Filters








2,146 Hits in 4.0 sec

Inference Control for Privacy-Preserving Genome Matching [article]

Florian Kerschbaum, Martin Beck, Dagmar Schönfeld
2014 arXiv   pre-print
Privacy is of the utmost importance in genomic matching. Therefore a number of privacy-preserving protocols have been presented using secure computation.  ...  We show that using our approach it is feasible to preserve privacy in genome matching and also detect and mitigate Goodrich's attack.  ...  Related Work Privacy-preserving matching of genomes has been introduced in [1] .  ... 
arXiv:1405.0205v1 fatcat:zbwvkj7dw5edrfoqwfy5iohmwa

Can you Really Anonymize the Donors of Genomic Data in Today's Digital World? [chapter]

Mohammed Alser, Nour Almadhoun, Azita Nouri, Can Alkan, Erman Ayday
2016 Lecture Notes in Computer Science  
We then review potential privacy-preserving countermeasure mechanisms for each threat.  ...  In this work, we survey a wide spectrum of cross-layer privacy breaching strategies to human genomic data (using both public genomic databases and other public non-genomic data).  ...  applicable in order to preserve privacy.  ... 
doi:10.1007/978-3-319-29883-2_16 fatcat:ozj4zi3zhrb2ddkok6d5ji65tu

Facilitating Federated Genomic Data Analysis by Identifying Record Correlations while Ensuring Privacy [article]

Leonard Dervishi, Xinyue Wang, Wentao Li, Anisa Halimi, Jaideep Vaidya, Xiaoqian Jiang, Erman Ayday
2022 arXiv   pre-print
In this paper, we take the first step towards identifying correlated records across multiple data repositories in a privacy-preserving manner.  ...  Analyzing all of this data would be transformative for genomics research. However, the data is sensitive, and therefore cannot be easily centralized.  ...  In [11] Jah et al. proposed three secure protocols built on oblivious transfer for privacy-preserving edit distance computation of genomic data.  ... 
arXiv:2203.05664v1 fatcat:6oouyofyjvhljpeatcxn45qgyu

DNA-SeAl: Sensitivity Levels to Optimize the Performance of Privacy-Preserving DNA Alignment

Maria Fernandes, Jeremie Decouchant, Marcus Volp, Francisco M. Couto, Paulo Verissimo
2019 IEEE journal of biomedical and health informatics  
This paper presents DNA-SeAl a novel contribution to improving the privacy × performance product in current genomic workflows.  ...  On the privacy side, since genomic data are utterly sensitive, several cryptographic mechanisms have been proposed to align reads more securely than the former, but with a lower performance.  ...  For example, NGS-Logistics [15] allows researchers to analyze rare genomic variants while preserving the privacy of donors.  ... 
doi:10.1109/jbhi.2019.2914952 pmid:31265423 fatcat:hqtz7kt2ezccbotcry3e223kqe

Sensitivity Levels: Optimizing the Performance of Privacy Preserving DNA Alignment [article]

Maria Fernandes, Jeremie Decouchant, Marcus Voelp, Francisco M Couto, Paulo Esteves-Verissimo
2018 bioRxiv   pre-print
Our results indicate that using sensitivity levels is feasible to optimize the performance of privacy preserving alignment, if one combines the advantages of private and public clouds.  ...  This manuscript proposes a novel contribution to improving the privacy X performance product in current genomic studies.  ...  Privacy preserving mechanisms for genomic data: The reported privacy attacks, which we summarize on the previous section, made genomic privacy a priority challenge of the biomedical community [32] ,  ... 
doi:10.1101/292227 fatcat:mykkfnc34vdvrlxn2ldelzi3re

Citizen-Centered, Auditable, and Privacy-Preserving Population Genomics [article]

Dennis Grishin, Jean Louis Raisaro, Juan Ramón Troncoso-Pastoriza, Kamal Obbad, Kevin Quinn, Mickaël Misbach, Jared Gollhardt, Joao Sa, Jacques Fellay, George M. Church, Jean-Pierre Hubaux
2019 bioRxiv   pre-print
To enable a secure exploration of genomic datasets with controlled and transparent data access, we propose a novel approach that combines cryptographic privacy-preserving technologies, such as homomorphic  ...  Our work opens a path towards multi-functional, privacy-preserving genomic-data analysis.  ...  Acknowledgments: We are grateful to the Bitfury Exonum engineering team for running part of the performance measurements described in the paper.  ... 
doi:10.1101/799999 fatcat:hhwjh2t5ljh6zon5pd77eh6rhi

Inference Attacks against Kin Genomic Privacy

Erman Ayday, Mathias Humbert
2017 IEEE Security and Privacy  
Methods attackers use to infer genomic information, as well as recent proposals for enhancing genomic privacy, are discussed.  ...  Genomic data poses serious interdependent risks: your data might also leak information about your family members' data.  ...  However, differential privacy, a well-known technique for answering statistical queries in a privacy-preserving manner, 28 can be easily adapted to preserve kin genomic privacy at a lower cost for utility  ... 
doi:10.1109/msp.2017.3681052 fatcat:uz5tck3alzalbgmtrkfu4au3zm

On genomics, kin, and privacy

Amalio Telenti, Erman Ayday, Jean Pierre Hubaux
2014 F1000Research  
The storage of greater numbers of exomes or genomes raises the question of loss of privacy for the individual and for families if genomic data are not properly protected.  ...  In either case, revealing genome data has consequences beyond the individual, as it compromises the privacy of family members.  ...  These include using efficient cryptographic techniques for privacy-preserving personalized medicine 5, 6 , and for genomic research 7 .  ... 
doi:10.12688/f1000research.4089 fatcat:jjjia2hqlrbrndaorr76rzeo5u

Routes for breaching and protecting genetic privacy [article]

Yaniv Erlich, Arvind Narayanan
2013 bioRxiv   pre-print
Here, we technically map threats to genetic privacy and discuss potential mitigation strategies for privacy-preserving dissemination of genetic data.  ...  However, one growing concern is the ability to protect the genetic privacy of the data originators.  ...  The authors thank Dina Zielinski and Melissa Gymrek for useful comments and Shriram Sankararaman for his nice introduction between the authors.  ... 
doi:10.1101/000042 fatcat:gnmdq2mc2be7phgvcejoxu5clq

An overview of human genetic privacy

Xinghua Shi, Xintao Wu
2016 Annals of the New York Academy of Sciences  
We also describe the techniques for protecting human genetic privacy from three broad perspectives: controlled access, differential privacy, and cryptographic solutions.  ...  In this paper, we present potential genetic privacy risks and relevant ethics and regulations for sharing and protecting human genomics data.  ...  The authors are grateful for Jia Wen's help with formatting.  ... 
doi:10.1111/nyas.13211 pmid:27626905 pmcid:PMC5697154 fatcat:db3bxtwxx5ezza2dsfp2wvikzu

Infringement of Individual Privacy via Mining Differentially Private GWAS Statistics [chapter]

Yue Wang, Jia Wen, Xintao Wu, Xinghua Shi
2016 Lecture Notes in Computer Science  
Specifically, we constructed a Bayesian network through mining public GWAS statistics, and evaluated two attacks, namely trait inference attack and identity inference attack, for infringement of individual  ...  privacy not only for GWAS participants but also regular individuals.  ...  In our experiments, we choose two privacy threshold values, = 2 and = 0.2, which represent two settings for reasonable privacy preservation in GWAS.  ... 
doi:10.1007/978-3-319-42553-5_30 fatcat:erumcih4d5d4dhe5qaerftpjve

Routes for breaching and protecting genetic privacy [article]

Yaniv Erlich, Arvind Narayanan
2013 arXiv   pre-print
Here, we technically map threats to genetic privacy and discuss potential mitigation strategies for privacy-preserving dissemination of genetic data.  ...  However, one growing concern is the ability to protect the genetic privacy of the data originators.  ...  The authors thank Dina Zielinski and Melissa Gymrek for useful comments and Shriram Sankararaman for his nice introduction between the authors.  ... 
arXiv:1310.3197v1 fatcat:guexdcofhbhmfi2wblenbno5ni

Routes for breaching and protecting genetic privacy

Yaniv Erlich, Arvind Narayanan
2014 Nature reviews genetics  
Here, we technically map threats to genetic privacy and discuss potential mitigation strategies for privacy--preserving dissemination of genetic data.  ...  However, one growing concern is the ability to protect the genetic privacy of the data originators.  ...  The authors thank Dina Zielinski and Melissa Gymrek for useful comments and Shriram Sankararaman for his nice introduction between the authors.  ... 
doi:10.1038/nrg3723 pmid:24805122 pmcid:PMC4151119 fatcat:ypcrolqbtvgabhnp6ufvzpsula

Genomic Privacy in the Information Age

B. R. Korf
2013 Clinical Chemistry  
Lehmann, Brigham and Women's Hospital and Harvard Medical School, for helpful suggestions.  ...  Gymrek et al. wrote, "existing policy tools, such as controlled-access databases with data use agreements, may mediate the exposure of genomic information to surname inference."  ...  Third, it helps to have a common surname to maintain privacy, because the pool of possible matches is much greater for common names.  ... 
doi:10.1373/clinchem.2013.205260 pmid:23603798 fatcat:4qa24l62yzfx5bq7hwez2kkqua

Privacy-Preserving Identification of Target Patients from Outsourced Patient Data [article]

Xiaojie Zhu
2021 arXiv   pre-print
The result shows that the proposed solution is capable to efficiently identify the case/control groups in a privacy-preserving way.  ...  Moreover, the ciphertext supports privacy-preserving search and, consequently, enables the selection of the target group of patients (e.g., case and control groups).  ...  In this work, we propose a privacy-preserving framework for the identification of target patients over outsourced patient data.  ... 
arXiv:2108.06505v2 fatcat:xoyaxul77beaxbs57qp3fk7vv4
« Previous Showing results 1 — 15 out of 2,146 results