2014
DOI: 10.1038/nrg3723
|View full text |Cite|
|
Sign up to set email alerts
|

Routes for breaching and protecting genetic privacy

Abstract: We are entering an era of ubiquitous genetic information for research, clinical care and personal curiosity. Sharing these datasets is vital for progress in biomedical research. However, one growing concern is the ability to protect the genetic privacy of the data originators. Here, we present an overview of genetic privacy breaching strategies. We outline the principles of each technique, point to the underlying assumptions, and assess its technological complexity and maturation. We then review potential miti… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
156
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 338 publications
(157 citation statements)
references
References 114 publications
(116 reference statements)
1
156
0
Order By: Relevance
“…So far, we have neither informally nor formally reported evidence for data breaches, apart from the proof of principle that reidentification is feasible in some cases with considerable effort. 14,62 Hence, patients' weighing of scientific benefits over the risk to their privacy seems a well-considered judgment. Unless we experience evidence for serious data breaches, rigid terms of data protection would therefore constitute paternalism over patient preferences and an unjustified obstruction to research.…”
Section: Data Sharing and Privacy Protectionmentioning
confidence: 99%
“…So far, we have neither informally nor formally reported evidence for data breaches, apart from the proof of principle that reidentification is feasible in some cases with considerable effort. 14,62 Hence, patients' weighing of scientific benefits over the risk to their privacy seems a well-considered judgment. Unless we experience evidence for serious data breaches, rigid terms of data protection would therefore constitute paternalism over patient preferences and an unjustified obstruction to research.…”
Section: Data Sharing and Privacy Protectionmentioning
confidence: 99%
“…In spite of these works about differentially private genomic data, Fredrikson et al [35] demonstrate an unsatisfactory tradeoff between privacy and utility in an end-to-end case study of personalized warfarin dosing. A similar unsatisfactory result in an association study is also mentioned by Erlich and Narayanan [36].…”
Section: Related Workmentioning
confidence: 69%
“…To protect privacy, de-identification methods for healthcare data should be developed. In addition, recent privacy preserving data mining methods including differential privacy or homomorphic encryption should be applied to healthcare data [42].…”
Section: Resultsmentioning
confidence: 99%