Quantifying genomic privacy via inference attack with high-order SNV correlations
Samani, S. S.
Proceedings - 2015 IEEE Security and Privacy Workshops, SPW 2015
Institute of Electrical and Electronics Engineers Inc.
32 - 40
Item Usage Stats
MetadataShow full item record
As genomic data becomes widely used, the problem of genomic data privacy becomes a hot interdisciplinary research topic among geneticists, bioinformaticians and security and privacy experts. Practical attacks have been identified on genomic data, and thus break the privacy expectations of individuals who contribute their genomic data to medical research, or simply share their data online. Frustrating as it is, the problem could become even worse. Existing genomic privacy breaches rely on low-order SNV (Single Nucleotide Variant) correlations. Our work shows that far more powerful attacks can be designed if high-order correlations are utilized. We corroborate this concern by making use of different SNV correlations based on various genomic data models and applying them to an inference attack on individuals' genotype data with hidden SNVs. We also show that low-order models behave very differently from real genomic data and therefore should not be relied upon for privacy-preserving solutions.
High order correlation
Privacy preserving solutions
Security and privacy
Permalink (Please cite this version)http://hdl.handle.net/11693/27618
Showing items related by title, author, creator and subject.
Differential privacy with bounded priors: Reconciling utility and privacy in genome-wide association studies Tramèr F.; Huang, Z.; Hubaux J.-P.; Ayday, E. (Association for Computing Machinery, 2015)Differential privacy (DP) has become widely accepted as a rigorous definition of data privacy, with stronger privacy guarantees than traditional statistical methods. However, recent studies have shown that for reasonable ...
Ayday, E.; Humbert M. (Institute of Electrical and Electronics Engineers Inc., 2017)Genomic data poses serious interdependent risks: your data might also leak information about your family members' data. Methods attackers use to infer genomic information, as well as recent proposals for enhancing genomic ...
Naveed, M.; Ayday, E.; Clayton, E.W.; Fellay J.; Gunter, C.A.; Hubaux J.-P.; Malin, B.A.; Wang, X. (Association for Computing Machinery, 2015)Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highlydetailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, ...