Can you really anonymize the donors of genomic data in today’s digital world?

dc.citation.epage244en_US
dc.citation.spage237en_US
dc.contributor.authorAlser, Mohammeden_US
dc.contributor.authorAlmadhoun, Nouren_US
dc.contributor.authorNouri, Azitaen_US
dc.contributor.authorAlkan, Canen_US
dc.contributor.authorAyday, Ermanen_US
dc.coverage.spatialVienna, Austria
dc.date.accessioned2018-04-12T11:42:19Z
dc.date.available2018-04-12T11:42:19Z
dc.date.issued2016-09en_US
dc.departmentDepartment of Computer Engineeringen_US
dc.descriptionDate of Conference: 21-22 September, 2015
dc.descriptionConference name: DPM: International Workshop on Data Privacy Management QASA: International Workshop on Quantitative Aspects in Security Assuranc - 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015
dc.description.abstractThe rapid progress in genome sequencing technologies leads to availability of high amounts of genomic data. Accelerating the pace of biomedical breakthroughs and discoveries necessitates not only collecting millions of genetic samples but also granting open access to genetic databases. However, one growing concern is the ability to protect the privacy of sensitive information and its owner. In this work, we survey a wide spectrum of cross-layer privacy breaching strategies to human genomic data (using both public genomic databases and other public non-genomic data). We outline the principles and outcomes of each technique, and assess its technological complexity and maturation. We then review potential privacy-preserving countermeasure mechanisms for each threat. © Springer International Publishing Switzerland 2016.en_US
dc.description.provenanceMade available in DSpace on 2018-04-12T11:42:19Z (GMT). No. of bitstreams: 1 bilkent-research-paper.pdf: 179475 bytes, checksum: ea0bedeb05ac9ccfb983c327e155f0c2 (MD5) Previous issue date: 2016en
dc.identifier.doi10.1007/978-3-319-29883-2_16en_US
dc.identifier.issn0302-9743
dc.identifier.urihttp://hdl.handle.net/11693/37504
dc.language.isoEnglishen_US
dc.publisherSpringeren_US
dc.relation.isversionofhttp://dx.doi.org/10.1007/978-3-319-29883-2_16en_US
dc.source.titleData Privacy Management, and Security Assurance 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015en_US
dc.subjectBioinformaticsen_US
dc.subjectGenomicsen_US
dc.subjectPrivacyen_US
dc.subjectGenesen_US
dc.subjectDigital worlden_US
dc.subjectGenome sequencingen_US
dc.subjectGenomic databaseen_US
dc.subjectPrivacy preservingen_US
dc.subjectSensitive informationsen_US
dc.subjectTechnological complexityen_US
dc.subjectWide spectrumen_US
dc.subjectData privacyen_US
dc.titleCan you really anonymize the donors of genomic data in today’s digital world?en_US
dc.typeConference Paperen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Can-you-Really-Anonymize-the-Donors.pdf
Size:
932.66 KB
Format:
Adobe Portable Document Format
Description:
Full printable version