Proceedings 2020 Network and Distributed System Security Symposium 2020
DOI: 10.14722/ndss.2020.23049
|View full text |Cite
|
Sign up to set email alerts
|

Genotype Extraction and False Relative Attacks: Security Risks to Third-Party Genetic Genealogy Services Beyond Identity Inference

Abstract: Customers of direct-to-consumer (DTC) genetic testing services routinely download their raw genetic data and give it to third-party companies that support additional features. One type of analysis, called genetic genealogy, uses genetic data and genealogical methods to find new relatives. While genetic genealogy is quite popular, it has raised new privacy concerns. Genetic genealogy services can be leveraged to find the person corresponding to anonymous genetic data and have been used dozens of times by law en… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(33 citation statements)
references
References 23 publications
0
33
0
Order By: Relevance
“…The leakage of genetic privacy has been frequently reported where the identity or sensitive trait of a particular individual was disclosed by the identity tracing attacks, 30,31 attribute disclosure attacks via DNA, 4 and completion attacks. 32,33 Several privacy-preserving solutions for genomic data analytics have been proposed, including DP strategies for genome-wide association studies (GWAS), 7,34 crytographic solutions including homomorphic encryption 12,35 and secure multi-party computation (MPC) solutions. 35 However, these privacy-preserving methods aim to mitigate privacy leakage when data is shared and none of them have considered privacy leakage when sharing models.…”
Section: Related Workmentioning
confidence: 99%
“…The leakage of genetic privacy has been frequently reported where the identity or sensitive trait of a particular individual was disclosed by the identity tracing attacks, 30,31 attribute disclosure attacks via DNA, 4 and completion attacks. 32,33 Several privacy-preserving solutions for genomic data analytics have been proposed, including DP strategies for genome-wide association studies (GWAS), 7,34 crytographic solutions including homomorphic encryption 12,35 and secure multi-party computation (MPC) solutions. 35 However, these privacy-preserving methods aim to mitigate privacy leakage when data is shared and none of them have considered privacy leakage when sharing models.…”
Section: Related Workmentioning
confidence: 99%
“…Data sharing is dependent upon the data controller's wants and needs, barring any legal or business requirements from other involved stakeholders. Genetic database vulnerabilities have been well-studied and disclosed (Edge and Coop, 2020;Ney et al, 2020;Naveed et al, 2015;Erlich and Narayanan, 2014;Gymrek et al, 2013). For example, the contents of the entire GEDmatch database could be leaked by uploading artificial genomes (Ney et al, 2020).…”
Section: Dissemination Practices and Databasesmentioning
confidence: 99%
“…Genetic database vulnerabilities have been well-studied and disclosed (Edge and Coop, 2020;Ney et al, 2020;Naveed et al, 2015;Erlich and Narayanan, 2014;Gymrek et al, 2013). For example, the contents of the entire GEDmatch database could be leaked by uploading artificial genomes (Ney et al, 2020). Such an attack would violate the confidentiality of more than a million users' and their relatives' genetic data because the information is not truly anonymized.…”
Section: Dissemination Practices and Databasesmentioning
confidence: 99%
“…Genetic database vulnerabilities have been well studied and disclosed ( Gymrek et al, 2013 ; Erlich and Narayanan, 2014 ; Naveed et al, 2015 ; Edge et al, 2017 ; Ney et al, 2018 ; Vinatzer et al, 2019 ; Edge and Coop, 2020 ; Ney et al, 2020 ). For example, the contents of the entire GEDmatch database could be leaked by uploading artificial genomes ( Ney et al, 2020 ). Such an attack would violate the confidentiality of more than a million users’ and their relatives’ genetic data because the information is not truly anonymized.…”
Section: The Genetic Information Threat Landscapementioning
confidence: 99%