Proceedings of the 2013 ACM SIGSAC Conference on Computer &Amp; Communications Security - CCS '13 2013
DOI: 10.1145/2508859.2516707
|View full text |Cite
|
Sign up to set email alerts
|

Addressing the concerns of the lacks family

Abstract: The rapid progress in human-genome sequencing is leading to a high availability of genomic data. This data is notoriously very sensitive and stable in time. It is also highly correlated among relatives. A growing number of genomes are becoming accessible online (e.g., because of leakage, or after their posting on genome-sharing websites). What are then the implications for kin genomic privacy? We formalize the problem and detail an efficient reconstruction attack based on graphical models and belief propagatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
29
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 103 publications
(30 citation statements)
references
References 41 publications
0
29
0
Order By: Relevance
“…He then exploits this information to estimate genetic predispositions for relatives whose genetic information is inaccessible. A recent study demonstrated the feasibility of this attack by taking advantage of self-identified genetic datasets from OpenSNP.org, an internet platform for public sharing of genetic information 79 . Using Facebook searches, the research team was able to find relatives of the individuals that self-identified their genetic datasets.…”
Section: Completion Attacksmentioning
confidence: 99%
“…He then exploits this information to estimate genetic predispositions for relatives whose genetic information is inaccessible. A recent study demonstrated the feasibility of this attack by taking advantage of self-identified genetic datasets from OpenSNP.org, an internet platform for public sharing of genetic information 79 . Using Facebook searches, the research team was able to find relatives of the individuals that self-identified their genetic datasets.…”
Section: Completion Attacksmentioning
confidence: 99%
“…Because the genome of a somatic human cell is diploid, that is, it is comprised of two sets of chromosomes -one set inherited from the father, and the other set inherited from the mother -each SNP is present in two copies. Therefore, a given SNP can be encoded as 0, 1, or 2 corresponding to the combinations AA, Aa, and aa [Humbert et al 2013]. Population-wide frequencies of alleles A and a can be estimated from a sample of human genomes; this has been done in the 1000 Genomes project 1 .…”
Section: Genomicsmentioning
confidence: 99%
“…Broadly, privacy metrics measure characteristics of privacy enhancing technologies and quantify how much privacy a technology offers [Clauß and Schiffner 2006], for example, the adversary's probability to break a user's anonymity [Serjantov and Danezis 2002], or the maximum amount of bits of private information an adversary can infer [Diaz et al 2003]. In the context of genomic privacy, most research applies existing privacy metrics to genomic privacy scenarios Humbert et al 2013;Samani et al 2015]. Some researchers also propose new metrics specific to genomic privacy Humbert et al 2013].…”
Section: Genomic Privacy Metricsmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, owners of some genomes uploaded to openSNP can be de-anonymised using their Facebook profiles. For 6 individuals who publicly revealed the names of some of their relatives on Facebook, 29 familial relationships could be identified 9 . ( B ) Decrease in genomic privacy of the target person (circled in red) when the genomes of his family members are gradually revealed.…”
Section: Introductionmentioning
confidence: 99%