Using game theory to thwart multistage privacy intrusions when sharing data

Zhiyu Wan, Yevgeniy Vorobeychik, Weiyi Xia, Yongtai Liu, Myrna Wooders, Jia Guo, Zhijun Yin, Ellen Wright Clayton, Murat Kantarcioglu, Bradley A. Malin

Research output: Contribution to journalArticlepeer-review

14 Scopus citations

Abstract

Person-specific biomedical data are now widely collected, but its sharing raises privacy concerns, specifically about the re-identification of seemingly anonymous records. Formal re-identification risk assessment frameworks can inform decisions about whether and how to share data; current techniques, however, focus on scenarios where the data recipients use only one resource for re-identification purposes. This is a concern because recent attacks show that adversaries can access multiple resources, combining them in a stage-wise manner, to enhance the chance of an attack’s success. In this work, we represent a re-identification game using a two-player Stackelberg game of perfect information, which can be applied to assess risk, and suggest an optimal data sharing strategy based on a privacy-utility tradeoff. We report on experiments with large-scale genomic datasets to show that, using game theoretic models accounting for adversarial capabilities to launch multistage attacks, most data can be effectively shared with low re-identification risk.

Original languageEnglish
Article numbereabe9986
JournalScience Advances
Volume7
Issue number50
DOIs
StatePublished - Dec 2021

Fingerprint

Dive into the research topics of 'Using game theory to thwart multistage privacy intrusions when sharing data'. Together they form a unique fingerprint.

Cite this