2017
DOI: 10.1093/bib/bbx139
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving techniques of genomic data—a survey

Abstract: Genomic data hold salient information about the characteristics of a living organism. Throughout the past decade, pinnacle developments have given us more accurate and inexpensive methods to retrieve genome sequences of humans. However, with the advancement of genomic research, there is a growing privacy concern regarding the collection, storage and analysis of such sensitive human data. Recent results show that given some background information, it is possible for an adversary to reidentify an individual from… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
41
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 55 publications
(41 citation statements)
references
References 36 publications
0
41
0
Order By: Relevance
“…Genome privacy is a twenty-first century challenge that has received relatively low publicity relative to risk, especially when compared to privacy issues surrounding social media or electronic health records [1][2][3]. This low profile is misleading because (1) the consequences of privacy breaches can be as ominous as those of other data types, and more extensive, since they can affect blood relatives; and (2) the ability for a motivated individual, a particular group, or a nation's government to conduct an effective attack has increased sharply in the past few years due to improvements in technology.…”
Section: Overviewmentioning
confidence: 99%
“…Genome privacy is a twenty-first century challenge that has received relatively low publicity relative to risk, especially when compared to privacy issues surrounding social media or electronic health records [1][2][3]. This low profile is misleading because (1) the consequences of privacy breaches can be as ominous as those of other data types, and more extensive, since they can affect blood relatives; and (2) the ability for a motivated individual, a particular group, or a nation's government to conduct an effective attack has increased sharply in the past few years due to improvements in technology.…”
Section: Overviewmentioning
confidence: 99%
“…We observe that B (0) indicates whether a match has length greater than or equal to one. Using B (0) , we compute whether a match has length greater than or equal to two by setting B (1) j,i ← B (0) j,i ∧ B (0) j,i−1 . More generally, if B (k) indicates whether a match has length more than 2 k or not, then it can be updated to indicate if the length of a match is more than 2 k+1 by setting B…”
Section: We Compute a Matrix M Of Size M × N Such That M Jimentioning
confidence: 99%
“…Fortunately, there is a variety of cryptographic techniques that allow us to create useful yet privacy-preserving systems for computation in genomic data (see [1] for a summary of various techniques). Even though theoretically it is possible to perform every computation in a private way, the generic techniques do not *Correspondence: katesot@mit.edu 1 MIT, CSAIL, 32 Vassar street, 02139 Cambridge, MA, USA Full list of author information is available at the end of the article necessarily preserve the efficiency and the accuracy of the original algorithm. Thus, constructing practical privacypreserving protocols has become a very active area of research.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Because sharing genomic data in plaintext possesses serious privacy implications for the participants [11], [12], in addition to the approval from an institutional review board (IRB), collaborative research on shared genomic data often needs to satisfy two criteria at the same time — a) authorizing access to genomic data for research and b) preserving participants’ privacy and protecting the confidentiality of their genomic information [13]. That is why strict policies regarding genomic data sharing have been enforced, and generally, these policies are different in different regions of the world.…”
Section: Introductionmentioning
confidence: 99%