Cargando…
Using game theory to thwart multistage privacy intrusions when sharing data
Person-specific biomedical data are now widely collected, but its sharing raises privacy concerns, specifically about the re-identification of seemingly anonymous records. Formal re-identification risk assessment frameworks can inform decisions about whether and how to share data; current techniques...
Autores principales: | , , , , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
American Association for the Advancement of Science
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8664254/ https://www.ncbi.nlm.nih.gov/pubmed/34890225 http://dx.doi.org/10.1126/sciadv.abe9986 |
_version_ | 1784613808643244032 |
---|---|
author | Wan, Zhiyu Vorobeychik, Yevgeniy Xia, Weiyi Liu, Yongtai Wooders, Myrna Guo, Jia Yin, Zhijun Clayton, Ellen Wright Kantarcioglu, Murat Malin, Bradley A. |
author_facet | Wan, Zhiyu Vorobeychik, Yevgeniy Xia, Weiyi Liu, Yongtai Wooders, Myrna Guo, Jia Yin, Zhijun Clayton, Ellen Wright Kantarcioglu, Murat Malin, Bradley A. |
author_sort | Wan, Zhiyu |
collection | PubMed |
description | Person-specific biomedical data are now widely collected, but its sharing raises privacy concerns, specifically about the re-identification of seemingly anonymous records. Formal re-identification risk assessment frameworks can inform decisions about whether and how to share data; current techniques, however, focus on scenarios where the data recipients use only one resource for re-identification purposes. This is a concern because recent attacks show that adversaries can access multiple resources, combining them in a stage-wise manner, to enhance the chance of an attack’s success. In this work, we represent a re-identification game using a two-player Stackelberg game of perfect information, which can be applied to assess risk, and suggest an optimal data sharing strategy based on a privacy-utility tradeoff. We report on experiments with large-scale genomic datasets to show that, using game theoretic models accounting for adversarial capabilities to launch multistage attacks, most data can be effectively shared with low re-identification risk. |
format | Online Article Text |
id | pubmed-8664254 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | American Association for the Advancement of Science |
record_format | MEDLINE/PubMed |
spelling | pubmed-86642542021-12-16 Using game theory to thwart multistage privacy intrusions when sharing data Wan, Zhiyu Vorobeychik, Yevgeniy Xia, Weiyi Liu, Yongtai Wooders, Myrna Guo, Jia Yin, Zhijun Clayton, Ellen Wright Kantarcioglu, Murat Malin, Bradley A. Sci Adv Social and Interdisciplinary Sciences Person-specific biomedical data are now widely collected, but its sharing raises privacy concerns, specifically about the re-identification of seemingly anonymous records. Formal re-identification risk assessment frameworks can inform decisions about whether and how to share data; current techniques, however, focus on scenarios where the data recipients use only one resource for re-identification purposes. This is a concern because recent attacks show that adversaries can access multiple resources, combining them in a stage-wise manner, to enhance the chance of an attack’s success. In this work, we represent a re-identification game using a two-player Stackelberg game of perfect information, which can be applied to assess risk, and suggest an optimal data sharing strategy based on a privacy-utility tradeoff. We report on experiments with large-scale genomic datasets to show that, using game theoretic models accounting for adversarial capabilities to launch multistage attacks, most data can be effectively shared with low re-identification risk. American Association for the Advancement of Science 2021-12-10 /pmc/articles/PMC8664254/ /pubmed/34890225 http://dx.doi.org/10.1126/sciadv.abe9986 Text en Copyright © 2021 The Authors, some rights reserved; exclusive licensee American Association for the Advancement of Science. No claim to original U.S. Government Works. Distributed under a Creative Commons Attribution License 4.0 (CC BY). https://creativecommons.org/licenses/by/4.0/This is an open-access article distributed under the terms of the Creative Commons Attribution license (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Social and Interdisciplinary Sciences Wan, Zhiyu Vorobeychik, Yevgeniy Xia, Weiyi Liu, Yongtai Wooders, Myrna Guo, Jia Yin, Zhijun Clayton, Ellen Wright Kantarcioglu, Murat Malin, Bradley A. Using game theory to thwart multistage privacy intrusions when sharing data |
title | Using game theory to thwart multistage privacy intrusions when sharing data |
title_full | Using game theory to thwart multistage privacy intrusions when sharing data |
title_fullStr | Using game theory to thwart multistage privacy intrusions when sharing data |
title_full_unstemmed | Using game theory to thwart multistage privacy intrusions when sharing data |
title_short | Using game theory to thwart multistage privacy intrusions when sharing data |
title_sort | using game theory to thwart multistage privacy intrusions when sharing data |
topic | Social and Interdisciplinary Sciences |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8664254/ https://www.ncbi.nlm.nih.gov/pubmed/34890225 http://dx.doi.org/10.1126/sciadv.abe9986 |
work_keys_str_mv | AT wanzhiyu usinggametheorytothwartmultistageprivacyintrusionswhensharingdata AT vorobeychikyevgeniy usinggametheorytothwartmultistageprivacyintrusionswhensharingdata AT xiaweiyi usinggametheorytothwartmultistageprivacyintrusionswhensharingdata AT liuyongtai usinggametheorytothwartmultistageprivacyintrusionswhensharingdata AT woodersmyrna usinggametheorytothwartmultistageprivacyintrusionswhensharingdata AT guojia usinggametheorytothwartmultistageprivacyintrusionswhensharingdata AT yinzhijun usinggametheorytothwartmultistageprivacyintrusionswhensharingdata AT claytonellenwright usinggametheorytothwartmultistageprivacyintrusionswhensharingdata AT kantarcioglumurat usinggametheorytothwartmultistageprivacyintrusionswhensharingdata AT malinbradleya usinggametheorytothwartmultistageprivacyintrusionswhensharingdata |