semantics. In Proceedings of the International Conference on Database Theory (ICDT). Springer, Berlin, Heidelberg, 179\u2013193."},{"key":"e_1_2_1_39_1","volume-title":"Proceedings of the International Conference on Management of Data (SIGMOD). ACM","author":"Maier David","year":"2020","unstructured":"David Maier, Rachel Pottinger, AnHai Doan, Wang-Chiew Tan, Abdussalam Alawini, Hung Q Ngo, Babak Salimi, Harsh Parikh, Moe Kayali, Lise Getoor, Sudeepa Roy, and Dan Suciu. 2020. Causal Relational Learning. In Proceedings of the International Conference on Management of Data (SIGMOD). ACM, New York, NY, USA, 241\u2013256. 10.1145\/3318464.3389759"},{"key":"e_1_2_1_40_1","unstructured":"Meta. 2017. Permanently Delete Your Facebook Account. https:\/\/www.facebook.com\/help\/224562897555674. Accessed: 2025-01-14."},{"key":"e_1_2_1_41_1","unstructured":"MySQL. 2019. MySQL Triggers. https:\/\/dev.mysql.com\/doc\/refman\/9.0\/en\/trigger-syntax.html. Accessed:2025-01-10."},{"key":"e_1_2_1_42_1","first-page":"684","article-title":"Fast Algorithms for Denial Constraint Discovery","volume":"16","author":"Pena Eduardo HM","year":"2022","unstructured":"Eduardo HM Pena, Fabio Porto, and Felix Naumann. 2022. Fast Algorithms for Denial Constraint Discovery. PVLDB 16, 4 (2022), 684\u2013696.","journal-title":"PVLDB"},{"key":"e_1_2_1_43_1","first-page":"266","article-title":"Discovery of Approximate (and Exact) Denial Constraints","volume":"13","author":"Pena Eduardo H. M.","year":"2019","unstructured":"Eduardo H. M. Pena, Eduardo C. de Almeida, and Felix Naumann. 2019. Discovery of Approximate (and Exact) Denial Constraints. PVLDB 13, 3 (2019), 266\u2013278.","journal-title":"PVLDB"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.14778\/3137628.3137631"},{"key":"e_1_2_1_45_1","doi-asserted-by":"crossref","first-page":"437","DOI":"10.56553\/popets-2022-0080","article-title":"Leave no data behind-empirical insights into data erasure from online services","volume":"3","author":"Rupp Eduard","year":"2022","unstructured":"Eduard Rupp, Emmanuel Syrmoudis, and Jens Grossklags. 2022. Leave no data behind-empirical insights into data erasure from online services. Proceedings on Privacy Enhancing Technologies 3 (2022), 437\u2013455.","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"e_1_2_1_46_1","volume-title":"Proceedings of the International Conference on Extending Database Technology (EDBT). OpenProceedings, Online, 418\u2013429","author":"Sarkar Subhadeep","year":"2022","unstructured":"Subhadeep Sarkar and Manos Athanassoulis. 2022. Query Language Support for Timely Data Deletion. In Proceedings of the International Conference on Extending Database Technology (EDBT). OpenProceedings, Online, 418\u2013429. 10.48786\/edbt.2022.35"},{"key":"e_1_2_1_47_1","volume-title":"Proceedings of the 11th IEEE International Conference on Internet of Things (iThings","author":"Sarkar Subhadeep","year":"2018","unstructured":"Subhadeep Sarkar, Jean-Pierre Ban\u00e2tre, Louis Rilling, and Christine Morin. 2018. Towards Enforcement of the EU GDPR: Enabling Data Erasure. In Proceedings of the 11th IEEE International Conference on Internet of Things (iThings 2018). IEEE, Halifax, Canada, 1\u20138."},{"key":"e_1_2_1_48_1","volume-title":"Proceedings of the International Conference on Management of Data (SIGMOD). ACM","author":"Sarkar Subhadeep","year":"2020","unstructured":"Subhadeep Sarkar, Tarikul Islam Papon, Dimitris Staratzis, and Manos Athanassoulis. 2020. Lethe: A Tunable Delete-Aware LSM Engine. In Proceedings of the International Conference on Management of Data (SIGMOD). ACM, New York, NY, USA, 893\u2013908. 10.1145\/3318464.3389757"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.14778\/3476249.3476274"},{"key":"e_1_2_1_50_1","first-page":"7","article-title":"Understanding and Benchmarking the Impact of GDPR on Database Systems","volume":"13","author":"Shastri Supreeth","year":"2020","unstructured":"Supreeth Shastri, Vinay Banakar, Melissa Wasserman, Arun Kumar, and Vijay Chidambaram. 2020. Understanding and Benchmarking the Impact of GDPR on Database Systems. Proceedings of the VLDB Endowment (PVLDB) 13, 7 (mar 2020), 1064\u20131077.","journal-title":"Proceedings of the VLDB Endowment (PVLDB)"},{"key":"e_1_2_1_51_1","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1145\/319540.319561","article-title":"The functional data model and the data languages DAPLEX","volume":"6","author":"Shipman David W","year":"1981","unstructured":"David W Shipman. 1981. The functional data model and the data languages DAPLEX. ACM Transactions on Database Systems (TODS) 6, 1 (1981), 140\u2013173.","journal-title":"ACM Transactions on Database Systems (TODS)"},{"key":"e_1_2_1_52_1","unstructured":"Singapore. 2012. Personal Data Protection Act 2012 (PDPA) - Part IV: Retention Limitation Obligation. https:\/\/sso.agc.gov.sg\/Act\/PDPA2012 Singapore Statutes Online. Last accessed on 2025-01-10."},{"key":"e_1_2_1_53_1","unstructured":"Slawomir Staworko. 2007. Declarative Inconsistency Handling in Relational and Semi-Structured Databases. PhD Thesis. State University of New York at Buffalo. https:\/\/cse.buffalo.edu\/tech-reports\/2007-11.pdf"},{"key":"e_1_2_1_54_1","first-page":"17","article-title":"TPC-H Benchmark Specification","volume":"2","author":"Transaction Processing Performance Council","year":"2021","unstructured":"Transaction Processing Performance Council. 2021. TPC-H Benchmark Specification, Version 2.17.3. Technical Report. Transaction Processing Performance Council. http:\/\/www.tpc.org\/tpch\/","journal-title":"Version"},{"key":"e_1_2_1_55_1","volume-title":"Proceedings of the International Provenance and Annotation Workshop (IPAW). Springer, 45\u201357","author":"Ujcich Benjamin E.","unstructured":"Benjamin E. Ujcich, Adam Bates, and William H. Sanders. 2018. A Provenance Model for the European Union General Data Protection Regulation. In Proceedings of the International Provenance and Annotation Workshop (IPAW). Springer, 45\u201357."},{"key":"e_1_2_1_56_1","unstructured":"United States. 2003. HIPAA Security Rule - 45 CFR \u00a7164.310(d)(2)(i). https:\/\/www.ecfr.gov\/current\/title-45\/subtitle-A\/subchapter-C\/part-164\/subpart-C\/section-164.310 U.S. Code of Federal Regulations. Last accessed on 2025-01-10."},{"key":"e_1_2_1_57_1","unstructured":"Virginia. 2021. SB 1392: Consumer Data Protection Act (Virginia). https:\/\/lis.virginia.gov\/cgi-bin\/legp604.exe?211+sum+SB1392 Virginia General Assembly. Last accessed on 2025-01-10."},{"key":"e_1_2_1_58_1","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI)","author":"Wang Yang","year":"2014","unstructured":"Yang Wang, Pedro Giovanni Leon, Alessandro Acquisti, Lorrie Faith Cranor, Alain Forget, Norman Sadeh, Norman Sadeh, Lorrie Faith Cranor, Alain Forget, and Norman Sadeh. 2014. A Field Trial of Privacy Nudges for Facebook. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI) (Toronto, Ontario, Canada) (CHI). ACM, New York, NY, USA, 2367\u20132376."},{"key":"e_1_2_1_59_1","unstructured":"WhatsApp. 2020. About Disappearing Messages. https:\/\/faq.whatsapp.com\/673193694148537\/?helpref=uf_share Last accessed on 2025-01-10."},{"key":"e_1_2_1_60_1","doi-asserted-by":"crossref","first-page":"4732","DOI":"10.1109\/TIFS.2023.3297905","article-title":"FedRecovery: Differentially Private Machine Unlearning for Federated Learning Frameworks","volume":"18","author":"Zhang Lefeng","year":"2023","unstructured":"Lefeng Zhang, Tianqing Zhu, Haibin Zhang, Ping Xiong, and Wanlei Zhou. 2023. FedRecovery: Differentially Private Machine Unlearning for Federated Learning Frameworks. IEEE Transactions on Information Forensics and Security 18 (2023), 4732\u20134746.","journal-title":"IEEE Transactions on Information Forensics and Security"}],"container-title":["Proceedings of the VLDB Endowment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.14778\/3748191.3748206","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T13:53:56Z","timestamp":1756994036000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.14778\/3748191.3748206"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6]]},"references-count":60,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["10.14778\/3748191.3748206"],"URL":"https:\/\/doi.org\/10.14778\/3748191.3748206","relation":{},"ISSN":["2150-8097"],"issn-type":[{"value":"2150-8097","type":"print"}],"subject":[],"published":{"date-parts":[[2025,6]]},"assertion":[{"value":"2025-09-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}