A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Inference Control for Privacy-Preserving Genome Matching
[article]
2014
arXiv
pre-print
Privacy is of the utmost importance in genomic matching. Therefore a number of privacy-preserving protocols have been presented using secure computation. ...
We show that using our approach it is feasible to preserve privacy in genome matching and also detect and mitigate Goodrich's attack. ...
Related Work Privacy-preserving matching of genomes has been introduced in [1] . ...
arXiv:1405.0205v1
fatcat:zbwvkj7dw5edrfoqwfy5iohmwa
Can you Really Anonymize the Donors of Genomic Data in Today's Digital World?
[chapter]
2016
Lecture Notes in Computer Science
We then review potential privacy-preserving countermeasure mechanisms for each threat. ...
In this work, we survey a wide spectrum of cross-layer privacy breaching strategies to human genomic data (using both public genomic databases and other public non-genomic data). ...
applicable in order to preserve privacy. ...
doi:10.1007/978-3-319-29883-2_16
fatcat:ozj4zi3zhrb2ddkok6d5ji65tu
Facilitating Federated Genomic Data Analysis by Identifying Record Correlations while Ensuring Privacy
[article]
2022
arXiv
pre-print
In this paper, we take the first step towards identifying correlated records across multiple data repositories in a privacy-preserving manner. ...
Analyzing all of this data would be transformative for genomics research. However, the data is sensitive, and therefore cannot be easily centralized. ...
In [11] Jah et al. proposed three secure protocols built on oblivious transfer for privacy-preserving edit distance computation of genomic data. ...
arXiv:2203.05664v1
fatcat:6oouyofyjvhljpeatcxn45qgyu
DNA-SeAl: Sensitivity Levels to Optimize the Performance of Privacy-Preserving DNA Alignment
2019
IEEE journal of biomedical and health informatics
This paper presents DNA-SeAl a novel contribution to improving the privacy × performance product in current genomic workflows. ...
On the privacy side, since genomic data are utterly sensitive, several cryptographic mechanisms have been proposed to align reads more securely than the former, but with a lower performance. ...
For example, NGS-Logistics [15] allows researchers to analyze rare genomic variants while preserving the privacy of donors. ...
doi:10.1109/jbhi.2019.2914952
pmid:31265423
fatcat:hqtz7kt2ezccbotcry3e223kqe
Sensitivity Levels: Optimizing the Performance of Privacy Preserving DNA Alignment
[article]
2018
bioRxiv
pre-print
Our results indicate that using sensitivity levels is feasible to optimize the performance of privacy preserving alignment, if one combines the advantages of private and public clouds. ...
This manuscript proposes a novel contribution to improving the privacy X performance product in current genomic studies. ...
Privacy preserving mechanisms for genomic data: The reported privacy attacks, which we summarize on the previous section, made genomic privacy a priority challenge of the biomedical community [32] , ...
doi:10.1101/292227
fatcat:mykkfnc34vdvrlxn2ldelzi3re
Citizen-Centered, Auditable, and Privacy-Preserving Population Genomics
[article]
2019
bioRxiv
pre-print
To enable a secure exploration of genomic datasets with controlled and transparent data access, we propose a novel approach that combines cryptographic privacy-preserving technologies, such as homomorphic ...
Our work opens a path towards multi-functional, privacy-preserving genomic-data analysis. ...
Acknowledgments: We are grateful to the Bitfury Exonum engineering team for running part of the performance measurements described in the paper. ...
doi:10.1101/799999
fatcat:hhwjh2t5ljh6zon5pd77eh6rhi
Inference Attacks against Kin Genomic Privacy
2017
IEEE Security and Privacy
Methods attackers use to infer genomic information, as well as recent proposals for enhancing genomic privacy, are discussed. ...
Genomic data poses serious interdependent risks: your data might also leak information about your family members' data. ...
However, differential privacy, a well-known technique for answering statistical queries in a privacy-preserving manner, 28 can be easily adapted to preserve kin genomic privacy at a lower cost for utility ...
doi:10.1109/msp.2017.3681052
fatcat:uz5tck3alzalbgmtrkfu4au3zm
On genomics, kin, and privacy
2014
F1000Research
The storage of greater numbers of exomes or genomes raises the question of loss of privacy for the individual and for families if genomic data are not properly protected. ...
In either case, revealing genome data has consequences beyond the individual, as it compromises the privacy of family members. ...
These include using efficient cryptographic techniques for privacy-preserving personalized medicine 5, 6 , and for genomic research 7 . ...
doi:10.12688/f1000research.4089
fatcat:jjjia2hqlrbrndaorr76rzeo5u
Routes for breaching and protecting genetic privacy
[article]
2013
bioRxiv
pre-print
Here, we technically map threats to genetic privacy and discuss potential mitigation strategies for privacy-preserving dissemination of genetic data. ...
However, one growing concern is the ability to protect the genetic privacy of the data originators. ...
The authors thank Dina Zielinski and Melissa Gymrek for useful comments and Shriram Sankararaman for his nice introduction between the authors. ...
doi:10.1101/000042
fatcat:gnmdq2mc2be7phgvcejoxu5clq
An overview of human genetic privacy
2016
Annals of the New York Academy of Sciences
We also describe the techniques for protecting human genetic privacy from three broad perspectives: controlled access, differential privacy, and cryptographic solutions. ...
In this paper, we present potential genetic privacy risks and relevant ethics and regulations for sharing and protecting human genomics data. ...
The authors are grateful for Jia Wen's help with formatting. ...
doi:10.1111/nyas.13211
pmid:27626905
pmcid:PMC5697154
fatcat:db3bxtwxx5ezza2dsfp2wvikzu
Infringement of Individual Privacy via Mining Differentially Private GWAS Statistics
[chapter]
2016
Lecture Notes in Computer Science
Specifically, we constructed a Bayesian network through mining public GWAS statistics, and evaluated two attacks, namely trait inference attack and identity inference attack, for infringement of individual ...
privacy not only for GWAS participants but also regular individuals. ...
In our experiments, we choose two privacy threshold values, = 2 and = 0.2, which represent two settings for reasonable privacy preservation in GWAS. ...
doi:10.1007/978-3-319-42553-5_30
fatcat:erumcih4d5d4dhe5qaerftpjve
Routes for breaching and protecting genetic privacy
[article]
2013
arXiv
pre-print
Here, we technically map threats to genetic privacy and discuss potential mitigation strategies for privacy-preserving dissemination of genetic data. ...
However, one growing concern is the ability to protect the genetic privacy of the data originators. ...
The authors thank Dina Zielinski and Melissa Gymrek for useful comments and Shriram Sankararaman for his nice introduction between the authors. ...
arXiv:1310.3197v1
fatcat:guexdcofhbhmfi2wblenbno5ni
Routes for breaching and protecting genetic privacy
2014
Nature reviews genetics
Here, we technically map threats to genetic privacy and discuss potential mitigation strategies for privacy--preserving dissemination of genetic data. ...
However, one growing concern is the ability to protect the genetic privacy of the data originators. ...
The authors thank Dina Zielinski and Melissa Gymrek for useful comments and Shriram Sankararaman for his nice introduction between the authors. ...
doi:10.1038/nrg3723
pmid:24805122
pmcid:PMC4151119
fatcat:ypcrolqbtvgabhnp6ufvzpsula
Genomic Privacy in the Information Age
2013
Clinical Chemistry
Lehmann, Brigham and Women's Hospital and Harvard Medical School, for helpful suggestions. ...
Gymrek et al. wrote, "existing policy tools, such as controlled-access databases with data use agreements, may mediate the exposure of genomic information to surname inference." ...
Third, it helps to have a common surname to maintain privacy, because the pool of possible matches is much greater for common names. ...
doi:10.1373/clinchem.2013.205260
pmid:23603798
fatcat:4qa24l62yzfx5bq7hwez2kkqua
Privacy-Preserving Identification of Target Patients from Outsourced Patient Data
[article]
2021
arXiv
pre-print
The result shows that the proposed solution is capable to efficiently identify the case/control groups in a privacy-preserving way. ...
Moreover, the ciphertext supports privacy-preserving search and, consequently, enables the selection of the target group of patients (e.g., case and control groups). ...
In this work, we propose a privacy-preserving framework for the identification of target patients over outsourced patient data. ...
arXiv:2108.06505v2
fatcat:xoyaxul77beaxbs57qp3fk7vv4
« Previous
Showing results 1 — 15 out of 2,146 results