The Times Australia
The Times World News

.
The Times Real Estate

.

The best way to protect personal biomedical data from hackers could be to treat the problem like a game

  • Written by Zhiyu Wan, Postdoctoral Research Fellow in Biomedical Informatics, Vanderbilt University
The best way to protect personal biomedical data from hackers could be to treat the problem like a game

The Research Brief[1] is a short take about interesting academic work.

The big idea

Game theory, which tries to predict how the behavior of competitors influences the choices the other players make, can help researchers find the best ways to share biomedical data while protecting the anonymity of the people contributing the data from hackers.

Modern biomedical research, such as the National COVID Cohort Collaborative[2] and the Personal Genome Project[3], requires large amounts of data that are specific to individuals. Making detailed datasets publicly available without violating anyone’s privacy is a critical challenge for projects like these.

To do so, many programs that collect and disseminate genomic data obscure personal information in the data that could be exploited to re-identify subjects. Even so, it’s possible that residual data could be used to track down personal information from other sources, which could be correlated with the biomedical data to unearth subjects’ identities. For example, comparing someone’s DNA data with public genealogy databases like Ancestry.com can sometimes yield the person’s last name[4], which can be used along with demographic data to track down the person’s identity via online public record search engines like PeopleFinders.

Our research group, the Center for Genetic Privacy and Identity in Community Settings[5], has developed methods to help assess and mitigate privacy risks in biomedical data sharing. Our methods can be used to protect various types of data, such as personal demographics or genome sequences, from attacks on anonymity.

Our most recent work[6] uses a two-player leader-follower game to model the interactions between a data subject and a potentially malicious data user. In this model, the data subject moves first, deciding what data to share. Then the adversary moves next, deciding whether to attack based on the shared data.

A flowchart with boxes and arrows
Poorly protected genomic data attacked by someone with access to multiple data sources (red path) is the most at risk, while better-protected genomic data attacked by someone without access to other sources (blue path) is the least at risk. Vanderbilt University Medical Center, CC BY-ND[7]

Using game theory to assess approaches for sharing data involves scoring each strategy on both privacy and the value of the shared data. Strategies involve trade-offs between leaving out or obscuring parts of the data to protect identities and keeping the data as useful as possible.

The optimal strategy allows the data subject to share the most data with the least risk. Finding the optimal strategy is challenging, however, because genome sequencing data has many dimensions, which makes it impractical to exhaustively search all possible data sharing strategies.

To overcome this problem, we developed search algorithms[8] that focus attention on a small subset of strategies that are the most likely to contain the optimal strategy. We demonstrated that our method is the most effective considering both the utility of the data to the public and the data subject’s privacy.

Why it matters

The worst-case scenario, where an attacker has unlimited capabilities and no aversion to financial losses, is often extremely unlikely. However, data managers sometimes focus on these scenarios, which can lead them to overestimate the risk of re-identification and share substantially less data than they safely could.

The goal of our work is to create a systematic approach to reason about the risks that also accounts for the value of the shared data. Our game-based approach not only provides a more realistic estimate of re-identification risk, but also finds data sharing strategies that can strike the right balance between utility and privacy.

What other research is being done

Data managers use cryptographic techniques[9] to protect[10] biomedical data. Other approaches include adding noise to data[11] and hiding partial data[12].

This work builds on our previous studies, which pioneered using game theory to assess the risk of re-identification within health data[13] and protect against identity attacks on genomic data[14]. Our current study is the first to consider an attack in which the attacker can access multiple resources and combine them in a stepwise manner.

What’s next

We are now working to expand our game-based approach to model the uncertainty and rationality of a player. We are also working to account for environments that consist of multiple data providers and multiple types of data recipients.

[Science, politics, religion or just plain interesting articles: Check out The Conversation’s weekly newsletters[15].]

Read more https://theconversation.com/the-best-way-to-protect-personal-biomedical-data-from-hackers-could-be-to-treat-the-problem-like-a-game-173401

The Times Features

Exploring Hybrid Heating Systems for Modern Homes

Consequently, energy efficiency as well as sustainability are two major considerations prevalent in the current market for homeowners and businesses alike. Hence, integrated heat...

Are Dental Implants Right for You? Here’s What to Think About

Dental implants are now among the top solutions for those seeking to replace and improve their teeth. But are dental implants suitable for you? Here you will find out more about ...

Sunglasses don’t just look good – they’re good for you too. Here’s how to choose the right pair

Australians are exposed to some of the highest levels[1] of solar ultraviolet (UV) radiation in the world. While we tend to focus on avoiding UV damage to our skin, it’s impor...

How to Style the Pantone Color of the Year 2025 - Mocha Mousse

The Pantone Color of the Year never fails to set the tone for the coming year's design, fashion, and lifestyle trends. For 2025, Pantone has unveiled “Mocha Mousse,” a rich a...

How the Aussie summer has a profound effect on 'Climate Cravings’

Weather whiplash describes the rollercoaster-like shifts in weather we’ve experienced this summer —a blazing hot day one moment, followed by an unexpectedly chilly or rainy tur...

The heart research that could save fit and healthy Australians

Australians are now one step closer to being able to check that their heart is in working condition with a simple blood test. Leading scientists at the Heart Research Institu...

Times Magazine

How to Spot an iOS App Scam

If you’re designing a mobile application, your first choice is what platform to use — iOS or Android. While both have their benefits, many developers would argue that iOS is the far superior of the two. One of the most common reasons people opt ...

Vehicle Emissions Star Rating using public data to inform consumer purchasing decisions

Global open data company Link Digital has used open source technology to develop a new Vehicle Emissions  Star Rating (VESR) website for the New South Wales Government to help drivers consider the efficiency and  environmental impact of their nex...

The MCI Institute: Empowering Students to Achieve Success

As a Vocational Education and Training (VET) student, it can be difficult to know which courses to take, and where to get your qualification. Finding a reliable institution to provide quality education and training is essential to success. Th...

Choose High-Quality Front Brake Pads for Your Vehicle

Front brake pads are essential components of a vehicle's braking system. They provide the friction that is needed to reduce the speed and stop the car when the driver applies pressure to the brakes. Without them, a car would not be able to slow d...

Why Is Cyber Security Awareness Training Important?

Among the many concerning online trends observed during COVID-19, the rapid rise of cyberattacks stands out. During the global crisis, Australia experienced a significant increase in pandemic-related phishing scams, as criminals exploited widespr...

6 Reasons Why Perfume Gift Sets Make an Ideal Present

Perfume gift sets are the perfect way to show someone you care. Whether you're looking for a special treat for a loved one or want to give yourself a luxurious gift, perfume gift sets are a great choice. They come with a variety of different scents...

LayBy Shopping