Skip to main content

Modeling SNP-Trait Associations and Realizing Privacy-Utility Tradeoff in Genomic Data Publishing

  • Conference paper
  • First Online:
Bioinformatics Research and Applications (ISBRA 2019)

Part of the book series: Lecture Notes in Computer Science ((LNBI,volume 11490))

Included in the following conference series:

Abstract

Genomic data privacy arises as one of the most important concerns facing the wide commoditization of DNA-genotyping. In this paper, we study the problem of privacy preserved kin-genomic data publishing. The major challenge in protecting kin-genomic data privacy is to protect against powerful attackers with abundant background knowledge. We propose a probabilistic model based on factor graph with the knowledge of publicly available GWAS statistics to reveal the dependency relationship between genotypes and phenotypes. Furthermore, a genomic data sanitization method is proposed to protect against optimal inference attacks launched by powerful attackers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. https://www.23andme.com/

  2. https://opensnp.org/

  3. https://www.patientslikeme.com/

  4. http://www.nytimes.com/2013/03/24/opinion/sunday/the-immortal-life-of-henrietta-lacks-the-sequel.html?pagewanted=all

  5. The NHGRI-EBI catalog of published genome-wide association studies. https://www.ebi.ac.uk/gwas/docs/about

  6. Cai, Z., He, Z., Guan, X., Li, Y.: Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans. Depend. Secure Comput. 15(4), 577–590 (2018)

    Google Scholar 

  7. Gymrek, M., McGuire, A.L., Golan, D., Halperin, E., Erlich, Y.: Identifying personal genomes by surname inference. Science 339(6117), 321–324 (2013)

    Article  Google Scholar 

  8. He, Z., Yu, J., Li, J., Han, Q., Luo, G., Li, Y.: Inference attacks and controls on genotypes and phenotypes for individual genomic data. IEEE/ACM Trans. Comput. Biol. Bioinform. 1 (2018)

    Google Scholar 

  9. He, Z., Cai, Z., Li, Y.: Customized privacy preserving for classification based applications. In: Proceedings of the 1st ACM Workshop on Privacy-Aware Mobile Computing, pp. 37–42. ACM (2016)

    Google Scholar 

  10. He, Z., Cai, Z., Yu, J., Wang, X., Sun, Y., Li, Y.: Cost-efficient strategies for restraining rumor spreading in mobile social networks. IEEE Trans. Veh. Technol. 66(3), 2789–2800 (2017)

    Article  Google Scholar 

  11. He, Z., Li, Y., Li, J., Li, K., Cai, Q., Liang, Y.: Achieving differential privacy of genomic data releasing via belief propagation. Tsinghua Sci. Technol. 23(4), 389–395 (2018)

    Article  Google Scholar 

  12. He, Z., Li, Y., Li, J., Yu, J., Gao, H., Wang, J.: Addressing the threats of inference attacks on traits and genotypes from individual genomic data. In: Cai, Z., Daescu, O., Li, M. (eds.) ISBRA 2017. LNCS, vol. 10330, pp. 223–233. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-59575-7_20

    Chapter  Google Scholar 

  13. He, Z., Li, Y., Wang, J.: Differential privacy preserving genomic data releasing via factor graph. In: Cai, Z., Daescu, O., Li, M. (eds.) ISBRA 2017. LNCS, vol. 10330, pp. 350–355. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-59575-7_33

    Chapter  Google Scholar 

  14. Humbert, M., Ayday, E., Hubaux, J.P., Telenti, A.: Addressing the concerns of the lacks family: quantification of kin genomic privacy. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 1141–1152. ACM (2013)

    Google Scholar 

  15. Humbert, M., Huguenin, K., Hugonot, J., Ayday, E., Hubaux, J.P.: De-anonymizing genomic databases using phenotypic traits. Proc. Priv. Enhancing Technol. 2015(2), 99–114 (2015)

    Article  Google Scholar 

  16. Saghai-Maroof, M.A., Soliman, K.M., Jorgensen, R.A., Allard, R.: Ribosomal dna spacer-length polymorphisms in barley: mendelian inheritance, chromosomal location, and population dynamics. Proc. Natl. Acad. Sci. 81(24), 8014–8018 (1984)

    Article  Google Scholar 

  17. Sweeney, L., Abu, A., Winn, J.: Identifying participants in the personal genome project by name (a re-identification experiment). arXiv preprint arXiv:1304.7605 (2013)

  18. Wang, Y., Wu, X., Shi, X.: Using aggregate human genome data for individual identification. In: 2013 IEEE International Conference on Bioinformatics and Biomedicine, pp. 410–415, December 2013

    Google Scholar 

  19. Zheng, X., Cai, Z., Li, J., Gao, H.: Location-privacy-aware review publication mechanism for local business service systems. In: IEEE INFOCOM 2017-IEEE Conference on Computer Communications, pp. 1–9. IEEE (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Zaobo He or Jianqiang Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

He, Z., Li, J. (2019). Modeling SNP-Trait Associations and Realizing Privacy-Utility Tradeoff in Genomic Data Publishing. In: Cai, Z., Skums, P., Li, M. (eds) Bioinformatics Research and Applications. ISBRA 2019. Lecture Notes in Computer Science(), vol 11490. Springer, Cham. https://doi.org/10.1007/978-3-030-20242-2_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-20242-2_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-20241-5

  • Online ISBN: 978-3-030-20242-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics