Quantifying interdependent risks in genomic privacy

dc.citation.epage3:31en_US
dc.citation.issueNumber1en_US
dc.citation.spage3:1en_US
dc.citation.volumeNumber20en_US
dc.contributor.authorHumbert M.en_US
dc.contributor.authorAyday, E.en_US
dc.contributor.authorHubaux, Jean-Pierreen_US
dc.contributor.authorTelenti A.en_US
dc.date.accessioned2019-02-13T09:19:32Z
dc.date.available2019-02-13T09:19:32Z
dc.date.issued2017-02en_US
dc.departmentDepartment of Computer Engineeringen_US
dc.description.abstractThe rapid progress in human-genome sequencing is leading to a high availability of genomic data. These data is notoriously very sensitive and stable in time, and highly correlated among relatives. In this article, we study the implications of these familial correlations on kin genomic privacy. We formalize the problem and detail efficient reconstruction attacks based on graphical models and belief propagation. With our approach, an attacker can infer the genomes of the relatives of an individual whose genome or phenotype are observed by notably relying on Mendel’s Laws, statistical relationships between the genomic variants, and between the genome and the phenotype. We evaluate the effect of these dependencies on privacy with respect to the amount of observed variants and the relatives sharing them. We also study how the algorithmic performance evolves when we take these various relationships into account. Furthermore, to quantify the level of genomic privacy as a result of the proposed inference attack, we discuss possible definitions of genomic privacy metrics, and compare their values and evolution. Genomic data reveals Mendelian disorders and the likelihood of developing severe diseases, such as Alzheimer’s. We also introduce the quantification of health privacy, specifically, the measure of how well the predisposition to a disease is concealed from an attacker. We evaluate our approach on actual genomic data from a pedigree and show the threat extent by combining data gathered from a genome-sharing website as well as an online social network.en_US
dc.description.provenanceSubmitted by Türkan Cesur (cturkan@bilkent.edu.tr) on 2019-02-13T09:19:32Z No. of bitstreams: 1 Quantifying_interdependent_risks_in_genomic_privacy.pdf: 1305211 bytes, checksum: a003c240b32aa85ef252e728b39b1538 (MD5)en
dc.description.provenanceMade available in DSpace on 2019-02-13T09:19:32Z (GMT). No. of bitstreams: 1 Quantifying_interdependent_risks_in_genomic_privacy.pdf: 1305211 bytes, checksum: a003c240b32aa85ef252e728b39b1538 (MD5) Previous issue date: 2017-02en
dc.identifier.doi10.1145/3035538en_US
dc.identifier.eissn2471-2574
dc.identifier.issn2471-2566
dc.identifier.urihttp://hdl.handle.net/11693/49405
dc.language.isoEnglishen_US
dc.publisherAssociation for Computing Machineryen_US
dc.relation.isversionofhttp://doi.org/10.1145/3035538en_US
dc.source.titleACM Transactions on Privacy and Security (TOPS)en_US
dc.subjectSecurity and privacyen_US
dc.subjectApplied computingen_US
dc.subjectSecurity servicesen_US
dc.subjectHuman and societal aspects of security and privacyen_US
dc.subjectLife and medical sciencesen_US
dc.subjectPrivacy protectionsen_US
dc.subjectGenomicsen_US
dc.subjectPseudonymity, anonymity and untraceabilityen_US
dc.titleQuantifying interdependent risks in genomic privacyen_US
dc.typeArticleen_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Quantifying_interdependent_risks_in_genomic_privacy.pdf
Size:
1.24 MB
Format:
Adobe Portable Document Format
Description:
Full printable version
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: