2017
DOI: 10.1093/jamia/ocw167
|View full text |Cite
|
Sign up to set email alerts
|

Addressing Beacon re-identification attacks: quantification and mitigation of privacy risks

Abstract: The Global Alliance for Genomics and Health (GA4GH) created the Beacon Project as a means of testing the willingness of data holders to share genetic data in the simplest technical context—a query for the presence of a specified nucleotide at a given position within a chromosome. Each participating site (or “beacon”) is responsible for assuring that genomic data are exposed through the Beacon service only with the permission of the individual to whom the data pertains and in accordance with the GA4GH policy an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

4
126
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 75 publications
(130 citation statements)
references
References 17 publications
4
126
0
Order By: Relevance
“…In our previous work, 35 three different mitigation models were proposed: (S1) Beacon alteration strategy; (S2) Random flipping strategy; and (S3) query budget per individual strategy. However, we only include the results of the S2 models as our baseline performance for the 0.2 and 0.18 flip probabilities.…”
Section: Track 1: Practical Protection Of Gds Through Beacon Servicesmentioning
confidence: 99%
See 1 more Smart Citation
“…In our previous work, 35 three different mitigation models were proposed: (S1) Beacon alteration strategy; (S2) Random flipping strategy; and (S3) query budget per individual strategy. However, we only include the results of the S2 models as our baseline performance for the 0.2 and 0.18 flip probabilities.…”
Section: Track 1: Practical Protection Of Gds Through Beacon Servicesmentioning
confidence: 99%
“…S3 was not chosen as a baseline in Track 2 because we assumed the beacon service does not keep track of the queries per individual. The performance of our baseline 35 and performance of the top two teams, the first from Vanderbilt University 36 and the second from the University of Manitoba, 37 are depicted in the Fig. 1.…”
Section: Track 1: Practical Protection Of Gds Through Beacon Servicesmentioning
confidence: 99%
“…Yet despite the limited scope of allowed queries and the fact that only aggregate-level information is shared, query-answering systems can still leak sensitive information about the underlying individuals [8][9][10][11]. One could, for example, ask for the number of 25-year-old females on a certain medication who do not have a particular disease.…”
Section: Introductionmentioning
confidence: 99%
“…If the answer returned is zero, we know that any 25-year-old female patient in the database who is on that medication has that disease, a fact the patients might wish to keep private. Moreover, given access to an individual's genotype, a small number of queries to a beacon server would be sufficient to reveal whether the individual is included in the database [10,11]. This information could potentially be detrimental to the individual if the underlying cohort represents a group of individuals with sensitive characteristics (e.g.…”
Section: Introductionmentioning
confidence: 99%
“…For instance, such attacks have already been developed for summary statistics about the frequency of single nucleotide polymorphisms (SNPs) [2,5,15]. Membership inference attacks have also been developed for the case where a person is allowed to repeatedly query a database to learn if at least one individual contains a particular SNP [13,14,16]. These kinds of aggregate statistics about the frequency or presence/absence of a particular SNP might be useful to release to the broader research community, but it is not an essential output of the research process.…”
Section: Introductionmentioning
confidence: 99%