TY - JOUR
T1 - Using game theory to thwart multistage privacy intrusions when sharing data
AU - Wan, Zhiyu
AU - Vorobeychik, Yevgeniy
AU - Xia, Weiyi
AU - Liu, Yongtai
AU - Wooders, Myrna
AU - Guo, Jia
AU - Yin, Zhijun
AU - Clayton, Ellen Wright
AU - Kantarcioglu, Murat
AU - Malin, Bradley A.
N1 - Publisher Copyright:
Copyright © 2021 The Authors, some rights reserved;
PY - 2021/12
Y1 - 2021/12
N2 - Person-specific biomedical data are now widely collected, but its sharing raises privacy concerns, specifically about the re-identification of seemingly anonymous records. Formal re-identification risk assessment frameworks can inform decisions about whether and how to share data; current techniques, however, focus on scenarios where the data recipients use only one resource for re-identification purposes. This is a concern because recent attacks show that adversaries can access multiple resources, combining them in a stage-wise manner, to enhance the chance of an attack’s success. In this work, we represent a re-identification game using a two-player Stackelberg game of perfect information, which can be applied to assess risk, and suggest an optimal data sharing strategy based on a privacy-utility tradeoff. We report on experiments with large-scale genomic datasets to show that, using game theoretic models accounting for adversarial capabilities to launch multistage attacks, most data can be effectively shared with low re-identification risk.
AB - Person-specific biomedical data are now widely collected, but its sharing raises privacy concerns, specifically about the re-identification of seemingly anonymous records. Formal re-identification risk assessment frameworks can inform decisions about whether and how to share data; current techniques, however, focus on scenarios where the data recipients use only one resource for re-identification purposes. This is a concern because recent attacks show that adversaries can access multiple resources, combining them in a stage-wise manner, to enhance the chance of an attack’s success. In this work, we represent a re-identification game using a two-player Stackelberg game of perfect information, which can be applied to assess risk, and suggest an optimal data sharing strategy based on a privacy-utility tradeoff. We report on experiments with large-scale genomic datasets to show that, using game theoretic models accounting for adversarial capabilities to launch multistage attacks, most data can be effectively shared with low re-identification risk.
UR - http://www.scopus.com/inward/record.url?scp=85121123240&partnerID=8YFLogxK
U2 - 10.1126/sciadv.abe9986
DO - 10.1126/sciadv.abe9986
M3 - Article
C2 - 34890225
AN - SCOPUS:85121123240
SN - 2375-2548
VL - 7
JO - Science Advances
JF - Science Advances
IS - 50
M1 - eabe9986
ER -