Privacy-preserving between Individuals with Genomic Similarity
Abstract
The growth in the production of technologies that aid in gene sequencing has been accompanied by the increase in the production of genomic data about people. By analyzing this data, it is possible to identify personal and family information about individuals, much of it sensitive information. Thus, there is a need to preserve the privacy of individuals when analyzing this type of data. It is common in health institutions to carry out the process of comparing the genomic data of an individual with a set of data from other patients, seeking to find similarities between them in order to carry out similar analyzes and treatments. This work studies the preservation of the privacy of individuals in this process. We investigated perturbing genomic data through differential privacy in order to allow useful analysis and at the same time make it difficult to reidentify the genome holder.
References
Asharov, G., Halevi, S., Lindell, Y., and Rabin, T. (2018). Privacy-preserving search of similar patients in genomic data. Proc. Priv. Enhancing Technol., 2018(4):104–124.
Dwork, C., McSherry, F., Nissim, K., and Smith, A. (2006). Calibrating noise to sensitivity in private data analysis. In Halevi, S. and Rabin, T., editors, Theory of Cryptography, pages 265–284, Berlin, Heidelberg. Springer Berlin Heidelberg.
Dwork, C. and Roth, A. (2014). The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci., 9(3-4):211–407.
Lecuyer, M., Atlidakis, V., Geambasu, R., Hsu, D., and Jana, S. (2019). Certified robustness to adversarial examples with differential privacy. In 2019 IEEE Symposium on Security and Privacy (SP), pages 656–672. IEEE.
Li, N., Lyu, M., Su, D., and Yang, W. (2016). Differential Privacy: From Theory to Practice. Synthesis Lectures on Information Security, Privacy, & Trust. Morgan & Claypool Publishers.
McSherry, F. and Talwar, K. (2007). Mechanism design via differential privacy. In 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS’07), pages 94–103. IEEE.
McSherry, F. and Talwar, K. (2007). Mechanism design via differential privacy. In 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007), October 20-23, 2007, Providence, RI, USA, Proceedings, pages 94–103. IEEE Computer Society.
Shringarpure, S. S. and Bustamante, C. D. (2015). Privacy risks from genomic datasharing beacons. The American Journal of Human Genetics, 97(5):631–646.
Wang, R., Li, Y. F., Wang, X., Tang, H., and Zhou, X. (2009). Learning your identity and disease from research papers: information leaks in genome wide association study. In Al-Shaer, E., Jha, S., and Keromytis, A. D., editors, Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pages 534–544. ACM.
Wang, Z. and Moult, J. (2001). Snps, protein structure, and disease. Human mutation, 17(4):263–270.
