Controlling the signal: Practical privacy protection of genomic data sharing through Beacon services

被引:15
|
作者
Wan, Zhiyu [1 ]
Vorobeychik, Yevgeniy [1 ,2 ]
Kantarcioglu, Murat [3 ]
Malin, Bradley [1 ,2 ,4 ]
机构
[1] Vanderbilt Univ, Dept Elect Engn & Comp Sci, 2525 West End Ave,Suite 800, Nashville, TN 37203 USA
[2] Vanderbilt Univ, Dept Biomed Informat, 221 Kirkland Hall, Nashville, TN 37235 USA
[3] Univ Texas Dallas, Dept Comp Sci, Richardson, TX 75083 USA
[4] Vanderbilt Univ, Dept Biostat, 221 Kirkland Hall, Nashville, TN 37235 USA
关键词
Genomic databases; Beacon service; Data sharing; Privacy; Perturbation; iDASH challenge; GENETICS;
D O I
10.1186/s12920-017-0282-1
中图分类号
Q3 [遗传学];
学科分类号
071007 ; 090102 ;
摘要
Background: Genomic data is increasingly collected by a wide array of organizations. As such, there is a growing demand to make summary information about such collections available more widely. However, over the past decade, a series of investigations have shown that attacks, rooted in statistical inference methods, can be applied to discern the presence of a known individual's DNA sequence in the pool of subjects. Recently, it was shown that the Beacon Project of the Global Alliance for Genomics and Health, a web service for querying about the presence (or absence) of a specific allele, was vulnerable. The Integrating Data for Analysis, Anonymization, and Sharing (iDASH) Center modeled a track in their third Privacy Protection Challenge on how to mitigate the Beacon vulnerability. We developed the winning solution for this track. Methods: This paper describes our computational method to optimize the tradeoff between the utility and the privacy of the Beacon service. We generalize the genomic data sharing problem beyond that which was introduced in the iDASH Challenge to be more representative of real world scenarios to allow for a more comprehensive evaluation. We then conduct a sensitivity analysis of our method with respect to several state-of-the-art methods using a dataset of 400,000 positions in Chromosome 10 for 500 individuals from Phase 3 of the 1000 Genomes Project. All methods are evaluated for utility, privacy and efficiency. Results: Our method achieves better performance than all state-of-the-art methods, irrespective of how key factors (e.g., the allele frequency in the population, the size of the pool and utility weights) change from the original parameters of the problem. We further illustrate that it is possible for our method to exhibit subpar performance under special cases of allele query sequences. However, we show our method can be extended to address this issue when the query sequence is fixed and known a priori to the data custodian, so that they may plan stage their responses accordingly. Conclusions: This research shows that it is possible to thwart the attack on Beacon services, without substantially altering the utility of the system, using computational methods. The method we initially developed is limited by the design of the scenario and evaluation protocol for the iDASH Challenge; however, it can be improved by allowing the data custodian to act in a staged manner.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Controlling the signal: Practical privacy protection of genomic data sharing through Beacon services
    Zhiyu Wan
    Yevgeniy Vorobeychik
    Murat Kantarcioglu
    Bradley Malin
    [J]. BMC Medical Genomics, 10
  • [2] Sharing of Genomic Data: Exploring the Privacy Implications of the Changing Status of Genomic Data
    Otlowski, Margaret
    Eckstein, Lisa
    [J]. JOURNAL OF LAW AND MEDICINE, 2023, 30 (02) : 326 - 344
  • [3] Are Data Sharing and Privacy Protection Mutually Exclusive?
    Joly, Yann
    Dyke, Stephanie O. M.
    Knoppers, Bartha M.
    Pastinen, Tomi
    [J]. CELL, 2016, 167 (05) : 1150 - 1154
  • [4] The Protection of Data Sharing for Privacy in Financial Vision
    Wang, Yi-Ren
    Tsai, Yun-Cheng
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (15):
  • [5] Privacy challenges and research opportunities for genomic data sharing
    Luca Bonomi
    Yingxiang Huang
    Lucila Ohno-Machado
    [J]. Nature Genetics, 2020, 52 : 646 - 654
  • [6] Privacy challenges and research opportunities for genomic data sharing
    Bonomi, Luca
    Huang, Yingxiang
    Ohno-Machado, Lucila
    [J]. NATURE GENETICS, 2020, 52 (07) : 646 - 654
  • [7] Privacy Protection for Medical Data Sharing in Smart Healthcare
    Fang, Liming
    Yin, Changchun
    Zhu, Juncen
    Ge, Chunpeng
    Tanveer, M.
    Jolfaei, Alireza
    Cao, Zehong
    [J]. ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2021, 16 (03)
  • [8] Sharing Time-to-Event Data with Privacy Protection
    Bonomi, Luca
    Fan, Liyue
    [J]. 2022 IEEE 10TH INTERNATIONAL CONFERENCE ON HEALTHCARE INFORMATICS (ICHI 2022), 2022, : 11 - 20
  • [9] Responsible, practical genomic data sharing that accelerates research
    James Brian Byrd
    Anna C. Greene
    Deepashree Venkatesh Prasad
    Xiaoqian Jiang
    Casey S. Greene
    [J]. Nature Reviews Genetics, 2020, 21 : 615 - 629
  • [10] Genomic Data Privacy Protection using Compressed Sensing
    Roozgard, Aminmohammad
    Barzigar, Nafise
    Verma, Pramode
    Cheng, Samuel
    [J]. TRANSACTIONS ON DATA PRIVACY, 2016, 9 (01) : 1 - 13