Cargando…

Identifying genetic relatives without compromising privacy

The development of high-throughput genomic technologies has impacted many areas of genetic research. While many applications of these technologies focus on the discovery of genes involved in disease from population samples, applications of genomic technologies to an individual’s genome or personal g...

Descripción completa

Detalles Bibliográficos
Autores principales: He, Dan, Furlotte, Nicholas A., Hormozdiari, Farhad, Joo, Jong Wha J., Wadia, Akshay, Ostrovsky, Rafail, Sahai, Amit, Eskin, Eleazar
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Cold Spring Harbor Laboratory Press 2014
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3975065/
https://www.ncbi.nlm.nih.gov/pubmed/24614977
http://dx.doi.org/10.1101/gr.153346.112
_version_ 1782310078614863872
author He, Dan
Furlotte, Nicholas A.
Hormozdiari, Farhad
Joo, Jong Wha J.
Wadia, Akshay
Ostrovsky, Rafail
Sahai, Amit
Eskin, Eleazar
author_facet He, Dan
Furlotte, Nicholas A.
Hormozdiari, Farhad
Joo, Jong Wha J.
Wadia, Akshay
Ostrovsky, Rafail
Sahai, Amit
Eskin, Eleazar
author_sort He, Dan
collection PubMed
description The development of high-throughput genomic technologies has impacted many areas of genetic research. While many applications of these technologies focus on the discovery of genes involved in disease from population samples, applications of genomic technologies to an individual’s genome or personal genomics have recently gained much interest. One such application is the identification of relatives from genetic data. In this application, genetic information from a set of individuals is collected in a database, and each pair of individuals is compared in order to identify genetic relatives. An inherent issue that arises in the identification of relatives is privacy. In this article, we propose a method for identifying genetic relatives without compromising privacy by taking advantage of novel cryptographic techniques customized for secure and private comparison of genetic information. We demonstrate the utility of these techniques by allowing a pair of individuals to discover whether or not they are related without compromising their genetic information or revealing it to a third party. The idea is that individuals only share enough special-purpose cryptographically protected information with each other to identify whether or not they are relatives, but not enough to expose any information about their genomes. We show in HapMap and 1000 Genomes data that our method can recover first- and second-order genetic relationships and, through simulations, show that our method can identify relationships as distant as third cousins while preserving privacy.
format Online
Article
Text
id pubmed-3975065
institution National Center for Biotechnology Information
language English
publishDate 2014
publisher Cold Spring Harbor Laboratory Press
record_format MEDLINE/PubMed
spelling pubmed-39750652014-10-01 Identifying genetic relatives without compromising privacy He, Dan Furlotte, Nicholas A. Hormozdiari, Farhad Joo, Jong Wha J. Wadia, Akshay Ostrovsky, Rafail Sahai, Amit Eskin, Eleazar Genome Res Method The development of high-throughput genomic technologies has impacted many areas of genetic research. While many applications of these technologies focus on the discovery of genes involved in disease from population samples, applications of genomic technologies to an individual’s genome or personal genomics have recently gained much interest. One such application is the identification of relatives from genetic data. In this application, genetic information from a set of individuals is collected in a database, and each pair of individuals is compared in order to identify genetic relatives. An inherent issue that arises in the identification of relatives is privacy. In this article, we propose a method for identifying genetic relatives without compromising privacy by taking advantage of novel cryptographic techniques customized for secure and private comparison of genetic information. We demonstrate the utility of these techniques by allowing a pair of individuals to discover whether or not they are related without compromising their genetic information or revealing it to a third party. The idea is that individuals only share enough special-purpose cryptographically protected information with each other to identify whether or not they are relatives, but not enough to expose any information about their genomes. We show in HapMap and 1000 Genomes data that our method can recover first- and second-order genetic relationships and, through simulations, show that our method can identify relationships as distant as third cousins while preserving privacy. Cold Spring Harbor Laboratory Press 2014-04 /pmc/articles/PMC3975065/ /pubmed/24614977 http://dx.doi.org/10.1101/gr.153346.112 Text en © 2014 He et al.; Published by Cold Spring Harbor Laboratory Press http://creativecommons.org/licenses/by-nc/3.0/ This article is distributed exclusively by Cold Spring Harbor Laboratory Press for the first six months after the full-issue publication date (see http://genome.cshlp.org/site/misc/terms.xhtml). After six months, it is available under a Creative Commons License (Attribution-NonCommercial 3.0 Unported), as described at http://creativecommons.org/licenses/by-nc/3.0/.
spellingShingle Method
He, Dan
Furlotte, Nicholas A.
Hormozdiari, Farhad
Joo, Jong Wha J.
Wadia, Akshay
Ostrovsky, Rafail
Sahai, Amit
Eskin, Eleazar
Identifying genetic relatives without compromising privacy
title Identifying genetic relatives without compromising privacy
title_full Identifying genetic relatives without compromising privacy
title_fullStr Identifying genetic relatives without compromising privacy
title_full_unstemmed Identifying genetic relatives without compromising privacy
title_short Identifying genetic relatives without compromising privacy
title_sort identifying genetic relatives without compromising privacy
topic Method
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3975065/
https://www.ncbi.nlm.nih.gov/pubmed/24614977
http://dx.doi.org/10.1101/gr.153346.112
work_keys_str_mv AT hedan identifyinggeneticrelativeswithoutcompromisingprivacy
AT furlottenicholasa identifyinggeneticrelativeswithoutcompromisingprivacy
AT hormozdiarifarhad identifyinggeneticrelativeswithoutcompromisingprivacy
AT joojongwhaj identifyinggeneticrelativeswithoutcompromisingprivacy
AT wadiaakshay identifyinggeneticrelativeswithoutcompromisingprivacy
AT ostrovskyrafail identifyinggeneticrelativeswithoutcompromisingprivacy
AT sahaiamit identifyinggeneticrelativeswithoutcompromisingprivacy
AT eskineleazar identifyinggeneticrelativeswithoutcompromisingprivacy