Cargando…

Real-time Protection of Genomic Data Sharing in Beacon Services

The acquisition of human genomic sequences is of increasing convenience and reduced expense. The sharing of these data is critical for biomedical researchers to study genomic loci or variants that are potentially associated with human diseases(1). However, sharing genomic data broadly is impeded by...

Descripción completa

Detalles Bibliográficos
Autores principales: Bu, Diyue, Wang, Xiaofeng, Tang, Haixu
Formato: Online Artículo Texto
Lenguaje:English
Publicado: American Medical Informatics Association 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5961811/
https://www.ncbi.nlm.nih.gov/pubmed/29888039
Descripción
Sumario:The acquisition of human genomic sequences is of increasing convenience and reduced expense. The sharing of these data is critical for biomedical researchers to study genomic loci or variants that are potentially associated with human diseases(1). However, sharing genomic data broadly is impeded by privacy concerns. The statistical inference techniques for the re-identification of genomic data donors have been extensively investigated in the literature(2–5). The Beacon services project is recently brought into view, aiming to test the willingness of data holders to share genomic data in a simple technical context: a query to ask a specified nucleotide at a given position within a chromosome(6), also suffering from being compromised(7,8). In this paper, we introduce a real-time mitigation method to protect Beacon services from re-identification attacks(7), and show that it performs favorably in comparison with previous approaches on mitigation efficiency, i.e., with lower re-identification risks and higher utility of Beacon database.