Inference Attacks against Kin Genomic Privacy

@article{Ayday2017InferenceAA,
  title={Inference Attacks against Kin Genomic Privacy},
  author={Erman Ayday and Mathias Humbert},
  journal={IEEE Security \& Privacy},
  year={2017},
  volume={15},
  pages={29-37}
}
Genomic data poses serious interdependent risks: your data might also leak information about your family members’ data. Methods attackers use to infer genomic information, as well as recent proposals for enhancing genomic privacy, are discussed. 

Figures, Tables, and Topics from this paper

Inference attacks on genomic privacy with an improved HMM and an RCNN model for unrelated individuals
TLDR
It is shown that with two possible large-scale genotype inference attack stretegies for nonrelatives, the attack can be significantly more severe than those reported previously and that machine learning can be applied to empower large- scale inference attacks against genomic privacy.
Privacy challenges and research opportunities for genomic data sharing
TLDR
This review discusses major privacy threats relevant to collection and analysis of genomic data in the context of direct-to-consumer applications and provides suggestions for improving the design of privacy-protecting approaches.
Privacy-Utility Equilibrium Protocol for Federated Aggregating Multiparty Genome Data
  • Hai Liu, Changgen Peng, Youliang Tian, Feng Tian, Zhenqiang Wu
  • Journal of Networking and Network Applications
  • 2021
Cloud server aggregates a large amount of genome data from multi genome donors to facilitate scientific research. However, the untrusted cloud server is prone to violate privacy of aggregating genome
Attacks on genetic privacy via uploads to genealogical databases
TLDR
Methods by which an adversary can learn database genotypes by uploading multiple datasets are described, and countermeasures that will prevent the exploits are suggested.
Ultimate Power of Inference Attacks: Privacy Risks of Learning High-Dimensional Graphical Models
TLDR
A theoretical framework to analyze the maximum power of tracing attacks against high-dimensional models, with the focus on probabilistic graphical models, and provides a tight upper-bound on the power (true positive rate) of these attacks, with respect to their error (false positive rate).
Ultimate Power of Inference Attacks: Privacy Risks of High-Dimensional Models
TLDR
A theoretical framework to analyze the maximum power of tracing attacks against high-dimensional models, with the focus on probabilistic graphical models, and provides a tight upper-bound on the power (true positive rate) of these attacks, with respect to their error (false positive rate).
A Survey on Interdependent Privacy
TLDR
This survey summary and analysis of research on interdependent privacy risks and on the associated (cooperative and non-cooperative) solutions systematize knowledge and provide insights on how this research should be conducted and which challenges it should address.
A Survey of Cryptographic Techniques to Secure Genomic Data
TLDR
Some of the cryptographic applications of how to make genomic data sharing and storage more private and secure are described.
Attacks on genetic privacy via uploads to genealogical databases
TLDR
Several methods by which an adversary who wants to learn the genotypes of people in the database can do so by uploading multiple datasets are described, including a proof-of-concept demonstration that the GEDmatch database in particular uses unphased genotypes to detect IBS and is vulnerable to genotypes being revealed by artificial datasets.
Analysis of security and privacy challenges for DNA-genomics applications and databases
TLDR
This paper investigates bio-cyber security threats to genomic- DNA data and software applications making use of such data to advance scientific research and adopts an empirical approach to analyse and identify vulnerabilities within genomic-DNA databases and bioinformatics software applications.
...
1
2
...

References

SHOWING 1-10 OF 34 REFERENCES
Quantifying Interdependent Risks in Genomic Privacy
TLDR
This article formalizes the problem and detail efficient reconstruction attacks based on graphical models and belief propagation, and introduces the quantification of health privacy, specifically, the measure of how well the predisposition to a disease is concealed from an attacker.
Privacy-preserving data exploration in genome-wide association studies
Genome-wide association studies (GWAS) have become a popular method for analyzing sets of DNA sequences in order to discover the genetic basis of disease. Unfortunately, statistics published as the
An Inference Attack on Genomic Data Using Kinship, Complex Correlations, and Phenotype Information
TLDR
This paper mainly considers complex correlations in the genome by using an observable Markov model and recombination model between the haplotypes and utilizes the phenotype information about the victims.
Routes for breaching and protecting genetic privacy
TLDR
In the above article, an incorrect citation was given in reference 107, privacy-preserving computation of disease risk by using genomic, clinical, and environmental data.
Genomic privacy and limits of individual detection in a pool
TLDR
Quantitative guidelines for researchers wishing to make a limited number of SNPs available publicly without compromising subjects' privacy are provided.
Privacy Risks from Genomic Data-Sharing Beacons
TLDR
The results show that beacons can disclose membership and implied phenotypic information about participants and do not protect privacy a priori and discuss risk mitigation through policies and standards such as not allowing anonymous pings of genetic beacons and requiring minimum beacon sizes.
Reconciling Utility with Privacy in Genomics
TLDR
An obfuscation mechanism is proposed that enables the genomic data to be publicly available for research, while protecting the genomic privacy of the individuals in a family, and an extension of the optimization algorithm to cope with the non-linear constraints induced by the correlations between SNPs.
De-anonymizing Genomic Databases Using Phenotypic Traits
TLDR
This paper quantifies, based on various phenotypic traits, the extent of this threat in several scenarios by implementing de-anonymization attacks on a genomic database of OpenSNP users sequenced by 23andMe, and evaluates the adversary’s ability to predict individuals’ predisposition to Alzheimer's disease.
GenoGuard: Protecting Genomic Data against Brute-Force Attacks
TLDR
Geno Guard addresses the open problem of applying HE techniques to the highly non-uniform probability distributions that characterize sequences of genetic data and proves that decryption under any key will yield a plausible genome sequence, and offers an information-theoretic security guarantee against message-recovery attacks.
Routes for breaching and protecting genetic privacy
TLDR
Broad data dissemination is essential for advancements in genetics, but also brings to light concerns regarding privacy as well as potential mitigation strategies for privacy-preserving dissemination of genetic data.
...
1
2
3
4
...