On non-cooperative genomic privacy
dc.citation.epage | 426 | en_US |
dc.citation.spage | 407 | en_US |
dc.citation.volumeNumber | 8975 | en_US |
dc.contributor.author | Humbert, M. | en_US |
dc.contributor.author | Ayday, Erman | en_US |
dc.contributor.author | Hubaux J.-P. | en_US |
dc.contributor.author | Telenti, A. | en_US |
dc.coverage.spatial | San Juan, Puerto Rico | en_US |
dc.date.accessioned | 2016-02-08T12:19:29Z | |
dc.date.available | 2016-02-08T12:19:29Z | |
dc.date.issued | 2015 | en_US |
dc.department | Department of Computer Technology and Information Systems | en_US |
dc.department | Department of Computer Engineering | en_US |
dc.description | Conference name: 19th International Conference, FC 2015 | en_US |
dc.description.abstract | Over the last few years, the vast progress in genome sequencing has highly increased the availability of genomic data. Today, individuals can obtain their digital genomic sequences at reasonable prices from many online service providers. Individuals can store their data on personal devices, reveal it on public online databases, or share it with third parties. Yet, it has been shown that genomic data is very privacysensitive and highly correlated between relatives. Therefore, individuals’ decisions about how to manage and secure their genomic data are crucial. People of the same family might have very different opinions about (i) how to protect and (ii) whether or not to reveal their genome. We study this tension by using a game-theoretic approach. First, we model the interplay between two purely-selfish family members. We also analyze how the game evolves when relatives behave altruistically. We define closed-form Nash equilibria in different settings. We then extend the game to N players by means of multi-agent influence diagrams that enable us to efficiently compute Nash equilibria. Our results notably demonstrate that altruism does not always lead to a more efficient outcome in genomic-privacy games. They also show that, if the discrepancy between the genome-sharing benefits that players perceive is too high, they will follow opposite sharing strategies, which has a negative impact on the familial utility. © International Financial Cryptography Association 2015. | en_US |
dc.description.provenance | Made available in DSpace on 2016-02-08T12:19:29Z (GMT). No. of bitstreams: 1 bilkent-research-paper.pdf: 70227 bytes, checksum: 26e812c6f5156f83f0e77b261a471b5a (MD5) Previous issue date: 2015 | en |
dc.identifier.doi | 10.1007/978-3-662-47854-7_24 | en_US |
dc.identifier.doi | 10.1007/978-3-662-47854-7 | en_US |
dc.identifier.issn | 0302-9743 | en_US |
dc.identifier.uri | http://hdl.handle.net/11693/28396 | en_US |
dc.language.iso | English | en_US |
dc.publisher | Springer, Berlin, Heidelberg | en_US |
dc.relation.isversionof | http://dx.doi.org/10.1007/978-3-662-47854-7_24 | en_US |
dc.relation.isversionof | https://doi.org/10.1007/978-3-662-47854-7 | en_US |
dc.source.title | Financial Cryptography and Data Security | en_US |
dc.subject | Altruism | en_US |
dc.subject | Game theory | en_US |
dc.subject | Genomic privacy | en_US |
dc.subject | Interdependent privacy | en_US |
dc.subject | Cryptography | en_US |
dc.subject | Game theory | en_US |
dc.subject | Multi agent systems | en_US |
dc.subject | Altruism | en_US |
dc.subject | Genome sequencing | en_US |
dc.subject | Genomic sequence | en_US |
dc.subject | Highly-correlated | en_US |
dc.subject | Influence diagram | en_US |
dc.subject | Non-cooperative | en_US |
dc.subject | Personal devices | en_US |
dc.subject | Sharing strategies | en_US |
dc.subject | Genes | en_US |
dc.title | On non-cooperative genomic privacy | en_US |
dc.type | Conference Paper | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- On non-cooperative genomic privacy.pdf
- Size:
- 709.35 KB
- Format:
- Adobe Portable Document Format
- Description:
- Full printable version