Abstract
As genomic data becomes widely used, the problem
of genomic data privacy becomes a hot interdisciplinary research
topic among geneticists, bioinformaticians and security and pri-
vacy experts. Practical attacks have been identified on genomic
data, and thus break the privacy expectations of individuals who
contribute their genomic data to medical research, or simply
share their data online. Frustrating as it is, the problem could
become even worse. Existing genomic privacy breaches rely on
low-order SNV (Single Nucleotide Variant) correlations. Our
work shows that far more powerful attacks can be designed if
high-order correlations are utilized. We corroborate this concern
by making use of different SNV correlations based on various
genomic data models and applying them to an inference attack on
individuals’ genotype data with hidden SNVs. We also show that
low-order models behave very differently from real genomic data
and therefore should not be relied upon for privacy-preserving
solutions.
of genomic data privacy becomes a hot interdisciplinary research
topic among geneticists, bioinformaticians and security and pri-
vacy experts. Practical attacks have been identified on genomic
data, and thus break the privacy expectations of individuals who
contribute their genomic data to medical research, or simply
share their data online. Frustrating as it is, the problem could
become even worse. Existing genomic privacy breaches rely on
low-order SNV (Single Nucleotide Variant) correlations. Our
work shows that far more powerful attacks can be designed if
high-order correlations are utilized. We corroborate this concern
by making use of different SNV correlations based on various
genomic data models and applying them to an inference attack on
individuals’ genotype data with hidden SNVs. We also show that
low-order models behave very differently from real genomic data
and therefore should not be relied upon for privacy-preserving
solutions.
Original language | English |
---|---|
Title of host publication | Proceedings of the 2015 IEEE Security and Privacy Workshops |
Subtitle of host publication | San Jose, CA, 21-22 May 2015 |
Publisher | IEEE Computer Society |
Pages | 32-40 |
Number of pages | 9 |
DOIs | |
Publication status | Published - 2015 |
Publication series
Name | 2015 IEEE CS Security and Privacy Workshops |
---|