Evaluating the Risk of Re-Identification in Data Release Strategies: An Attacker-Centric Approach

dc.contributor.author Mesana, Patrick
dc.contributor.author Jutras, Pascal
dc.contributor.author Crowe, Julien
dc.contributor.author Vial, Gregory
dc.contributor.author Caporossi, Gilles
dc.date.accessioned 2023-12-26T18:36:40Z
dc.date.available 2023-12-26T18:36:40Z
dc.date.issued 2024-01-03
dc.identifier.isbn 978-0-9981331-7-1
dc.identifier.other cff24a13-8367-4851-9b98-287584adc1ee
dc.identifier.uri https://hdl.handle.net/10125/106505
dc.language.iso eng
dc.relation.ispartof Proceedings of the 57th Hawaii International Conference on System Sciences
dc.rights Attribution-NonCommercial-NoDerivatives 4.0 International
dc.rights.uri https://creativecommons.org/licenses/by-nc-nd/4.0/
dc.subject Data Science and Machine Learning to Support Business Decisions
dc.subject adversarial agents
dc.subject anonymization
dc.subject data synthesis
dc.subject privacy
dc.subject risk of re-identification
dc.title Evaluating the Risk of Re-Identification in Data Release Strategies: An Attacker-Centric Approach
dc.type Conference Paper
dc.type.dcmi Text
dcterms.abstract In this methodological paper, we introduce a novel approach to evaluate the risk of re-identification of individuals associated with data release strategies, including data redaction, data anonymization and data synthesis. More precisely, our approach simulates an attacker performing singling-out attacks as outlined in data protection regulations, and scores attacks based on the linkability of records and the information gain obtained by the attacker. Additionally, we further enhance our approach by simulating attacks as a cooperative game. In this game, the value of the attackers' information resources is determined using Shapley value borrowed from game theory. We also demonstrate the effectiveness of our approach using the Adult Income Census (AIC) dataset before discussing the economical implications associated with a privacy breach. Our work contributes to research and practice on the pressing need to better understand and evaluate the inherent trade-offs that exist between data privacy and utility in organizations.
dcterms.extent 10 pages
prism.startingpage 1060
Files
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
0103.pdf
Size:
688.2 KB
Format:
Adobe Portable Document Format
Description: