Abstract
Over the last few years, the vast progress in genome sequencing has highly increased the availability of genomic data. Today, individuals can obtain their digital genomic sequences at reasonable prices from many online service providers. Individuals can store their data on personal devices, reveal it on public online databases, or share it with third parties. Yet, it has been shown that genomic data is very privacy-sensitive and highly correlated between relatives. Therefore, individuals’ decisions about how to manage and secure their genomic data are crucial. People of the same family might have very different opinions about (i) how to protect and (ii) whether or not to reveal their genome. We study this tension by using a game-theoretic approach. First, we model the interplay between two purely-selfish family members. We also analyze how the game evolves when relatives behave altruistically. We define closed-form Nash equilibria in different settings. We then extend the game to N players by means of multi-agent influence diagrams that enable us to efficiently compute Nash equilibria. Our results notably demonstrate that altruism does not always lead to a more efficient outcome in genomic-privacy games. They also show that, if the discrepancy between the genome-sharing benefits that players perceive is too high, they will follow opposite sharing strategies, which has a negative impact on the familial utility.
Erman Ayday—This work was carried out while the author was at EPFL.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
Each player takes into account the other players’ utility when making a decision.
- 3.
See, e.g., https://genomeprivacy.org/ for an introduction to genomics.
- 4.
See, e.g., http://opensnp.wordpress.com/2011/11/17/first-results-of-the-survey-on- sharing-genetic-information/ to understand users’ motivations for and fears about genome sharing.
- 5.
Note that an expected monetary loss would be expressed as a non-decreasing function of \(l_i\). This is left for future work.
- 6.
Note that a SNP value is encoded by the set \(\{0,1,2\}\) whose elements represent the number of minor alleles in the SNP.
- 7.
In \(G_d\), we assume that a player who does not share his SNPs will always invest in security. Note also that \(G_d\) is a special case deriving from \(G_s\).
- 8.
\(k=1\) for first-degree relatives such as parent, child, sibling; \(k=2\) for second-degree relatives such as grandparent, grandchild, uncle, aunt, niece, and so on.
- 9.
- 10.
In MAIDs, random variables are called chance variables.
- 11.
See the definition of a relevance graph in Definition 5.4 of [17].
- 12.
As in Sect. 4, LD is not used as we assume the same set \({\varOmega }\) of SNPs potentially shared by the players and targeted by the adversary.
References
Acquisti, A., Dingledine, R., Syverson, P.F.: On the economics of anonymity. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 84–102. Springer, Heidelberg (2003)
Anderson, R., Moore, T.: The economics of information security. Science 314(5799), 610–613 (2006)
Anshelevich, E., Dasgupta, A., Kleinberg, J., Tardos, E., Wexler, T., Roughgarden, T.: The price of stability for network design with fair cost allocation. SIAM J. Comput. 38(4), 1602–1623 (2008)
Biczók, G., Chia, P.H.: Interdependent privacy: let me share your data. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 338–353. Springer, Heidelberg (2013)
De Cristofaro, E., Faber, S., Gasti, P., Tsudik, G.: Genodroid: are privacy-preserving genomic tests ready for prime time? In: ACM WPES (2012)
Dey, R., Tang, C., Ross, K., Saxena, N.: Estimating age privacy leakage in online social networks. In: IEEE INFOCOM (2012)
Drmanac, R., Sparks, A.B., Callow, M.J., Halpern, A.L., Burns, N.L., Kermani, B.G., Carnevali, P., Nazarenko, I., Nilsen, G.B., Yeung, G., et al.: Human genome sequencing using unchained base reads on self-assembling dna nanoarrays. Science 327(5961), 78–81 (2010)
Erlich, Y., Narayanan, A.: Routes for breaching and protecting genetic privacy. Nat. Rev. Genet. 15(6), 409–421 (2014)
Freudiger, J., Manshaei, M.H., Hubaux, J.-P., Parkes, D.C.: On non-cooperative location privacy: a game-theoretic analysis. In: ACM CCS (2009)
Grossklags, J., Johnson, B., Christin, N.: The price of uncertainty in security games. In: Moore, T., Pym, D. (eds.) Economics of Information Security and Privacy, pp. 9–32. Springer, Heidelberg (2010)
Gymrek, M., McGuire, A.L., Golan, D., Halperin, E., Erlich, Y.: Identifying personal genomes by surname inference. Science 339(6117), 321–324 (2013)
Henne, B., Szongott, C., Smith, M.: SnapMe if you can: privacy threats of other peoples’ geo-tagged media and what we can do about it. In: ACM WiSec (2013)
Humbert, M., Ayday, E., Hubaux, J.P., Telenti, A.: Addressing the concerns of the lacks family: quantification of kin genomic privacy. In: ACM CCS (2013)
Humbert, M., Ayday, E., Hubaux, J.-P., Telenti, A.: Interdependent privacy games: the case of genomics. Technical report, EPFL-REPORT-203825 (2014)
Humbert, M., Ayday, E., Hubaux, J.-P.,Telenti, A.: Reconciling utility with privacy in genomics. In: ACM WPES (2014)
Koller, D., Milch, B.: Multi-agent influence diagrams for representing and solving games. Games Econ. Behav. 45(1), 181–221 (2003)
Koutsoupias, E., Papadimitriou, C.: Worst-case equilibria. In: Meinel, C., Tison, S. (eds.) STACS 1999. LNCS, vol. 1563, p. 404. Springer, Heidelberg (1999)
Kunreuther, H., Heal, G.: Interdependent security. J. Risk Uncertainty 26(2–3), 231–249 (2003)
Laszka, A., Felegyhazi, M., Buttyán, L.: A survey of interdependent security games. CrySyS Lab Technical report No. CRYSYS-TR-2012-11-15 (2012)
Meier, D., Oswald, Y. A., Schmid, S., Wattenhofer, R.: On the windfall of friendship: inoculation strategies on social networks. In: ACM EC (2008)
Mislove, A., Viswanath, B., Gummadi, K.P., Druschel, P.: You are who you know: Inferring user profiles in online social networks. In: ACM WSDM (2010)
Olteanu, A.-M., Huguenin, K., Shokri, R., Hubaux, J.-P.: Quantifying the effect of co-location information on location privacy. In: De Cristofaro, E., Murdoch, S.J. (eds.) PETS 2014. LNCS, vol. 8555, pp. 184–203. Springer, Heidelberg (2014)
Pu, Y., Grossklags, J.: An economic model and simulation results of app adoption decisions on networks with interdependent privacy consequences. In: Poovendran, R., Saad, W. (eds.) GameSec 2014. LNCS, vol. 8840, pp. 246–265. Springer, Heidelberg (2014)
Suarez-Tangil, G., Tapiador, J., Peris-Lopez, P., Ribagorda, A.: Evolution, detection and analysis of malware for smart devices. IEEE Commun. Surv. Tutorials PP(99), 1–27 (2013)
Sweeney, L., Abu, A., Winn, J.: Identifying participants in the personal genome project by name. SSRN 2257732 (2013)
Vratonjic, N., Huguenin, K., Bindschaedler, V., Hubaux, J.-P.: How others compromise your location privacy: the case of shared public ips at hotspots. In: De Cristofaro, E., Wright, M. (eds.) PETS 2013. LNCS, vol. 7981, pp. 123–142. Springer, Heidelberg (2013)
Acknowledgments
We would like to thank KĂ©vin Huguenin and Alexandra-Mihaela Olteanu for their helpful comments and feedback.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Humbert, M., Ayday, E., Hubaux, JP., Telenti, A. (2015). On Non-cooperative Genomic Privacy. In: Böhme, R., Okamoto, T. (eds) Financial Cryptography and Data Security. FC 2015. Lecture Notes in Computer Science(), vol 8975. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-47854-7_24
Download citation
DOI: https://doi.org/10.1007/978-3-662-47854-7_24
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-47853-0
Online ISBN: 978-3-662-47854-7
eBook Packages: Computer ScienceComputer Science (R0)