2017
DOI: 10.1109/msp.2017.3681052
|View full text |Cite
|
Sign up to set email alerts
|

Inference Attacks against Kin Genomic Privacy

Abstract: Genomic data poses serious interdependent risks: your data might also leak information about your family members' data. Methods attackers use to infer genomic information, as well as recent proposals for enhancing genomic privacy, are discussed. Individuals desiring to control their personal data face significant interdependent privacy risks-risks that involve the leakage of one's personal data due to data shared by other individuals. With recent advances in whole genome sequencing, genomic data in particular … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(18 citation statements)
references
References 30 publications
0
18
0
Order By: Relevance
“…The IBS-based privacy attacks we describe here add to a growing set of threats to genetic privacy (Homer et al, 2008; Nyholt et al, 2009; Im et al, 2012; Gymrek et al, 2013; Humbert et al, 2015; Shringarpure and Bustamante, 2015; Edge et al, 2017; Ayday and Humbert, 2017; Kim et al, 2018; Erlich et al, 2018). A person’s genotype includes sensitive health information that might be used for discrimination, particularly as our ability to genetically predict traits and disease predispositions will likely improve over the coming years.…”
Section: Discussionmentioning
confidence: 99%
“…The IBS-based privacy attacks we describe here add to a growing set of threats to genetic privacy (Homer et al, 2008; Nyholt et al, 2009; Im et al, 2012; Gymrek et al, 2013; Humbert et al, 2015; Shringarpure and Bustamante, 2015; Edge et al, 2017; Ayday and Humbert, 2017; Kim et al, 2018; Erlich et al, 2018). A person’s genotype includes sensitive health information that might be used for discrimination, particularly as our ability to genetically predict traits and disease predispositions will likely improve over the coming years.…”
Section: Discussionmentioning
confidence: 99%
“…b) The case of genomic data: Genomic privacy is a complex subject whose discussion involves many ethical and balance of control issues and closely ties to that of the privacy of others versus personal freedom. The topic of who are the affected parties and how their consent decisions should be expressed is still under debate both in the media (e.g., [1]) and in the research community (e.g., [8], [36], [62]). There are several options that could be considered; we discuss how their implementation could be done in ConsenShare.…”
Section: Discussion: Limitations and Extensionmentioning
confidence: 99%
“…Notably, the average total bandwidth consumption for Alice on upload is 4.2 ± 4.8MB (roughly twice the original photo size -because she sends the background image twice 7 ), the average total bandwidth consumption for the CMS and for the IMS on download is 2.1 ± 2.4MB and 2.1 ± 2.4MB, respectively (roughly the original photo size); the average total bandwidth consumption for the CMS on upload is 0.4 ± 1.4. 8 The other cases present negligible bandwidth consumption. Note that in a real system, the CMS upload cost could be substantially reduced by returning an even lower version of the background image to Bob.…”
Section: ) Bandwidthmentioning
confidence: 99%
“…For instance, new high throughput DNA sequencing technologies have drastically reduced the price and democratized DNA analysis. Due to the highly sensitive nature of this data, an important research area has emerged to address the quantification of the risk associated with this information and to protect it [8,66]. The widespread adoption of medical IoT has also introduced new security and privacy questions and concerns.…”
Section: Applied Privacy Methods Used In Healthcarementioning
confidence: 99%