Cargando…

Using game theory to thwart multistage privacy intrusions when sharing data

Person-specific biomedical data are now widely collected, but its sharing raises privacy concerns, specifically about the re-identification of seemingly anonymous records. Formal re-identification risk assessment frameworks can inform decisions about whether and how to share data; current techniques...

Descripción completa

Detalles Bibliográficos
Autores principales: Wan, Zhiyu, Vorobeychik, Yevgeniy, Xia, Weiyi, Liu, Yongtai, Wooders, Myrna, Guo, Jia, Yin, Zhijun, Clayton, Ellen Wright, Kantarcioglu, Murat, Malin, Bradley A.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: American Association for the Advancement of Science 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8664254/
https://www.ncbi.nlm.nih.gov/pubmed/34890225
http://dx.doi.org/10.1126/sciadv.abe9986
_version_ 1784613808643244032
author Wan, Zhiyu
Vorobeychik, Yevgeniy
Xia, Weiyi
Liu, Yongtai
Wooders, Myrna
Guo, Jia
Yin, Zhijun
Clayton, Ellen Wright
Kantarcioglu, Murat
Malin, Bradley A.
author_facet Wan, Zhiyu
Vorobeychik, Yevgeniy
Xia, Weiyi
Liu, Yongtai
Wooders, Myrna
Guo, Jia
Yin, Zhijun
Clayton, Ellen Wright
Kantarcioglu, Murat
Malin, Bradley A.
author_sort Wan, Zhiyu
collection PubMed
description Person-specific biomedical data are now widely collected, but its sharing raises privacy concerns, specifically about the re-identification of seemingly anonymous records. Formal re-identification risk assessment frameworks can inform decisions about whether and how to share data; current techniques, however, focus on scenarios where the data recipients use only one resource for re-identification purposes. This is a concern because recent attacks show that adversaries can access multiple resources, combining them in a stage-wise manner, to enhance the chance of an attack’s success. In this work, we represent a re-identification game using a two-player Stackelberg game of perfect information, which can be applied to assess risk, and suggest an optimal data sharing strategy based on a privacy-utility tradeoff. We report on experiments with large-scale genomic datasets to show that, using game theoretic models accounting for adversarial capabilities to launch multistage attacks, most data can be effectively shared with low re-identification risk.
format Online
Article
Text
id pubmed-8664254
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher American Association for the Advancement of Science
record_format MEDLINE/PubMed
spelling pubmed-86642542021-12-16 Using game theory to thwart multistage privacy intrusions when sharing data Wan, Zhiyu Vorobeychik, Yevgeniy Xia, Weiyi Liu, Yongtai Wooders, Myrna Guo, Jia Yin, Zhijun Clayton, Ellen Wright Kantarcioglu, Murat Malin, Bradley A. Sci Adv Social and Interdisciplinary Sciences Person-specific biomedical data are now widely collected, but its sharing raises privacy concerns, specifically about the re-identification of seemingly anonymous records. Formal re-identification risk assessment frameworks can inform decisions about whether and how to share data; current techniques, however, focus on scenarios where the data recipients use only one resource for re-identification purposes. This is a concern because recent attacks show that adversaries can access multiple resources, combining them in a stage-wise manner, to enhance the chance of an attack’s success. In this work, we represent a re-identification game using a two-player Stackelberg game of perfect information, which can be applied to assess risk, and suggest an optimal data sharing strategy based on a privacy-utility tradeoff. We report on experiments with large-scale genomic datasets to show that, using game theoretic models accounting for adversarial capabilities to launch multistage attacks, most data can be effectively shared with low re-identification risk. American Association for the Advancement of Science 2021-12-10 /pmc/articles/PMC8664254/ /pubmed/34890225 http://dx.doi.org/10.1126/sciadv.abe9986 Text en Copyright © 2021 The Authors, some rights reserved; exclusive licensee American Association for the Advancement of Science. No claim to original U.S. Government Works. Distributed under a Creative Commons Attribution License 4.0 (CC BY). https://creativecommons.org/licenses/by/4.0/This is an open-access article distributed under the terms of the Creative Commons Attribution license (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Social and Interdisciplinary Sciences
Wan, Zhiyu
Vorobeychik, Yevgeniy
Xia, Weiyi
Liu, Yongtai
Wooders, Myrna
Guo, Jia
Yin, Zhijun
Clayton, Ellen Wright
Kantarcioglu, Murat
Malin, Bradley A.
Using game theory to thwart multistage privacy intrusions when sharing data
title Using game theory to thwart multistage privacy intrusions when sharing data
title_full Using game theory to thwart multistage privacy intrusions when sharing data
title_fullStr Using game theory to thwart multistage privacy intrusions when sharing data
title_full_unstemmed Using game theory to thwart multistage privacy intrusions when sharing data
title_short Using game theory to thwart multistage privacy intrusions when sharing data
title_sort using game theory to thwart multistage privacy intrusions when sharing data
topic Social and Interdisciplinary Sciences
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8664254/
https://www.ncbi.nlm.nih.gov/pubmed/34890225
http://dx.doi.org/10.1126/sciadv.abe9986
work_keys_str_mv AT wanzhiyu usinggametheorytothwartmultistageprivacyintrusionswhensharingdata
AT vorobeychikyevgeniy usinggametheorytothwartmultistageprivacyintrusionswhensharingdata
AT xiaweiyi usinggametheorytothwartmultistageprivacyintrusionswhensharingdata
AT liuyongtai usinggametheorytothwartmultistageprivacyintrusionswhensharingdata
AT woodersmyrna usinggametheorytothwartmultistageprivacyintrusionswhensharingdata
AT guojia usinggametheorytothwartmultistageprivacyintrusionswhensharingdata
AT yinzhijun usinggametheorytothwartmultistageprivacyintrusionswhensharingdata
AT claytonellenwright usinggametheorytothwartmultistageprivacyintrusionswhensharingdata
AT kantarcioglumurat usinggametheorytothwartmultistageprivacyintrusionswhensharingdata
AT malinbradleya usinggametheorytothwartmultistageprivacyintrusionswhensharingdata