{ "access": { "embargo": { "active": false, "reason": null }, "files": "public", "record": "public", "status": "open" }, "created": "2020-01-14T21:25:44.788932+00:00", "custom_fields": { "journal:journal": { "issue": "1", "title": "Journal of Privacy and Confidentiality", "volume": "10" } }, "deletion_status": { "is_deleted": false, "status": "P" }, "files": { "count": 1, "enabled": true, "entries": { "journalprivacyconfidentiality/Linear-Program-Reconstruction-v20200114.zip": { "checksum": "md5:c17622e96539900677d291b38ab4c29d", "ext": "zip", "id": "91b98e88-dd3d-4b50-967d-9ae0d5062c77", "key": "journalprivacyconfidentiality/Linear-Program-Reconstruction-v20200114.zip", "metadata": null, "mimetype": "application/zip", "size": 1282102 } }, "order": [], "total_bytes": 1282102 }, "id": "3608315", "is_draft": false, "is_published": true, "links": { "access": "https://zenodo.org/api/records/3608315/access", "access_links": "https://zenodo.org/api/records/3608315/access/links", "access_request": "https://zenodo.org/api/records/3608315/access/request", "access_users": "https://zenodo.org/api/records/3608315/access/users", "archive": "https://zenodo.org/api/records/3608315/files-archive", "archive_media": "https://zenodo.org/api/records/3608315/media-files-archive", "communities": "https://zenodo.org/api/records/3608315/communities", "communities-suggestions": "https://zenodo.org/api/records/3608315/communities-suggestions", "doi": "https://doi.org/10.5281/zenodo.3608315", "draft": "https://zenodo.org/api/records/3608315/draft", "files": "https://zenodo.org/api/records/3608315/files", "latest": "https://zenodo.org/api/records/3608315/versions/latest", "latest_html": "https://zenodo.org/records/3608315/latest", "media_files": "https://zenodo.org/api/records/3608315/media-files", "parent": "https://zenodo.org/api/records/3608314", "parent_doi": "https://zenodo.org/doi/10.5281/zenodo.3608314", "parent_html": "https://zenodo.org/records/3608314", "requests": "https://zenodo.org/api/records/3608315/requests", "reserve_doi": "https://zenodo.org/api/records/3608315/draft/pids/doi", "self": "https://zenodo.org/api/records/3608315", "self_doi": "https://zenodo.org/doi/10.5281/zenodo.3608315", "self_html": "https://zenodo.org/records/3608315", "self_iiif_manifest": "https://zenodo.org/api/iiif/record:3608315/manifest", "self_iiif_sequence": "https://zenodo.org/api/iiif/record:3608315/sequence/default", "versions": "https://zenodo.org/api/records/3608315/versions" }, "media_files": { "count": 0, "enabled": false, "entries": {}, "order": [], "total_bytes": 0 }, "metadata": { "additional_descriptions": [ { "description": "NSF Graduate Research Fellowship, Facebook Fellowship, NSF Project CNS-1413920", "type": { "id": "notes", "title": { "de": "Anmerkungen", "en": "Notes" } } } ], "creators": [ { "affiliations": [ { "name": "Boston University" } ], "person_or_org": { "family_name": "Aloni Cohen", "name": "Aloni Cohen", "type": "personal" } } ], "description": "
We briefly report on a successful linear program reconstruction attack performed on a production statistical queries system and using a real dataset. The attack was deployed in test environment in the course of the Aircloak Challenge bug bounty program and is based on the reconstruction algorithm of Dwork, McSherry, and Talwar. We empirically evaluate the effectiveness of the algorithm and a related algorithm by Dinur and Nissim with various dataset sizes, error rates, and numbers of queries in a Gaussian noise setting.
\n\nThe files in ./data were generated using the banking.psql database available at https://download.aircloak.com/ (last retrieved 12 Dec 2018). The best places to get started ./code/attack_script.m and ./code/simulated_experiment_script.m.
", "funding": [ { "award": { "id": "021nxhr62::1413920", "number": "1413920", "program": "CISE/OAD", "title": { "en": "TWC: TTP Option: Frontier: Collaborative: MACS: A Modular Approach to Cloud Security" } }, "funder": { "id": "021nxhr62", "name": "National Science Foundation" } } ], "publication_date": "2020-01-14", "publisher": "Zenodo", "related_identifiers": [ { "identifier": "https://github.com/journalprivacyconfidentiality/Linear-Program-Reconstruction/tree/v20200114", "relation_type": { "id": "issupplementto", "title": { "de": "Erg\u00e4nzt", "en": "Is supplement to" } }, "scheme": "url" }, { "identifier": "https://github.com/a785236/Linear-Program-Reconstruction", "relation_type": { "id": "issupplementto", "title": { "de": "Erg\u00e4nzt", "en": "Is supplement to" } }, "scheme": "url" }, { "identifier": "10.29012/jpc.711", "relation_type": { "id": "iscitedby", "title": { "de": "Wird zitiert von", "en": "Is cited by" } }, "resource_type": { "id": "publication-article", "title": { "de": "Zeitschriftenartikel", "en": "Journal article" } }, "scheme": "doi" }, { "identifier": "10.29012/jpc.711", "relation_type": { "id": "issupplementto", "title": { "de": "Erg\u00e4nzt", "en": "Is supplement to" } }, "resource_type": { "id": "publication-article", "title": { "de": "Zeitschriftenartikel", "en": "Journal article" } }, "scheme": "doi" } ], "resource_type": { "id": "software", "title": { "de": "Software", "en": "Software" } }, "rights": [ { "description": { "en": "A short and simple permissive license with conditions only requiring preservation of copyright and license notices. Licensed works, modifications, and larger works may be distributed under different terms and without source code." }, "id": "mit", "props": { "scheme": "spdx", "url": "https://opensource.org/licenses/MIT" }, "title": { "en": "MIT License" } } ], "title": "Code and data for Linear Program Reconstruction in Practice", "version": "v20200114" }, "parent": { "access": { "owned_by": { "user": 471279 } }, "communities": { "default": "c977e737-396b-4e68-817c-adc110b577d7", "entries": [ { "access": { "member_policy": "open", "members_visibility": "public", "record_policy": "open", "review_policy": "open", "visibility": "public" }, "children": { "allow": false }, "created": "2019-08-20T01:18:17.737852+00:00", "custom_fields": {}, "deletion_status": { "is_deleted": false, "status": "P" }, "id": "c977e737-396b-4e68-817c-adc110b577d7", "links": {}, "metadata": { "curation_policy": "We accept archives for supplements (data, code) to articles published in the Journal of Privacy and Confidentiality.
", "description": "The Journal of Privacy and Confidentiality is an open-access multi-disciplinary journal whose purpose is to facilitate the coalescence of research methodologies and activities in the areas of privacy, confidentiality, and disclosure limitation.", "page": "The Journal of Privacy and Confidentiality is an open-access multi-disciplinary journal whose purpose is to facilitate the coalescence of research methodologies and activities in the areas of privacy, confidentiality, and disclosure limitation. The JPC seeks to publish a wide range of research and review papers, not only from academia, but also from government (especially official statistical agencies) and industry, and to serve as a forum for exchange of views, discussion, and news.
", "title": "Journal of Privacy and Confidentiality", "type": { "id": "organization" }, "website": "https://journalprivacyconfidentiality.org/" }, "revision_id": 1, "slug": "jpc", "updated": "2023-10-21T23:52:56.280664+00:00" } ], "ids": [ "c977e737-396b-4e68-817c-adc110b577d7" ] }, "id": "3608314", "pids": { "doi": { "client": "datacite", "identifier": "10.5281/zenodo.3608314", "provider": "datacite" } } }, "pids": { "doi": { "client": "datacite", "identifier": "10.5281/zenodo.3608315", "provider": "datacite" }, "oai": { "identifier": "oai:zenodo.org:3608315", "provider": "oai" } }, "revision_id": 5, "stats": { "all_versions": { "data_volume": 47437774.0, "downloads": 37, "unique_downloads": 36, "unique_views": 835, "views": 933 }, "this_version": { "data_volume": 47437774.0, "downloads": 37, "unique_downloads": 36, "unique_views": 826, "views": 923 } }, "status": "published", "updated": "2023-01-09T15:07:37.665264+00:00", "versions": { "index": 1, "is_latest": true } }