Skip to main content

Investigating Privacy Preserving Technique for Genome Data

  • Conference paper
  • First Online:
Future Internet Technologies and Trends (ICFITT 2017)

Abstract

The rapidly growing genome sequencing technology has enabled the production of huge amount of sensitive genomic data. Presently a-days, it is conceivable to create highly detailed genotypes at lower cost. Sharing of genomic dataset is a key to comprehend the hereditary premise of human ailments. Because of the sharing of such information, genuine privacy challenges emerge with the expanded number of hereditary tests and immense gathering of such genomic information. The expanded accessibility of such information has real ramifications for individual protection, since it contains basic elements of human as well as contains, illnesses points of interest, insights about relatives, past and future era, responses to medication and substantially more.

To overcome the privacy issue in genomic data, previously some solutions had been purposed based on encryption techniques. However, the existing solutions has some limitations viz., identification of an individual from Genome Wide Association Study (GWAS) sets, generated test results contain Single Nucleotide Polymorphism (SNP) information about patients etc. In this work, we aim to propose a privacy preserving technique for genomic data that strengthen the security of genomic data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Genome-wide association studies. http://www.genome.gov/20019523. Accessed 10 June 2016

  2. Homer, N., Szelinger, S., Redman, M., Duggan, D., Tembe, W., Muehling, J., Pearson, J.V., Stephan, D.A., Nelson, S.F., Craig, D.W.: Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays. PLoS Genet. 4(8), 1000167 (2008)

    Article  Google Scholar 

  3. Wang, R., Li, Y.F., Wang, X., Tang, H., Zhou, X.: Learning your identity and disease from research papers: information leaks in genome wide association study. In: CCS, pp. 534–544 (2009)

    Google Scholar 

  4. Naveed, M.: Hurdles for genomic data usage management. In: IEEE Workshop on Data Usage Management (DUMA), pp. 44–48, May 2014

    Google Scholar 

  5. Jha, S., Kruger, L., Shmatikov, V.: Towards practical privacy for genomic computation. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy, pp. 216–230 (2008)

    Google Scholar 

  6. Akgün, M., Bayrak, A.O., Ozer, B., Sağıroğlu, M.Ş.: Privacy preserving processing of genomic data: a survey. J. Biomed. Inform. 56, 103–111 (2015)

    Article  Google Scholar 

  7. Roach, J.C., Glusman, G., Smit, A.F., Huff, C.D., Hubley, R., Shannon, P.T., Rowen, L., Pant, K.P., Goodman, N., Bamshad, M., et al.: Analysis of genetic inheritance in a family quartet by whole-genome sequencing. Science 328(5978), 636–639 (2010)

    Article  Google Scholar 

  8. Burdick, J.T., Chen, W.-M., Abecasis, G.R., Cheung, V.G.: In silico method for inferring genotypes in pedigrees. Nat. Genet. 38(9), 1002–1004 (2006)

    Article  Google Scholar 

  9. Erlich, Y., Narayanan, A.: Routes for breaching and protecting genetic privacy. Nat. Rev. Genet. 15, 409–421 (2014)

    Article  Google Scholar 

  10. Yu, F., Fienberg, S.E., Slavkovic, A.B., Uhler, C.: Scalable privacy-preserving data sharing methodology for genome-wide association studies. J. Biomed. Inform. 50, 133–141 (2014)

    Article  Google Scholar 

  11. Chen, Y., Peng, B., Wang, X., Tang, H.: Large-scale privacy-preserving mapping of human genomic sequences on hybrid clouds. In: NDSS (2012)

    Google Scholar 

  12. Ayday, E., Raisaro, J.L., Hubaux, J.-P.: Privacy-Enhancing Technologies for Medical Tests Using Genomic Data, Technical report (2012)

    Google Scholar 

  13. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48910-X_16

    Google Scholar 

  14. Dwork, C.: Differential privacy. In: 33rd International Colloquium, ICALP 2006, Venice, Italy, Proceedings, Part II, 10–14 July 2006

    Google Scholar 

  15. Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our data, ourselves: privacy via distributed noise generation. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 486–503. Springer, Heidelberg (2006). https://doi.org/10.1007/11761679_29

    Chapter  Google Scholar 

  16. GWASdb SNP-Disease Associations dataset. http://amp.pharm.mssm.edu/Harmonizome/dataset/GWASdb+SNP-Disease+Associations. Accessed 10 June 2016

  17. UCI machine learning database. http://archive.ics.uci.edu/ml/machine-learning-databases/heart-disease/processed.hungarian.data. Accessed 10 June 2016

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Slesha S. Sanghvi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sanghvi, S.S., Patel, S.J. (2018). Investigating Privacy Preserving Technique for Genome Data. In: Patel, Z., Gupta, S. (eds) Future Internet Technologies and Trends. ICFITT 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 220. Springer, Cham. https://doi.org/10.1007/978-3-319-73712-6_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-73712-6_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-73711-9

  • Online ISBN: 978-3-319-73712-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics