Cargando…
A community effort to protect genomic data sharing, collaboration and outsourcing
The human genome can reveal sensitive information and is potentially re-identifiable, which raises privacy and security concerns about sharing such data on wide scales. In 2016, we organized the third Critical Assessment of Data Privacy and Protection competition as a community effort to bring toget...
Autores principales: | , , , , , , , , , , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2017
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5677972/ https://www.ncbi.nlm.nih.gov/pubmed/29263842 http://dx.doi.org/10.1038/s41525-017-0036-1 |
_version_ | 1783277346048966656 |
---|---|
author | Wang, Shuang Jiang, Xiaoqian Tang, Haixu Wang, Xiaofeng Bu, Diyue Carey, Knox Dyke, Stephanie OM Fox, Dov Jiang, Chao Lauter, Kristin Malin, Bradley Sofia, Heidi Telenti, Amalio Wang, Lei Wang, Wenhao Ohno-Machado, Lucila |
author_facet | Wang, Shuang Jiang, Xiaoqian Tang, Haixu Wang, Xiaofeng Bu, Diyue Carey, Knox Dyke, Stephanie OM Fox, Dov Jiang, Chao Lauter, Kristin Malin, Bradley Sofia, Heidi Telenti, Amalio Wang, Lei Wang, Wenhao Ohno-Machado, Lucila |
author_sort | Wang, Shuang |
collection | PubMed |
description | The human genome can reveal sensitive information and is potentially re-identifiable, which raises privacy and security concerns about sharing such data on wide scales. In 2016, we organized the third Critical Assessment of Data Privacy and Protection competition as a community effort to bring together biomedical informaticists, computer privacy and security researchers, and scholars in ethical, legal, and social implications (ELSI) to assess the latest advances on privacy-preserving techniques for protecting human genomic data. Teams were asked to develop novel protection methods for emerging genome privacy challenges in three scenarios: Track (1) data sharing through the Beacon service of the Global Alliance for Genomics and Health. Track (2) collaborative discovery of similar genomes between two institutions; and Track (3) data outsourcing to public cloud services. The latter two tracks represent continuing themes from our 2015 competition, while the former was new and a response to a recently established vulnerability. The winning strategy for Track 1 mitigated the privacy risk by hiding approximately 11% of the variation in the database while permitting around 160,000 queries, a significant improvement over the baseline. The winning strategies in Tracks 2 and 3 showed significant progress over the previous competition by achieving multiple orders of magnitude performance improvement in terms of computational runtime and memory requirements. The outcomes suggest that applying highly optimized privacy-preserving and secure computation techniques to safeguard genomic data sharing and analysis is useful. However, the results also indicate that further efforts are needed to refine these techniques into practical solutions. |
format | Online Article Text |
id | pubmed-5677972 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2017 |
publisher | Nature Publishing Group UK |
record_format | MEDLINE/PubMed |
spelling | pubmed-56779722017-12-20 A community effort to protect genomic data sharing, collaboration and outsourcing Wang, Shuang Jiang, Xiaoqian Tang, Haixu Wang, Xiaofeng Bu, Diyue Carey, Knox Dyke, Stephanie OM Fox, Dov Jiang, Chao Lauter, Kristin Malin, Bradley Sofia, Heidi Telenti, Amalio Wang, Lei Wang, Wenhao Ohno-Machado, Lucila NPJ Genom Med Perspective The human genome can reveal sensitive information and is potentially re-identifiable, which raises privacy and security concerns about sharing such data on wide scales. In 2016, we organized the third Critical Assessment of Data Privacy and Protection competition as a community effort to bring together biomedical informaticists, computer privacy and security researchers, and scholars in ethical, legal, and social implications (ELSI) to assess the latest advances on privacy-preserving techniques for protecting human genomic data. Teams were asked to develop novel protection methods for emerging genome privacy challenges in three scenarios: Track (1) data sharing through the Beacon service of the Global Alliance for Genomics and Health. Track (2) collaborative discovery of similar genomes between two institutions; and Track (3) data outsourcing to public cloud services. The latter two tracks represent continuing themes from our 2015 competition, while the former was new and a response to a recently established vulnerability. The winning strategy for Track 1 mitigated the privacy risk by hiding approximately 11% of the variation in the database while permitting around 160,000 queries, a significant improvement over the baseline. The winning strategies in Tracks 2 and 3 showed significant progress over the previous competition by achieving multiple orders of magnitude performance improvement in terms of computational runtime and memory requirements. The outcomes suggest that applying highly optimized privacy-preserving and secure computation techniques to safeguard genomic data sharing and analysis is useful. However, the results also indicate that further efforts are needed to refine these techniques into practical solutions. Nature Publishing Group UK 2017-10-27 /pmc/articles/PMC5677972/ /pubmed/29263842 http://dx.doi.org/10.1038/s41525-017-0036-1 Text en © The Author(s) 2017 Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/. |
spellingShingle | Perspective Wang, Shuang Jiang, Xiaoqian Tang, Haixu Wang, Xiaofeng Bu, Diyue Carey, Knox Dyke, Stephanie OM Fox, Dov Jiang, Chao Lauter, Kristin Malin, Bradley Sofia, Heidi Telenti, Amalio Wang, Lei Wang, Wenhao Ohno-Machado, Lucila A community effort to protect genomic data sharing, collaboration and outsourcing |
title | A community effort to protect genomic data sharing, collaboration and outsourcing |
title_full | A community effort to protect genomic data sharing, collaboration and outsourcing |
title_fullStr | A community effort to protect genomic data sharing, collaboration and outsourcing |
title_full_unstemmed | A community effort to protect genomic data sharing, collaboration and outsourcing |
title_short | A community effort to protect genomic data sharing, collaboration and outsourcing |
title_sort | community effort to protect genomic data sharing, collaboration and outsourcing |
topic | Perspective |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5677972/ https://www.ncbi.nlm.nih.gov/pubmed/29263842 http://dx.doi.org/10.1038/s41525-017-0036-1 |
work_keys_str_mv | AT wangshuang acommunityefforttoprotectgenomicdatasharingcollaborationandoutsourcing AT jiangxiaoqian acommunityefforttoprotectgenomicdatasharingcollaborationandoutsourcing AT tanghaixu acommunityefforttoprotectgenomicdatasharingcollaborationandoutsourcing AT wangxiaofeng acommunityefforttoprotectgenomicdatasharingcollaborationandoutsourcing AT budiyue acommunityefforttoprotectgenomicdatasharingcollaborationandoutsourcing AT careyknox acommunityefforttoprotectgenomicdatasharingcollaborationandoutsourcing AT dykestephanieom acommunityefforttoprotectgenomicdatasharingcollaborationandoutsourcing AT foxdov acommunityefforttoprotectgenomicdatasharingcollaborationandoutsourcing AT jiangchao acommunityefforttoprotectgenomicdatasharingcollaborationandoutsourcing AT lauterkristin acommunityefforttoprotectgenomicdatasharingcollaborationandoutsourcing AT malinbradley acommunityefforttoprotectgenomicdatasharingcollaborationandoutsourcing AT sofiaheidi acommunityefforttoprotectgenomicdatasharingcollaborationandoutsourcing AT telentiamalio acommunityefforttoprotectgenomicdatasharingcollaborationandoutsourcing AT wanglei acommunityefforttoprotectgenomicdatasharingcollaborationandoutsourcing AT wangwenhao acommunityefforttoprotectgenomicdatasharingcollaborationandoutsourcing AT ohnomachadolucila acommunityefforttoprotectgenomicdatasharingcollaborationandoutsourcing AT wangshuang communityefforttoprotectgenomicdatasharingcollaborationandoutsourcing AT jiangxiaoqian communityefforttoprotectgenomicdatasharingcollaborationandoutsourcing AT tanghaixu communityefforttoprotectgenomicdatasharingcollaborationandoutsourcing AT wangxiaofeng communityefforttoprotectgenomicdatasharingcollaborationandoutsourcing AT budiyue communityefforttoprotectgenomicdatasharingcollaborationandoutsourcing AT careyknox communityefforttoprotectgenomicdatasharingcollaborationandoutsourcing AT dykestephanieom communityefforttoprotectgenomicdatasharingcollaborationandoutsourcing AT foxdov communityefforttoprotectgenomicdatasharingcollaborationandoutsourcing AT jiangchao communityefforttoprotectgenomicdatasharingcollaborationandoutsourcing AT lauterkristin communityefforttoprotectgenomicdatasharingcollaborationandoutsourcing AT malinbradley communityefforttoprotectgenomicdatasharingcollaborationandoutsourcing AT sofiaheidi communityefforttoprotectgenomicdatasharingcollaborationandoutsourcing AT telentiamalio communityefforttoprotectgenomicdatasharingcollaborationandoutsourcing AT wanglei communityefforttoprotectgenomicdatasharingcollaborationandoutsourcing AT wangwenhao communityefforttoprotectgenomicdatasharingcollaborationandoutsourcing AT ohnomachadolucila communityefforttoprotectgenomicdatasharingcollaborationandoutsourcing |