To Warn or Not to Warn: Online Signaling in Audit Games

05/16/2019
by   Chao Yan, et al.
0

Routine operational use of sensitive data is commonly governed by laws and regulations. For instance, in the medical domain, there are various laws at the state and federal level that dictate who is permitted to work with patients' records and under what conditions. To screen for potential privacy breaches, logging systems typically trigger alerts whenever a suspicious access is detected. However, the efficiency of such mechanism is low because 1) the vast majority of alerts are false positive and 2) limited budget leads to a small chance of detecting the true attack. To improve efficiency, information systems may invoke signaling so that whenever a suspicious access request occurs, the system can, in real time, warn the user that the access may be audited. At the end of some period, a selected subset of suspicious accesses is then audited. This gives rise to an online problem in which one needs to determine 1) whether a warning should be triggered and 2) the likelihood that the event of data request will be audited. In this work, we formulate this problem as a Signaling Audit Game (SAG), study the properties of its Stackelberg equilibria, and develop a scalable approach to compute its solution. We show that an intelligent presentation of warnings adds value in that SAGs can realize significantly higher utility for the auditor than systems without signaling. We perform an analysis over 10 million real access events in a large academic medical center to illustrate the value of our approach.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/12/2018

Are My EHRs Private Enough? -Event-level Privacy Protection

Privacy is a major concern in sharing human subject data to researchers ...
research
04/25/2022

Strategic Signaling for Utility Control in Audit Games

As an effective method to protect the daily access to sensitive data aga...
research
12/02/2019

GDPArrrrr: Using Privacy Laws to Steal Identities

The General Data Protection Regulation (GDPR) has become a touchstone mo...
research
04/18/2018

Modeling and Analysis of Leaky Deception using Signaling Games with Evidence

Deception plays critical roles in economics and technology, especially i...
research
09/16/2022

A Large-scale Multiple-objective Method for Black-box Attack against Object Detection

Recent studies have shown that detectors based on deep models are vulner...
research
05/28/2019

Privacy Vulnerabilities of Dataset Anonymization Techniques

Vast amounts of information of all types are collected daily about peopl...

Please sign up or login with your details

Forgot password? Click here to reset