The Times Australia
The Times World News

.
The Times Real Estate

.

The best way to protect personal biomedical data from hackers could be to treat the problem like a game

  • Written by Zhiyu Wan, Postdoctoral Research Fellow in Biomedical Informatics, Vanderbilt University
The best way to protect personal biomedical data from hackers could be to treat the problem like a game

The Research Brief[1] is a short take about interesting academic work.

The big idea

Game theory, which tries to predict how the behavior of competitors influences the choices the other players make, can help researchers find the best ways to share biomedical data while protecting the anonymity of the people contributing the data from hackers.

Modern biomedical research, such as the National COVID Cohort Collaborative[2] and the Personal Genome Project[3], requires large amounts of data that are specific to individuals. Making detailed datasets publicly available without violating anyone’s privacy is a critical challenge for projects like these.

To do so, many programs that collect and disseminate genomic data obscure personal information in the data that could be exploited to re-identify subjects. Even so, it’s possible that residual data could be used to track down personal information from other sources, which could be correlated with the biomedical data to unearth subjects’ identities. For example, comparing someone’s DNA data with public genealogy databases like Ancestry.com can sometimes yield the person’s last name[4], which can be used along with demographic data to track down the person’s identity via online public record search engines like PeopleFinders.

Our research group, the Center for Genetic Privacy and Identity in Community Settings[5], has developed methods to help assess and mitigate privacy risks in biomedical data sharing. Our methods can be used to protect various types of data, such as personal demographics or genome sequences, from attacks on anonymity.

Our most recent work[6] uses a two-player leader-follower game to model the interactions between a data subject and a potentially malicious data user. In this model, the data subject moves first, deciding what data to share. Then the adversary moves next, deciding whether to attack based on the shared data.

A flowchart with boxes and arrows
Poorly protected genomic data attacked by someone with access to multiple data sources (red path) is the most at risk, while better-protected genomic data attacked by someone without access to other sources (blue path) is the least at risk. Vanderbilt University Medical Center, CC BY-ND[7]

Using game theory to assess approaches for sharing data involves scoring each strategy on both privacy and the value of the shared data. Strategies involve trade-offs between leaving out or obscuring parts of the data to protect identities and keeping the data as useful as possible.

The optimal strategy allows the data subject to share the most data with the least risk. Finding the optimal strategy is challenging, however, because genome sequencing data has many dimensions, which makes it impractical to exhaustively search all possible data sharing strategies.

To overcome this problem, we developed search algorithms[8] that focus attention on a small subset of strategies that are the most likely to contain the optimal strategy. We demonstrated that our method is the most effective considering both the utility of the data to the public and the data subject’s privacy.

Why it matters

The worst-case scenario, where an attacker has unlimited capabilities and no aversion to financial losses, is often extremely unlikely. However, data managers sometimes focus on these scenarios, which can lead them to overestimate the risk of re-identification and share substantially less data than they safely could.

The goal of our work is to create a systematic approach to reason about the risks that also accounts for the value of the shared data. Our game-based approach not only provides a more realistic estimate of re-identification risk, but also finds data sharing strategies that can strike the right balance between utility and privacy.

What other research is being done

Data managers use cryptographic techniques[9] to protect[10] biomedical data. Other approaches include adding noise to data[11] and hiding partial data[12].

This work builds on our previous studies, which pioneered using game theory to assess the risk of re-identification within health data[13] and protect against identity attacks on genomic data[14]. Our current study is the first to consider an attack in which the attacker can access multiple resources and combine them in a stepwise manner.

What’s next

We are now working to expand our game-based approach to model the uncertainty and rationality of a player. We are also working to account for environments that consist of multiple data providers and multiple types of data recipients.

[Science, politics, religion or just plain interesting articles: Check out The Conversation’s weekly newsletters[15].]

Read more https://theconversation.com/the-best-way-to-protect-personal-biomedical-data-from-hackers-could-be-to-treat-the-problem-like-a-game-173401

The Times Features

How to Treat Hair Loss Without a Hair Transplant

Understanding Hair Loss Hair loss can significantly affect individuals, both physically and emotionally. Identifying the causes and types can help address the issue more effecti...

How to Find a Trustworthy Professional for Your Plumbing Needs

Nowra is an idyllic locality often referred to as the city of the Shoalhaven City Council in the South Coast region of New South Wales, Australia. This picturesque suburb feature...

How to Choose a Mattress for Back/Neck Pain and All Sleepers?

Waking up with a stiff neck or aching back can derail your entire day. If you're one of the millions struggling with chronic pain, a supportive mattress is more than a luxury – i...

What to Look for in a Professional Debt Collection Service

Often in life, overdue payments are accidental or caused by unusual circumstances. This can cause some temporary convenience, but everything carries on as usual. However, when th...

Be inspired by celeb home decor from across the globe

GET THE LOOK: INDULGE IN THE SAME INTERIOR AS YOUR FAVE CELEBS There is a reason that Denmark ranks the highest on the happiness scale worldwide, one word: Hygge. Hygge. Hygge is ...

Maximizing Space in Narrow Lot Homes: Smart Design Solutions

Urban housing markets continue to push homeowners toward smaller, narrower lots as land prices climb and city populations grow. These thin slices of real estate present unique de...

Times Magazine

The A/B Testing Revolution: How AI Optimized Landing Pages Without Human Input

A/B testing was always integral to the web-based marketing world. Was there a button that converted better? Marketing could pit one against the other and see which option worked better. This was always through human observation, and over time, as d...

Using Countdown Timers in Email: Do They Really Increase Conversions?

In a world that's always on, where marketers are attempting to entice a subscriber and get them to convert on the same screen with one email, the power of urgency is sometimes the essential element needed. One of the most popular ways to create urg...

Types of Software Consultants

In today's technology-driven world, businesses often seek the expertise of software consultants to navigate complex software needs. There are several types of software consultants, including solution architects, project managers, and user experienc...

CWU Assistive Tech Hub is Changing Lives: Win a Free Rollator Walker This Easter!

🌟 Mobility. Independence. Community. All in One. This Easter, the CWU Assistive Tech Hub is pleased to support the Banyule community by giving away a rollator walker. The giveaway will take place during the Macleod Village Easter Egg Hunt & Ma...

"Eternal Nurture" by Cara Barilla: A Timeless Collection of Wisdom and Healing

Renowned Sydney-born author and educator Cara Barilla has released her latest book, Eternal Nurture, a profound collection of inspirational quotes designed to support mindfulness, emotional healing, and personal growth. With a deep commitment to ...

How AI-Driven SEO Enhancements Can Improve Headless CMS Content Visibility

Whereas SEO (search engine optimization) is critical in the digital landscape for making connections to content, much of it is still done manually keyword research, metatags, final tweaks at publication requiring a human element that takes extensiv...

LayBy Shopping