Skip to main content

On Non-cooperative Genomic Privacy

  • Conference paper
  • First Online:
Financial Cryptography and Data Security (FC 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8975))

Included in the following conference series:

Abstract

Over the last few years, the vast progress in genome sequencing has highly increased the availability of genomic data. Today, individuals can obtain their digital genomic sequences at reasonable prices from many online service providers. Individuals can store their data on personal devices, reveal it on public online databases, or share it with third parties. Yet, it has been shown that genomic data is very privacy-sensitive and highly correlated between relatives. Therefore, individuals’ decisions about how to manage and secure their genomic data are crucial. People of the same family might have very different opinions about (i) how to protect and (ii) whether or not to reveal their genome. We study this tension by using a game-theoretic approach. First, we model the interplay between two purely-selfish family members. We also analyze how the game evolves when relatives behave altruistically. We define closed-form Nash equilibria in different settings. We then extend the game to N players by means of multi-agent influence diagrams that enable us to efficiently compute Nash equilibria. Our results notably demonstrate that altruism does not always lead to a more efficient outcome in genomic-privacy games. They also show that, if the discrepancy between the genome-sharing benefits that players perceive is too high, they will follow opposite sharing strategies, which has a negative impact on the familial utility.

Erman Ayday—This work was carried out while the author was at EPFL.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Anonymization has been proven to not be an effective technique for protecting identities of the data owners in the genomic context [12, 26].

  2. 2.

    Each player takes into account the other players’ utility when making a decision.

  3. 3.

    See, e.g., https://genomeprivacy.org/ for an introduction to genomics.

  4. 4.

    See, e.g., http://opensnp.wordpress.com/2011/11/17/first-results-of-the-survey-on- sharing-genetic-information/ to understand users’ motivations for and fears about genome sharing.

  5. 5.

    Note that an expected monetary loss would be expressed as a non-decreasing function of \(l_i\). This is left for future work.

  6. 6.

    Note that a SNP value is encoded by the set \(\{0,1,2\}\) whose elements represent the number of minor alleles in the SNP.

  7. 7.

    In \(G_d\), we assume that a player who does not share his SNPs will always invest in security. Note also that \(G_d\) is a special case deriving from \(G_s\).

  8. 8.

    \(k=1\) for first-degree relatives such as parent, child, sibling; \(k=2\) for second-degree relatives such as grandparent, grandchild, uncle, aunt, niece, and so on.

  9. 9.

    This happens for \(p_a < 0.29\) in Fig. 3a and \(p_a < 0.78\) in Fig. 3b.

  10. 10.

    In MAIDs, random variables are called chance variables.

  11. 11.

    See the definition of a relevance graph in Definition 5.4 of [17].

  12. 12.

    As in Sect. 4, LD is not used as we assume the same set \({\varOmega }\) of SNPs potentially shared by the players and targeted by the adversary.

References

  1. http://www.vox.com/2014/9/9/5975653/with-genetic-testing-i-gave-my-parents-the-gift-of-divorce-23andme

  2. Acquisti, A., Dingledine, R., Syverson, P.F.: On the economics of anonymity. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 84–102. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  3. Anderson, R., Moore, T.: The economics of information security. Science 314(5799), 610–613 (2006)

    Article  Google Scholar 

  4. Anshelevich, E., Dasgupta, A., Kleinberg, J., Tardos, E., Wexler, T., Roughgarden, T.: The price of stability for network design with fair cost allocation. SIAM J. Comput. 38(4), 1602–1623 (2008)

    Article  MathSciNet  Google Scholar 

  5. Biczók, G., Chia, P.H.: Interdependent privacy: let me share your data. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 338–353. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  6. De Cristofaro, E., Faber, S., Gasti, P., Tsudik, G.: Genodroid: are privacy-preserving genomic tests ready for prime time? In: ACM WPES (2012)

    Google Scholar 

  7. Dey, R., Tang, C., Ross, K., Saxena, N.: Estimating age privacy leakage in online social networks. In: IEEE INFOCOM (2012)

    Google Scholar 

  8. Drmanac, R., Sparks, A.B., Callow, M.J., Halpern, A.L., Burns, N.L., Kermani, B.G., Carnevali, P., Nazarenko, I., Nilsen, G.B., Yeung, G., et al.: Human genome sequencing using unchained base reads on self-assembling dna nanoarrays. Science 327(5961), 78–81 (2010)

    Article  Google Scholar 

  9. Erlich, Y., Narayanan, A.: Routes for breaching and protecting genetic privacy. Nat. Rev. Genet. 15(6), 409–421 (2014)

    Article  Google Scholar 

  10. Freudiger, J., Manshaei, M.H., Hubaux, J.-P., Parkes, D.C.: On non-cooperative location privacy: a game-theoretic analysis. In: ACM CCS (2009)

    Google Scholar 

  11. Grossklags, J., Johnson, B., Christin, N.: The price of uncertainty in security games. In: Moore, T., Pym, D. (eds.) Economics of Information Security and Privacy, pp. 9–32. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  12. Gymrek, M., McGuire, A.L., Golan, D., Halperin, E., Erlich, Y.: Identifying personal genomes by surname inference. Science 339(6117), 321–324 (2013)

    Article  Google Scholar 

  13. Henne, B., Szongott, C., Smith, M.: SnapMe if you can: privacy threats of other peoples’ geo-tagged media and what we can do about it. In: ACM WiSec (2013)

    Google Scholar 

  14. Humbert, M., Ayday, E., Hubaux, J.P., Telenti, A.: Addressing the concerns of the lacks family: quantification of kin genomic privacy. In: ACM CCS (2013)

    Google Scholar 

  15. Humbert, M., Ayday, E., Hubaux, J.-P., Telenti, A.: Interdependent privacy games: the case of genomics. Technical report, EPFL-REPORT-203825 (2014)

    Google Scholar 

  16. Humbert, M., Ayday, E., Hubaux, J.-P.,Telenti, A.: Reconciling utility with privacy in genomics. In: ACM WPES (2014)

    Google Scholar 

  17. Koller, D., Milch, B.: Multi-agent influence diagrams for representing and solving games. Games Econ. Behav. 45(1), 181–221 (2003)

    Article  MathSciNet  Google Scholar 

  18. Koutsoupias, E., Papadimitriou, C.: Worst-case equilibria. In: Meinel, C., Tison, S. (eds.) STACS 1999. LNCS, vol. 1563, p. 404. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  19. Kunreuther, H., Heal, G.: Interdependent security. J. Risk Uncertainty 26(2–3), 231–249 (2003)

    Article  Google Scholar 

  20. Laszka, A., Felegyhazi, M., Buttyán, L.: A survey of interdependent security games. CrySyS Lab Technical report No. CRYSYS-TR-2012-11-15 (2012)

    Google Scholar 

  21. Meier, D., Oswald, Y. A., Schmid, S., Wattenhofer, R.: On the windfall of friendship: inoculation strategies on social networks. In: ACM EC (2008)

    Google Scholar 

  22. Mislove, A., Viswanath, B., Gummadi, K.P., Druschel, P.: You are who you know: Inferring user profiles in online social networks. In: ACM WSDM (2010)

    Google Scholar 

  23. Olteanu, A.-M., Huguenin, K., Shokri, R., Hubaux, J.-P.: Quantifying the effect of co-location information on location privacy. In: De Cristofaro, E., Murdoch, S.J. (eds.) PETS 2014. LNCS, vol. 8555, pp. 184–203. Springer, Heidelberg (2014)

    Google Scholar 

  24. Pu, Y., Grossklags, J.: An economic model and simulation results of app adoption decisions on networks with interdependent privacy consequences. In: Poovendran, R., Saad, W. (eds.) GameSec 2014. LNCS, vol. 8840, pp. 246–265. Springer, Heidelberg (2014)

    Google Scholar 

  25. Suarez-Tangil, G., Tapiador, J., Peris-Lopez, P., Ribagorda, A.: Evolution, detection and analysis of malware for smart devices. IEEE Commun. Surv. Tutorials PP(99), 1–27 (2013)

    Google Scholar 

  26. Sweeney, L., Abu, A., Winn, J.: Identifying participants in the personal genome project by name. SSRN 2257732 (2013)

    Google Scholar 

  27. Vratonjic, N., Huguenin, K., Bindschaedler, V., Hubaux, J.-P.: How others compromise your location privacy: the case of shared public ips at hotspots. In: De Cristofaro, E., Wright, M. (eds.) PETS 2013. LNCS, vol. 7981, pp. 123–142. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

Download references

Acknowledgments

We would like to thank KĂ©vin Huguenin and Alexandra-Mihaela Olteanu for their helpful comments and feedback.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mathias Humbert .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Humbert, M., Ayday, E., Hubaux, JP., Telenti, A. (2015). On Non-cooperative Genomic Privacy. In: Böhme, R., Okamoto, T. (eds) Financial Cryptography and Data Security. FC 2015. Lecture Notes in Computer Science(), vol 8975. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-47854-7_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-47854-7_24

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-47853-0

  • Online ISBN: 978-3-662-47854-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics