Strategic Modeling of Information Sharing among Data Privacy Attackers Quang Duong, Kristen LeFevre, and Michael Wellman University of Michigan Presented.

Slides:



Advertisements
Similar presentations
1 ISLE Transfer Learning Team Main Technology Components The I CARUS Architecture Markov Logic Networks Executes skills in the environment Long-TermConceptualMemoryShort-TermConceptualMemory.
Advertisements

F. Amigoni, N. Basilico, N. Gatti DEI, Politecnico di Milano Finding the Optimal Strategies in Robotic Patrolling with Adversaries in Topologically-Represented.
Market Institutions: Oligopoly
M9302 Mathematical Models in Economics Instructor: Georgi Burlakov 3.1.Dynamic Games of Complete but Imperfect Information Lecture
1 Game Theory. 2 Definitions Game theory -- formal way to analyze interactions among a group of rational agents behaving strategically Agents – players.
3. Basic Topics in Game Theory. Strategic Behavior in Business and Econ Outline 3.1 What is a Game ? The elements of a Game The Rules of the.
© 2009 Institute of Information Management National Chiao Tung University Game theory The study of multiperson decisions Four types of games Static games.
Game Theoretical Insights in Strategic Patrolling: Model and Analysis Nicola Gatti – DEI, Politecnico di Milano, Piazza Leonardo.
Managerial Economics Game Theory for Oligopoly
Game Theory and Computer Networks: a useful combination? Christos Samaras, COMNET Group, DUTH.
Game Theory: Inside Oligopoly
Benjamin Johnson Carnegie Mellon University Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information TRUST.
M9302 Mathematical Models in Economics Instructor: Georgi Burlakov 3.1.Dynamic Games of Complete but Imperfect Information Lecture
Using Game Theoretic Approach to Analyze Security Issues In Ad Hoc Networks Term Presentation Name: Li Xiaoqi, Gigi Supervisor: Michael R. Lyu Department:
An Introduction to Game Theory Part I: Strategic Games
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
Satisfaction Equilibrium Stéphane Ross. Canadian AI / 21 Problem In real life multiagent systems :  Agents generally do not know the preferences.
Sep. 5, 2013 Lirong Xia Introduction to Game Theory.
Slide 1 of 13 So... What’s Game Theory? Game theory refers to a branch of applied math that deals with the strategic interactions between various ‘agents’,
Fast Data Anonymization with Low Information Loss 1 National University of Singapore 2 Hong Kong University
A camper awakens to the growl of a hungry bear and sees his friend putting on a pair of running shoes, “You can’t outrun a bear,” scoffs the camper. His.
Algoritmi per Sistemi Distribuiti Strategici
Basics on Game Theory For Industrial Economics (According to Shy’s Plan)
Temporal Action-Graph Games: A New Representation for Dynamic Games Albert Xin Jiang University of British Columbia Kevin Leyton-Brown University of British.
Leting Wu Xiaowei Ying, Xintao Wu Dept. Software and Information Systems Univ. of N.C. – Charlotte Reconstruction from Randomized Graph via Low Rank Approximation.
Gabriel Tsang Supervisor: Jian Yang.  Initial Problem  Related Work  Approach  Outcome  Conclusion  Future Work 2.
Chapter Twenty-Eight Game Theory. u Game theory models strategic behavior by agents who understand that their actions affect the actions of other agents.
Sensemaking and Ground Truth Ontology Development Chinua Umoja William M. Pottenger Jason Perry Christopher Janneck.
Beyond selfish routing: Network Formation Games. Network Formation Games NFGs model the various ways in which selfish agents might create/use networks.
Dynamic Network Security Deployment under Partial Information George Theodorakopoulos (EPFL) John S. Baras (UMD) Jean-Yves Le Boudec (EPFL) September 24,
PROBLEM 4.
Simple search methods for finding a Nash equilibrium Ryan Porter, Eugene Nudelman, and Yoav Shoham Games and Economic Behavior, Vol. 63, Issue 2. pp ,
Starbucks, Beating The Prisoners Dillema Brooke Hatcher Econ 202 April 28 th, 2012.
Modeling Information Diffusion in Networks with Unobserved Links Quang Duong Michael P. Wellman Satinder Singh Computer Science and Engineering University.
1 Privacy-Preserving Distributed Information Sharing Nan Zhang and Wei Zhao Texas A&M University, USA.
Game Theory, Strategic Decision Making, and Behavioral Economics 11 Game Theory, Strategic Decision Making, and Behavioral Economics All men can see the.
History-Dependent Graphical Multiagent Models Quang Duong Michael P. Wellman Satinder Singh Computer Science and Engineering University of Michigan, USA.
3.1. Strategic Behavior Matilde Machado.
1 RBM Background Development aid is often provided on a point to point basis with no consistency with countries priorities. Development efforts are often.
ECO290E: Game Theory Lecture 12 Static Games of Incomplete Information.
A quantum protocol for sampling correlated equilibria unconditionally and without a mediator Iordanis Kerenidis, LIAFA, Univ Paris 7, and CNRS Shengyu.
Beyond Routing Games: Network (Formation) Games. Network Games (NG) NG model the various ways in which selfish users (i.e., players) strategically interact.
Dynamic Games of complete information: Backward Induction and Subgame perfection - Repeated Games -
Data Publishing against Realistic Adversaries Johannes Gerhrke Cornell University Ithaca, NY Michaela Götz Cornell University Ithaca, NY Ashwin Machanavajjhala.
Introduction to machine learning and data mining 1 iCSC2014, Juan López González, University of Oviedo Introduction to machine learning Juan López González.
On visible choice set and scope sensitivity: - Dealing with the impact of study design on the scope sensitivity Improving the Practice of Benefit Transfer:
A Game-Theoretic Model for Defending Against Malicious Users in RecDroid Bahman Rashidi December 5 th, 2014.
M9302 Mathematical Models in Economics Instructor: Georgi Burlakov 4.1.Dynamic Games of Incomplete Information Lecture
McGraw-Hill/Irwin Copyright  2008 by The McGraw-Hill Companies, Inc. All rights reserved. GAME THEORY, STRATEGIC DECISION MAKING, AND BEHAVIORAL ECONOMICS.
Coordination with Local Information Munther Dahleh Alireza Tahbaz-Salehi, John Tsitsiklis Spyros Zoumpouli.
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish agents strategically interact in using a network They.
Modeling Agents’ Reasoning in Strategic Situations Avi Pfeffer Sevan Ficici Kobi Gal.
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish users (i.e., players) strategically interact in using.
RADHA-KRISHNA BALLA 19 FEBRUARY, 2009 UCT for Tactical Assault Battles in Real-Time Strategy Games.
1 What is Game Theory About? r Analysis of situations where conflict of interests is present r Goal is to prescribe how conflicts can be resolved 2 2 r.
How to Analyse Social Network? : Part 2 Game Theory Thank you for all referred contexts and figures.
Repeated Game Modeling of Multicast Overlays Mike Afergan (MIT CSAIL/Akamai) Rahul Sami (University of Michigan) April 25, 2006.
Alpcan, T., and T. Basar (2004) “A game theoretic analysis of intrusion detection in access control systems” Proceedings of 43 rd IEEE Conference on Decision.
M9302 Mathematical Models in Economics Instructor: Georgi Burlakov 0.Game Theory – Brief Introduction Lecture
5.1.Static Games of Incomplete Information
On Investor Behavior Objective Define and discuss the concept of rational behavior.
ECO290E: Game Theory Lecture 10 Examples of Dynamic Games.
M9302 Mathematical Models in Economics Instructor: Georgi Burlakov 2.1.Dynamic Games of Complete and Perfect Information Lecture
Advanced Subjects in GT Outline of the tutorials Static Games of Complete Information Introduction to games Normal-form (strategic-form) representation.
Game theory basics A Game describes situations of strategic interaction, where the payoff for one agent depends on its own actions as well as on the actions.
Contents of the Talk Preliminary Materials Motivation and Contribution
Non-additive Security Games
Population lost resource
M9302 Mathematical Models in Economics
Presentation transcript:

Strategic Modeling of Information Sharing among Data Privacy Attackers Quang Duong, Kristen LeFevre, and Michael Wellman University of Michigan Presented by: Quang Duong

Privacy-Sensitive Data Publication NameAgeZipcodeDisease Alex AIDS Bob cancer Carol flu AgeZipcodeDisease Under *AIDS Under *cancer 30 or above1234*flu AgeZipcodeDisease AIDS cancer flu Target’s sensitive value Attackers’ background knowledge is relevant to data publication de-identification generalization

How Much Generalization? Competing effects: More generalization makes published data more resistant to privacy attackers More generalization degrades information quality of published data  Need to model attackers’ background knowledge

Model of Privacy Attackers Main difference: network of attackers who share background knowledge Main contribution: a framework for constructing models that: capture information sharing activities among attackers estimate attackers’ background knowledge

Privacy Attacker Model’s Stages 1. ACQUIRE information separately 2. DECIDE how much and what to SHARE 3.ATTACK with their augmented knowledge

Decision: How much and what information to share Tradeoff (of sharing background knowledge): Increase attack capability Decrease compromised data’s exclusiveness Utility: (number of successful attackers) -2 if capable of compromising the dataset 0 otherwise Data Privacy Attacker Model

Database Publisher Model Decision: How much generalization should be applied to the published data Tradeoff (of generalizing data): Reduce privacy breach risk Induce more information loss Utility: (Linear) combination of privacy breach risk and information loss

Two-Stage Game Model Publisher decides how to generalize the data set Attacker n 1 st 2 nd  We can reason about the attackers’ actions and background knowledge, using different solution concepts such as Nash equilibrium Attacker 2 Attacker 1 … Choose how much and what to share

Model Details: Background Knowledge 3 categories of background knowledge: [Chen et al. ‘07] 1.(L) values that the target doesn’t have: Alex does not have cancer 2.(K) sensitive info about individuals different from the target Carol has flu 3.(M) relations between the target’s sensitive value and others’ If Carol has AIDS, Alex has AIDS

Model Details: Attackers 1.Agent space: n attackers, each is represented by its prior knowledge set: (K,L,M) 2.Action space: Each attacker decides how many and what instances to share (a k,a l,a m ) 1.Sharing mechanism: Pair-wise: direct exchange between every pair of attackers Reciprocal: exchange the same amount of information

Example Alex: no cancer Carol: flu Bob: cance r Carol: flu Bob: cance r

Normal-form Game Model Publisher chooses anonymization method Attackers choose how much and what information to share AFTER observing the anonymized data set Attackers choose how much and what information to share AFTER observing the anonymized data set Incomplete Information Game: KLMKLM akalamakalam Normal-form Game: KLMKLM akalamakalam Monte Carlo Sampling

Model Construction Overview Reason about attackers’ knowledge Evaluate anonymization choices

Example Model – Empirical Study Overview: Data: 10 records, |domain of sensitive values| = 5 Attackers: 3, each has 1 instance of each knowledge type Publisher: explicitly specifies her generalization method  Construct and estimate the game’s payoff matrix Testing scenarios: 1Attackers share all their knowledge 2No one shares 3Attackers play some Nash Equilibrium (NE)

Outcomes under Different Attacker Action Scenarios Publisher’s actions (I, II, III…): each has 3 data points corresponding to 3 attacker action scenarios. Each point corresponds to the publisher and attackers’ actions Main result: the publisher may adopt different generalization strategies under different beliefs about attackers’ strategies

Concluding Remarks Contributions: Propose a framework for reasoning about attackers’ actions Initiate a game-theoretic study of privacy attackers as a knowledge-sharing network Demonstrate that it matters to take into account attackers’ knowledge and their information-sharing activities

Future Work Compact representations of prior knowledge [Chen et al ‘07] Incorporate more behavioral observations in reasoning about attackers’ behavior Non-game theoretic models (such as GMM [Duong et al ‘08])

THANK YOU!