2014
DOI: 10.1186/1472-6947-14-s1-s3
|View full text |Cite
|
Sign up to set email alerts
|

Scalable privacy-preserving data sharing methodology for genome-wide association studies: an application to iDASH healthcare privacy protection challenge

Abstract: In response to the growing interest in genome-wide association study (GWAS) data privacy, the Integrating Data for Analysis, Anonymization and SHaring (iDASH) center organized the iDASH Healthcare Privacy Protection Challenge, with the aim of investigating the effectiveness of applying privacy-preserving methodologies to human genetic data. This paper is based on a submission to the iDASH Healthcare Privacy Protection Challenge. We apply privacy-preserving methods that are adapted from Uhler et al. 2013 and Yu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
49
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 47 publications
(49 citation statements)
references
References 8 publications
0
49
0
Order By: Relevance
“…SNPs) before computation (Wang et al, 2014) or to the research outcomes (e.g. P-value or test statistics) obtained after computation (Yu and Ji, 2014). To compare with the methods of applying DP before computation (DPBC) and DP after computation (DPAC), we select a KD dataset with 30 records and 744 SNPs.…”
Section: Comparison With Perturbation-based Protection Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…SNPs) before computation (Wang et al, 2014) or to the research outcomes (e.g. P-value or test statistics) obtained after computation (Yu and Ji, 2014). To compare with the methods of applying DP before computation (DPBC) and DP after computation (DPAC), we select a KD dataset with 30 records and 744 SNPs.…”
Section: Comparison With Perturbation-based Protection Methodsmentioning
confidence: 99%
“…Based on the idea of DPAC in (Yu and Ji, 2014), we also derived the corresponding DP algorithm for exact logistic regression in Supplementary Section S9. The results in terms of recall and precision in DPAC are better than those of DPBC in Table 6.…”
Section: Kbmentioning
confidence: 99%
See 2 more Smart Citations
“…There are a number of technical solutions that have been proposed to protect genome privacy, and existing studies can be categorized into two groups [4]: (i) protecting the 2 Security and Communication Networks computation process in genome data analysis [5][6][7] and (ii) protecting the genome data before computation [8,9] or research outcomes after computation [10].…”
Section: Introductionmentioning
confidence: 99%