Cargando…
Privacy preserving protocol for detecting genetic relatives using rare variants
Motivation: High-throughput sequencing technologies have impacted many areas of genetic research. One such area is the identification of relatives from genetic data. The standard approach for the identification of genetic relatives collects the genomic data of all individuals and stores it in a data...
Autores principales: | , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Oxford University Press
2014
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4058916/ https://www.ncbi.nlm.nih.gov/pubmed/24931985 http://dx.doi.org/10.1093/bioinformatics/btu294 |
_version_ | 1782321185725349888 |
---|---|
author | Hormozdiari, Farhad Joo, Jong Wha J Wadia, Akshay Guan, Feng Ostrosky, Rafail Sahai, Amit Eskin, Eleazar |
author_facet | Hormozdiari, Farhad Joo, Jong Wha J Wadia, Akshay Guan, Feng Ostrosky, Rafail Sahai, Amit Eskin, Eleazar |
author_sort | Hormozdiari, Farhad |
collection | PubMed |
description | Motivation: High-throughput sequencing technologies have impacted many areas of genetic research. One such area is the identification of relatives from genetic data. The standard approach for the identification of genetic relatives collects the genomic data of all individuals and stores it in a database. Then, each pair of individuals is compared to detect the set of genetic relatives, and the matched individuals are informed. The main drawback of this approach is the requirement of sharing your genetic data with a trusted third party to perform the relatedness test. Results: In this work, we propose a secure protocol to detect the genetic relatives from sequencing data while not exposing any information about their genomes. We assume that individuals have access to their genome sequences but do not want to share their genomes with anyone else. Unlike previous approaches, our approach uses both common and rare variants which provide the ability to detect much more distant relationships securely. We use a simulated data generated from the 1000 genomes data and illustrate that we can easily detect up to fifth degree cousins which was not possible using the existing methods. We also show in the 1000 genomes data with cryptic relationships that our method can detect these individuals. Availability: The software is freely available for download at http://genetics.cs.ucla.edu/crypto/. Contact: fhormoz@cs.ucla.edu or eeskin@cs.ucla.edu Supplementary information: Supplementary data are available at Bioinformatics online |
format | Online Article Text |
id | pubmed-4058916 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2014 |
publisher | Oxford University Press |
record_format | MEDLINE/PubMed |
spelling | pubmed-40589162014-06-18 Privacy preserving protocol for detecting genetic relatives using rare variants Hormozdiari, Farhad Joo, Jong Wha J Wadia, Akshay Guan, Feng Ostrosky, Rafail Sahai, Amit Eskin, Eleazar Bioinformatics Ismb 2014 Proceedings Papers Committee Motivation: High-throughput sequencing technologies have impacted many areas of genetic research. One such area is the identification of relatives from genetic data. The standard approach for the identification of genetic relatives collects the genomic data of all individuals and stores it in a database. Then, each pair of individuals is compared to detect the set of genetic relatives, and the matched individuals are informed. The main drawback of this approach is the requirement of sharing your genetic data with a trusted third party to perform the relatedness test. Results: In this work, we propose a secure protocol to detect the genetic relatives from sequencing data while not exposing any information about their genomes. We assume that individuals have access to their genome sequences but do not want to share their genomes with anyone else. Unlike previous approaches, our approach uses both common and rare variants which provide the ability to detect much more distant relationships securely. We use a simulated data generated from the 1000 genomes data and illustrate that we can easily detect up to fifth degree cousins which was not possible using the existing methods. We also show in the 1000 genomes data with cryptic relationships that our method can detect these individuals. Availability: The software is freely available for download at http://genetics.cs.ucla.edu/crypto/. Contact: fhormoz@cs.ucla.edu or eeskin@cs.ucla.edu Supplementary information: Supplementary data are available at Bioinformatics online Oxford University Press 2014-06-15 2014-06-11 /pmc/articles/PMC4058916/ /pubmed/24931985 http://dx.doi.org/10.1093/bioinformatics/btu294 Text en © The Author 2014. Published by Oxford University Press. http://creativecommons.org/licenses/by/3.0/ This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by/3.0/), which permits non-commercial re-use, distribution, and reproduction in any medium, provided the original work is properly cited. For commercial re-use, please contact journals.permissions@oup.com. |
spellingShingle | Ismb 2014 Proceedings Papers Committee Hormozdiari, Farhad Joo, Jong Wha J Wadia, Akshay Guan, Feng Ostrosky, Rafail Sahai, Amit Eskin, Eleazar Privacy preserving protocol for detecting genetic relatives using rare variants |
title | Privacy preserving protocol for detecting genetic relatives using rare variants |
title_full | Privacy preserving protocol for detecting genetic relatives using rare variants |
title_fullStr | Privacy preserving protocol for detecting genetic relatives using rare variants |
title_full_unstemmed | Privacy preserving protocol for detecting genetic relatives using rare variants |
title_short | Privacy preserving protocol for detecting genetic relatives using rare variants |
title_sort | privacy preserving protocol for detecting genetic relatives using rare variants |
topic | Ismb 2014 Proceedings Papers Committee |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4058916/ https://www.ncbi.nlm.nih.gov/pubmed/24931985 http://dx.doi.org/10.1093/bioinformatics/btu294 |
work_keys_str_mv | AT hormozdiarifarhad privacypreservingprotocolfordetectinggeneticrelativesusingrarevariants AT joojongwhaj privacypreservingprotocolfordetectinggeneticrelativesusingrarevariants AT wadiaakshay privacypreservingprotocolfordetectinggeneticrelativesusingrarevariants AT guanfeng privacypreservingprotocolfordetectinggeneticrelativesusingrarevariants AT ostroskyrafail privacypreservingprotocolfordetectinggeneticrelativesusingrarevariants AT sahaiamit privacypreservingprotocolfordetectinggeneticrelativesusingrarevariants AT eskineleazar privacypreservingprotocolfordetectinggeneticrelativesusingrarevariants |