A Game Theoretic Framework for Analyzing Re-Identification Risk

被引:22
|
作者
Wan, Zhiyu [1 ]
Vorobeychik, Yevgeniy [1 ]
Xia, Weiyi [1 ]
Clayton, Ellen Wright [2 ]
Kantarcioglu, Murat [3 ]
Ganta, Ranjit [3 ]
Heatherly, Raymond [4 ]
Malin, Bradley A. [4 ]
机构
[1] Vanderbilt Univ, Dept Elect Engn & Comp Sci, Nashville, TN 37235 USA
[2] Vanderbilt Univ, Ctr Biomed Eth & Soc, Nashville, TN 37235 USA
[3] Univ Texas Dallas, Dept Comp Sci, Richardson, TX 75083 USA
[4] Vanderbilt Univ, Dept Biomed Informat, Nashville, TN 37235 USA
来源
PLOS ONE | 2015年 / 10卷 / 03期
基金
美国国家科学基金会;
关键词
PRIVACY; NEIGHBORHOOD; RECORDS; SIZE;
D O I
10.1371/journal.pone.0120592
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Given the potential wealth of insights in personal data the big databases can provide, many organizations aim to share data while protecting privacy by sharing de-identified data, but are concerned because various demonstrations show such data can be re-identified. Yet these investigations focus on how attacks can be perpetrated, not the likelihood they will be realized. This paper introduces a game theoretic framework that enables a publisher to balance re-identification risk with the value of sharing data, leveraging a natural assumption that a recipient only attempts re-identification if its potential gains outweigh the costs. We apply the framework to a real case study, where the value of the data to the publisher is the actual grant funding dollar amounts from a national sponsor and the re-identification gain of the recipient is the fine paid to a regulator for violation of federal privacy rules. There are three notable findings: 1) it is possible to achieve zero risk, in that the recipient never gains from re-identification, while sharing almost as much data as the optimal solution that allows for a small amount of risk; 2) the zero-risk solution enables sharing much more data than a commonly invoked de-identification policy of the U.S. Health Insurance Portability and Accountability Act (HIPAA); and 3) a sensitivity analysis demonstrates these findings are robust to order-of-magnitude changes in player losses and gains. In combination, these findings provide support that such a framework can enable pragmatic policy decisions about de-identified data sharing.
引用
收藏
页数:24
相关论文
共 50 条
  • [1] NRF: A Naive Re-identification Framework
    Santu, Shubhra Kanti Karmaker
    Bindschadler, Vincent
    Zhai, ChengXiang
    Gunter, Carl A.
    PROCEEDINGS OF THE 2018 WORKSHOP ON PRIVACY IN THE ELECTRONIC SOCIETY (WPES'18), 2018, : 121 - 132
  • [2] A unified framework for evaluating the risk of re-identification of text de-identification tools
    Scaiano, Martin
    Middleton, Grant
    Arbuckle, Luk
    Kolhatkar, Varada
    Peyton, Liam
    Dowling, Moira
    Gipson, Debbie S.
    El Emam, Khaled
    JOURNAL OF BIOMEDICAL INFORMATICS, 2016, 63 : 174 - 183
  • [3] A Re-identification Risk-based Anonymization Framework for Data Analytics Platforms
    Silva, Hebert
    Basso, Tania
    Moraes, Regina
    Elia, Donatello
    Fiore, Sandro
    2018 14TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2018), 2018, : 101 - 106
  • [4] A game theoretic framework for analyzing milk supply chain safety and quality
    Zamiri-Noghreh, Emad
    Safarzadeh, Soroush
    Ranjbar, Mohammad
    SOCIO-ECONOMIC PLANNING SCIENCES, 2025, 99
  • [5] The risk of re-identification when analyzing electronic health records: a critical appraisal and possible solutions
    Hauswaldt, Johannes
    Demmer, Iris
    Heinemann, Stephanie
    Himmel, Wolfgang
    Hummers, Eva
    Pung, Johannes
    Schlegelmilch, Falk
    Drepper, Johannes
    ZEITSCHRIFT FUR EVIDENZ FORTBILDUNG UND QUALITAET IM GESUNDHEITSWESEN, 2019, 149 : 22 - 31
  • [6] A Neuromorphic Person Re-Identification Framework for Video Surveillance
    Nanda, Aparajita
    Sa, Pankaj Kumar
    Choudhury, Suman Kumar
    Bakshi, Sambit
    Majhi, Banshidhar
    IEEE ACCESS, 2017, 5 : 6471 - 6482
  • [7] A Multiple Component Matching Framework for Person Re-identification
    Satta, Riccardo
    Fumera, Giorgio
    Roli, Fabio
    Cristani, Marco
    Murino, Vittorio
    IMAGE ANALYSIS AND PROCESSING - ICIAP 2011, PT II, 2011, 6979 (II): : 140 - 149
  • [8] Person re-identification using salient region matching game
    Tiezhu Li
    Lijuan Sun
    Chong Han
    Jian Guo
    Multimedia Tools and Applications, 2018, 77 : 21393 - 21415
  • [9] Privacy Risk Evaluation of Re-identification of Pseudonyms
    Takeuchi, Yuma
    Kitajima, Shogo
    Fukushima, Kazuya
    Mambo, Masahiro
    2019 14TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2019), 2019, : 165 - 172
  • [10] Denseformer: A dense transformer framework for person re-identification
    Ma, Haoyan
    Li, Xiang
    Yuan, Xia
    Zhao, Chunxia
    IET COMPUTER VISION, 2023, 17 (05) : 527 - 536