On Non-cooperative Genomic Privacy

被引:13
|
作者
Humbert, Mathias [1 ]
Ayday, Erman [2 ]
Hubaux, Jean-Pierre [1 ]
Telenti, Amalio [3 ]
机构
[1] Ecole Polytech Fed Lausanne, Lab Commun & Applicat, CH-1015 Lausanne, Switzerland
[2] Bilkent Univ, Dept Comp Sci, Ankara, Turkey
[3] J Craig Venter Inst, La Jolla, CA USA
关键词
Genomic privacy; Interdependent privacy; Game theory; Altruism; ECONOMICS;
D O I
10.1007/978-3-662-47854-7_24
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the last few years, the vast progress in genome sequencing has highly increased the availability of genomic data. Today, individuals can obtain their digital genomic sequences at reasonable prices from many online service providers. Individuals can store their data on personal devices, reveal it on public online databases, or share it with third parties. Yet, it has been shown that genomic data is very privacysensitive and highly correlated between relatives. Therefore, individuals' decisions about how to manage and secure their genomic data are crucial. People of the same family might have very different opinions about (i) how to protect and (ii) whether or not to reveal their genome. We study this tension by using a game-theoretic approach. First, we model the interplay between two purely-selfish family members. We also analyze how the game evolves when relatives behave altruistically. We define closed-form Nash equilibria in different settings. We then extend the game to N players by means of multi-agent influence diagrams that enable us to efficiently compute Nash equilibria. Our results notably demonstrate that altruism does not always lead to a more efficient outcome in genomic-privacy games. They also show that, if the discrepancy between the genome-sharing benefits that players perceive is too high, they will follow opposite sharing strategies, which has a negative impact on the familial utility.
引用
收藏
页码:407 / 426
页数:20
相关论文
共 50 条
  • [1] Non-Cooperative Location Privacy
    Freudiger, Julien
    Manshaei, Mohammad Hossein
    Hubaux, Jean-Pierre
    Parkes, David C.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2013, 10 (02) : 84 - 98
  • [2] On Non-Cooperative Location Privacy: A Game-Theoretic Analysis
    Freudiger, Julien
    Manshaei, Mohammad Hossein
    Hubaux, Jean-Pierre
    Parkes, David C.
    [J]. CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 324 - 337
  • [3] Privacy-Constrained Biometric System for Non-Cooperative Users
    Jahromi, Mohammad N. S.
    Buch-Cardona, Pau
    Avots, Egils
    Nasrollahi, Kamal
    Escalera, Sergio
    Moeslund, Thomas B.
    Anbarjafari, Gholamreza
    [J]. ENTROPY, 2019, 21 (11)
  • [4] Non-Cooperative Wi-Fi Localization & its Privacy Implications
    Abedi, Ali
    Vasisht, Deepak
    [J]. PROCEEDINGS OF THE 2022 THE 28TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, ACM MOBICOM 2022, 2022, : 570 - 582
  • [5] Testing for the cartel in OPEC: non-cooperative collusion or just non-cooperative?
    Almoguera, Pedro A.
    Douglas, Christopher C.
    Herrera, Ana Maria
    [J]. OXFORD REVIEW OF ECONOMIC POLICY, 2011, 27 (01) : 144 - 168
  • [6] THE NON-COOPERATIVE PATIENT
    MORSE, D
    RUNDE, RH
    [J]. DISEASES OF THE CHEST, 1950, 18 (06): : 599 - 608
  • [7] Non-cooperative versus cooperative family
    Atsue Mizushima
    Koichi Futagami
    [J]. Journal of Economics, 2015, 114 : 43 - 62
  • [8] Cooperative versus Non-cooperative Communications
    Das Menghwar, Gordhan
    Mecklenbraeuker, Christoph F.
    [J]. 2009 2ND INTERNATIONAL CONFERENCE ON COMPUTER, CONTROL AND COMMUNICATION, 2009, : 364 - 366
  • [9] Non-cooperative versus cooperative family
    Mizushima, Atsue
    Futagami, Koichi
    [J]. JOURNAL OF ECONOMICS, 2015, 114 (01) : 43 - 62
  • [10] Combining Cooperative and Non-Cooperative Automated Negotiations
    Jen-Hsiang Chen
    Kuo-Ming Chao
    Nick Godwin
    Von-Wun Soo
    [J]. Information Systems Frontiers, 2005, 7 : 391 - 404