2022
DOI: 10.1093/jamia/ocac165
|View full text |Cite
|
Sign up to set email alerts
|

The evolving privacy and security concerns for genomic data analysis and sharing as observed from the iDASH competition

Abstract: Concerns regarding inappropriate leakage of sensitive personal information as well as unauthorized data use are increasing with the growth of genomic data repositories. Therefore, privacy and security of genomic data have become increasingly important and need to be studied. With many proposed protection techniques, their applicability in support of biomedical research should be well understood. For this purpose, we have organized a community effort in the past 8 years through the integrating data for analysis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8
1
1

Relationship

1
9

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 70 publications
0
11
0
Order By: Relevance
“…Also, STI can be extended by integrating secure and privacy-preserving mechanisms through homo-morphic encryption and Tensorflow-compatible libraries such as tf-encrypted [35]) to provide secure and privacy-preserving genotype imputation [36, 37], which is imperative yet under-explored in current tools.…”
Section: Discussionmentioning
confidence: 99%
“…Also, STI can be extended by integrating secure and privacy-preserving mechanisms through homo-morphic encryption and Tensorflow-compatible libraries such as tf-encrypted [35]) to provide secure and privacy-preserving genotype imputation [36, 37], which is imperative yet under-explored in current tools.…”
Section: Discussionmentioning
confidence: 99%
“…It can be flexibly expanded into more focused development efforts or it can be used for simply encrypt-aggregate-decrypt operations for securing intermediate data [ 109 ]. Its tool base can be expanded with community-driven efforts such as iDASH genomic privacy challenges [ 110 ].…”
Section: Discussionmentioning
confidence: 99%
“…The current legal frameworks aim to protect genome data from malicious attacks, but the data are still the target of existing threats [39]. Encrypting genome data while sharing and accessing it provides some protection against attacks, but encryption algorithms are prone to being attacked themselves by hackers to gain access to data [40,41]. Genome data, if hacked can be manipulated and used for harmful activities.…”
Section: The Role Of Mlsecops In the Biotechnology Industry 50mentioning
confidence: 99%