scispace - formally typeset
Open AccessJournal ArticleDOI

Routes for breaching and protecting genetic privacy.

Reads0
Chats0
TLDR
An overview of genetic privacy breaching strategies is presented, outlining the principles of each technique, the underlying assumptions, and their technological complexity and maturation, as well as highlighting different cases that are relevant to genetic applications.
Abstract
We are entering an era of ubiquitous genetic information for research, clinical care and personal curiosity. Sharing these data sets is vital for progress in biomedical research. However, a growing concern is the ability to protect the genetic privacy of the data originators. Here, we present an overview of genetic privacy breaching strategies. We outline the principles of each technique, indicate the underlying assumptions, and assess their technological complexity and maturation. We then review potential mitigation methods for privacy-preserving dissemination of sensitive data and highlight different cases that are relevant to genetic applications.

read more

Content maybe subject to copyright    Report

Citations
More filters

Hundreds of variants clustered in genomic loci and biological pathways affect human height

Hana Lango Allen, +289 more
TL;DR: In this paper, the authors show that hundreds of genetic variants, in at least 180 loci, influence adult height, a highly heritable and classic polygenic trait, revealing patterns with important implications for genetic studies of common human diseases and traits.
Journal ArticleDOI

Big data: Astronomical or genomical?

TL;DR: Estimates show that genomics is a “four-headed beast”—it is either on par with or the most demanding of the domains analyzed here in terms of data acquisition, storage, distribution, and analysis.
Journal ArticleDOI

Understanding the Promises and Hurdles of Metagenomic Next-Generation Sequencing as a Diagnostic Tool for Infectious Diseases.

TL;DR: With the development of mNGS assays, it is essential for treating practitioners to understand both the power and limitations of the method as a diagnostic tool.
Journal ArticleDOI

Dissecting the genetics of complex traits using summary association statistics

TL;DR: Recent progress on statistical methods that leverage summary association data to gain insights into the genetic basis of complex traits and diseases are reviewed.
References
More filters
Journal ArticleDOI

Communication theory of secrecy systems

TL;DR: A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.
Journal ArticleDOI

k -anonymity: a model for protecting privacy

TL;DR: The solution provided in this paper includes a formal protection model named k-anonymity and a set of accompanying policies for deployment and examines re-identification attacks that can be realized on releases that adhere to k- anonymity unless accompanying policies are respected.
Journal ArticleDOI

An integrated map of genetic variation from 1,092 human genomes

TL;DR: It is shown that evolutionary conservation and coding consequence are key determinants of the strength of purifying selection, that rare-variant load varies substantially across biological pathways, and that each individual contains hundreds of rare non-coding variants at conserved sites, such as motif-disrupting changes in transcription-factor-binding sites.
Book ChapterDOI

Public-key cryptosystems based on composite degree residuosity classes

TL;DR: A new trapdoor mechanism is proposed and three encryption schemes are derived : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA, which are provably secure under appropriate assumptions in the standard model.
Book ChapterDOI

Calibrating noise to sensitivity in private data analysis

TL;DR: In this article, the authors show that for several particular applications substantially less noise is needed than was previously understood to be the case, and also show the separation results showing the increased value of interactive sanitization mechanisms over non-interactive.
Related Papers (5)