Literature DB >> 29121240

Privacy-preserving techniques of genomic data-a survey.

Md Momin Al Aziz1, Md Nazmus Sadat1, Dima Alhadidi2, Shuang Wang3, Xiaoqian Jiang3, Cheryl L Brown4, Noman Mohammed1.   

Abstract

Genomic data hold salient information about the characteristics of a living organism. Throughout the past decade, pinnacle developments have given us more accurate and inexpensive methods to retrieve genome sequences of humans. However, with the advancement of genomic research, there is a growing privacy concern regarding the collection, storage and analysis of such sensitive human data. Recent results show that given some background information, it is possible for an adversary to reidentify an individual from a specific genomic data set. This can reveal the current association or future susceptibility of some diseases for that individual (and sometimes the kinship between individuals) resulting in a privacy violation. Regardless of these risks, our genomic data hold much importance in analyzing the well-being of us and the future generation. Thus, in this article, we discuss the different privacy and security-related problems revolving around human genomic data. In addition, we will explore some of the cardinal cryptographic concepts, which can bring efficacy in secure and private genomic data computation. This article will relate the gaps between these two research areas-Cryptography and Genomics.
© The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

Entities:  

Keywords:  cryptographic methods on genomic data; genomic data privacy; genomic data security; privacy-preserving techniques; secure computation of genomic data

Mesh:

Year:  2019        PMID: 29121240      PMCID: PMC6585383          DOI: 10.1093/bib/bbx139

Source DB:  PubMed          Journal:  Brief Bioinform        ISSN: 1467-5463            Impact factor:   11.622


  38 in total

1.  A cryptographic approach to securely share and query genomic sequences.

Authors:  Murat Kantarcioglu; Wei Jiang; Ying Liu; Bradley Malin
Journal:  IEEE Trans Inf Technol Biomed       Date:  2008-09

2.  PREMIX: PRivacy-preserving EstiMation of Individual admiXture.

Authors:  Feng Chen; Michelle Dow; Sijie Ding; Yao Lu; Xiaoqian Jiang; Hua Tang; Shuang Wang
Journal:  AMIA Annu Symp Proc       Date:  2017-02-10

3.  PRINCESS: Privacy-protecting Rare disease International Network Collaboration via Encryption through Software guard extensionS.

Authors:  Feng Chen; Shuang Wang; Xiaoqian Jiang; Sijie Ding; Yao Lu; Jihoon Kim; S Cenk Sahinalp; Chisato Shimizu; Jane C Burns; Victoria J Wright; Eileen Png; Martin L Hibberd; David D Lloyd; Hai Yang; Amalio Telenti; Cinnamon S Bloss; Dov Fox; Kristin Lauter; Lucila Ohno-Machado
Journal:  Bioinformatics       Date:  2017-03-15       Impact factor: 6.937

4.  Genomic research and wide data sharing: views of prospective participants.

Authors:  Susan Brown Trinidad; Stephanie M Fullerton; Julie M Bares; Gail P Jarvik; Eric B Larson; Wylie Burke
Journal:  Genet Med       Date:  2010-08       Impact factor: 8.822

5.  Differentially private genome data dissemination through top-down specialization.

Authors:  Shuang Wang; Noman Mohammed; Rui Chen
Journal:  BMC Med Inform Decis Mak       Date:  2014-12-08       Impact factor: 2.796

6.  Efficient and secure outsourcing of genomic data storage.

Authors:  João Sá Sousa; Cédric Lefebvre; Zhicong Huang; Jean Louis Raisaro; Carlos Aguilar-Melchor; Marc-Olivier Killijian; Jean-Pierre Hubaux
Journal:  BMC Med Genomics       Date:  2017-07-26       Impact factor: 3.063

7.  Aftermath of bustamante attack on genomic beacon service.

Authors:  Md Momin Al Aziz; Reza Ghasemi; Md Waliullah; Noman Mohammed
Journal:  BMC Med Genomics       Date:  2017-07-26       Impact factor: 3.063

8.  BLOOM: BLoom filter based oblivious outsourced matchings.

Authors:  Jan Henrik Ziegeldorf; Jan Pennekamp; David Hellmanns; Felix Schwinger; Ike Kunze; Martin Henze; Jens Hiller; Roman Matzutt; Klaus Wehrle
Journal:  BMC Med Genomics       Date:  2017-07-26       Impact factor: 3.063

9.  Addressing Beacon re-identification attacks: quantification and mitigation of privacy risks.

Authors:  Jean Louis Raisaro; Florian Tramèr; Zhanglong Ji; Diyue Bu; Yongan Zhao; Knox Carey; David Lloyd; Heidi Sofia; Dixie Baker; Paul Flicek; Suyash Shringarpure; Carlos Bustamante; Shuang Wang; Xiaoqian Jiang; Lucila Ohno-Machado; Haixu Tang; XiaoFeng Wang; Jean-Pierre Hubaux
Journal:  J Am Med Inform Assoc       Date:  2017-07-01       Impact factor: 4.497

10.  Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays.

Authors:  Nils Homer; Szabolcs Szelinger; Margot Redman; David Duggan; Waibhav Tembe; Jill Muehling; John V Pearson; Dietrich A Stephan; Stanley F Nelson; David W Craig
Journal:  PLoS Genet       Date:  2008-08-29       Impact factor: 5.917

View more
  9 in total

1.  Parallel and private generalized suffix tree construction and query on genomic data.

Authors:  Md Momin Al Aziz; Parimala Thulasiraman; Noman Mohammed
Journal:  BMC Genom Data       Date:  2022-06-17

2.  Efficient privacy-preserving variable-length substring match for genome sequence.

Authors:  Yoshiki Nakagawa; Satsuya Ohata; Kana Shimizu
Journal:  Algorithms Mol Biol       Date:  2022-04-26       Impact factor: 1.721

3.  Secure large-scale genome data storage and query.

Authors:  Luyao Chen; Md Momin Aziz; Noman Mohammed; Xiaoqian Jiang
Journal:  Comput Methods Programs Biomed       Date:  2018-08-16       Impact factor: 5.428

Review 4.  Differential privacy in health research: A scoping review.

Authors:  Joseph Ficek; Wei Wang; Henian Chen; Getachew Dagne; Ellen Daley
Journal:  J Am Med Inform Assoc       Date:  2021-09-18       Impact factor: 7.942

5.  Privately computing set-maximal matches in genomic data.

Authors:  Katerina Sotiraki; Esha Ghosh; Hao Chen
Journal:  BMC Med Genomics       Date:  2020-07-21       Impact factor: 3.063

6.  Using game theory to thwart multistage privacy intrusions when sharing data.

Authors:  Zhiyu Wan; Yevgeniy Vorobeychik; Weiyi Xia; Yongtai Liu; Myrna Wooders; Jia Guo; Zhijun Yin; Ellen Wright Clayton; Murat Kantarcioglu; Bradley A Malin
Journal:  Sci Adv       Date:  2021-12-10       Impact factor: 14.136

7.  Efficient Privacy-Preserving Whole Genome Variant Queries.

Authors:  Mete Akgün; Nico Pfeifer; Oliver Kohlbacher
Journal:  Bioinformatics       Date:  2022-02-12       Impact factor: 6.937

8.  Privacy-Preserving Artificial Intelligence Techniques in Biomedicine.

Authors:  Reihaneh Torkzadehmahani; Reza Nasirigerdeh; David B Blumenthal; Tim Kacprowski; Markus List; Julian Matschinske; Julian Spaeth; Nina Kerstin Wenke; Jan Baumbach
Journal:  Methods Inf Med       Date:  2022-01-21       Impact factor: 1.800

9.  iDASH secure genome analysis competition 2018: blockchain genomic data access logging, homomorphic encryption on GWAS, and DNA segment searching.

Authors:  Tsung-Ting Kuo; Xiaoqian Jiang; Haixu Tang; XiaoFeng Wang; Tyler Bath; Diyue Bu; Lei Wang; Arif Harmanci; Shaojie Zhang; Degui Zhi; Heidi J Sofia; Lucila Ohno-Machado
Journal:  BMC Med Genomics       Date:  2020-07-21       Impact factor: 3.063

  9 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.