2021
DOI: 10.1186/s12864-021-07996-2
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving storage of sequenced genomic data

Abstract: Background The current and future applications of genomic data may raise ethical and privacy concerns. Processing and storing of this data introduce a risk of abuse by potential offenders since the human genome contains sensitive personal information. For this reason, we have developed a privacy-preserving method, named Varlock providing secure storage of sequenced genomic data. We used a public set of population allele frequencies to mask the personal alleles detected in genomic reads. Each pe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 34 publications
0
4
0
Order By: Relevance
“…Moreover, sensitive information like prosperity records, innate data, and sexual presentation can be used to isolate, constrain, or harm individuals. (Hekel et al, 2021) In this way, it is basic to ensure that personal data is collected, put absent, and shared securely and with consent. • Essential for national security and monetary soundness.…”
Section: Data Privacy and Securitymentioning
confidence: 99%
“…Moreover, sensitive information like prosperity records, innate data, and sexual presentation can be used to isolate, constrain, or harm individuals. (Hekel et al, 2021) In this way, it is basic to ensure that personal data is collected, put absent, and shared securely and with consent. • Essential for national security and monetary soundness.…”
Section: Data Privacy and Securitymentioning
confidence: 99%
“…However, this may not completely eliminate the risk of reidentification, as other types of variants or genomic features may still be informative [ 81 , 82 ]. Despite their widespread use, these k -anonymity approaches are vulnerable to attackers who have background information on the dataset [ 83 ] and are limited for high-dimensional genomic data [ 84 ].…”
Section: Genomic Data Privacy and Securitymentioning
confidence: 99%
“…Asymmetric or public cryptography schemes, such as Rivest–Shamir–Adleman (RSA) and elliptic curve cryptography (ECC), use 2 keys for encryption: a public key for encryption and a private key for decryption. The RSA algorithm has been used for genomic data to mask individuals’ alleles and secure cloud-based genetic paternity test results [ 83 , 112 ], but it can be slow and impractical for large Whole Genome Sequencing (WGS) files [ 112 ] and is therefore limited to smaller genomic files and sensitive metadata. ECC is often preferred over RSA for smaller genomic files due to its smaller key sizes and lower computational cost [ 113 , 114 ].…”
Section: Genomic Data Privacy and Securitymentioning
confidence: 99%
“…Genomic data generated at a large scale, with an appropriate consent process, are theoretically reusable for healthcare and research purposes [ 98 ]. In practice, however, storing and managing genomic data and consent at scale is challenging.…”
Section: Genomic Approaches For Nbsmentioning
confidence: 99%