Privacy challenges and research opportunities for genomic data sharing

[1]  Sean K. Simmons,et al.  Enabling Privacy Preserving GWAS in Heterogeneous Human Populations. , 2016, RECOMB 2016.

[2]  Gil Alterovitz,et al.  All the World's a Stage: Facilitating Discovery Science and Improved Cancer Care through the Global Alliance for Genomics and Health. , 2015, Cancer discovery.

[3]  S. Lee,et al.  Protecting Posted Genes: Social Networking and the Limits of GINA , 2014, The American journal of bioethics : AJOB.

[4]  Bradley Malin,et al.  Re-identification of Familial Database Records , 2006, AMIA.

[5]  J. Lupski,et al.  The complete genome of an individual by massively parallel DNA sequencing , 2008, Nature.

[6]  Robert Cook-Deegan,et al.  Disclosure of APOE genotype for risk of Alzheimer's disease. , 2009, The New England journal of medicine.

[7]  23 and Me, We, and You: direct-to-consumer genetics, intellectual property, and informed consent. , 2013, Trends in biotechnology.

[8]  N. Hawkins,et al.  Assessing the Privacy Risks of Data Sharing in Genomics , 2010, Public Health Genomics.

[9]  Jamie Donatuto,et al.  Conducting Research with Tribal Communities: Sovereignty, Ethics, and Data-Sharing Issues , 2011, Environmental health perspectives.

[10]  C. Grady,et al.  Is It Ethical to Use Genealogy Data to Solve Crimes? , 2018, Annals of Internal Medicine.

[11]  Eun Yong Kang,et al.  Identification of individuals by trait prediction using whole-genome sequencing data , 2017, Proceedings of the National Academy of Sciences.

[12]  Vitaly Shmatikov,et al.  Privacy-preserving data exploration in genome-wide association studies , 2013, KDD.

[13]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[14]  Yuchen Zhang,et al.  HEALER: homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS , 2015, Bioinform..

[15]  Latanya Sweeney,et al.  Identifying Participants in the Personal Genome Project by Name , 2013, ArXiv.

[16]  Zhicong Huang,et al.  Efficient and secure outsourcing of genomic data storage , 2017, BMC Medical Genomics.

[17]  P. A. Kelly,et al.  To share or not to share: A randomized trial of consent for data sharing in genome research , 2011, Genetics in Medicine.

[18]  Jean-Pierre Hubaux,et al.  Reconciling Utility with Privacy in Genomics , 2014, WPES.

[19]  Haixu Tang,et al.  Learning your identity and disease from research papers: information leaks in genome wide association study , 2009, CCS.

[20]  Deni Elliott,et al.  Genetic Information Nondiscrimination Act , 2008 .

[21]  Fei Yu,et al.  Scalable privacy-preserving data sharing methodology for genome-wide association studies: an application to iDASH healthcare privacy protection challenge , 2014, BMC Medical Informatics and Decision Making.

[22]  Jean-Pierre Hubaux,et al.  Protecting Privacy and Security of Genomic Data in i2b2 with Homomorphic Encryption and Differential Privacy , 2018, IEEE/ACM Transactions on Computational Biology and Bioinformatics.

[23]  David E Frost,et al.  All of us. , 2011, Journal of oral and maxillofacial surgery : official journal of the American Association of Oral and Maxillofacial Surgeons.

[24]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[25]  Giulio Malavolta,et al.  My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data , 2018, Proc. Priv. Enhancing Technol..

[26]  Fangyuan Zhao,et al.  Feasibility of Reidentifying Individuals in Large National Physical Activity Data Sets From Which Protected Health Information Has Been Removed With Use of Machine Learning , 2018, JAMA network open.

[27]  Shuang Wang,et al.  Genome privacy: challenges, technical approaches to mitigate risk, and ethical considerations in the United States , 2017, Annals of the New York Academy of Sciences.

[28]  Scott D. Kahn On the Future of Genomic Data , 2011, Science.

[29]  A. Philippakis,et al.  The "All of Us" Research Program. , 2019, The New England journal of medicine.

[30]  Michelle M Mello,et al.  The Havasupai Indian tribe case--lessons for research involving stored biologic samples. , 2010, The New England journal of medicine.

[31]  Jean-Pierre Hubaux,et al.  Quantifying Interdependent Risks in Genomic Privacy , 2017, ACM Trans. Priv. Secur..

[32]  P. Auer,et al.  All your data (effectively) belong to us: data practices among direct-to-consumer genetic testing firms , 2016, Genetics in Medicine.

[33]  Heidi Carmen Howard,et al.  Ethical issues in consumer genome sequencing: Use of consumers' samples and data , 2016, Applied & translational genomics.

[34]  M. Arquette,et al.  Holistic risk-based environmental decision making: a Native perspective. , 2002, Environmental health perspectives.

[35]  Jihoon Kim,et al.  PRINCESS: Privacy‐protecting Rare disease International Network Collaboration via Encryption through Software guard extensionS , 2017, Bioinform..

[36]  Amy Maxmen,et al.  AI researchers embrace Bitcoin technology to share medical data , 2018, Nature.

[37]  Xiaoqian Jiang,et al.  FORESEE: Fully Outsourced secuRe gEnome Study basEd on homomorphic Encryption , 2015, BMC Medical Informatics and Decision Making.

[38]  Bradley Malin,et al.  Technical Evaluation: An Evaluation of the Current State of Genomic Data Privacy Protection Technology and a Roadmap for the Future , 2004, J. Am. Medical Informatics Assoc..

[39]  Jean-Pierre Hubaux,et al.  Addressing the concerns of the lacks family: quantification of kin genomic privacy , 2013, CCS.

[40]  Dan Bogdanov,et al.  A new way to protect privacy in large-scale genome-wide association studies , 2013, Bioinform..

[41]  Matthew J. Ferber,et al.  Direct‐to‐Consumer Testing 2.0: Emerging Models of Direct‐to‐Consumer Genetic Testing , 2018, Mayo Clinic proceedings.

[42]  Yaniv Erlich,et al.  Routes for breaching and protecting genetic privacy , 2013, Nature Reviews Genetics.

[43]  Jun Sakuma,et al.  Privacy-Preserving Statistical Analysis by Exact Logistic Regression , 2015, 2015 IEEE Security and Privacy Workshops.

[44]  Richard Mayeux,et al.  Genetic counseling and testing for Alzheimer disease: Joint practice guidelines of the American College of Medical Genetics and the National Society of Genetic Counselors , 2011, Genetics in Medicine.

[45]  M. Metzker Sequencing technologies — the next generation , 2010, Nature Reviews Genetics.

[46]  R. Ostrovsky,et al.  Identifying genetic relatives without compromising privacy , 2014, Genome research.

[47]  Stephen E. Fienberg,et al.  Scalable privacy-preserving data sharing methodology for genome-wide association studies , 2014, J. Biomed. Informatics.

[48]  P. Visscher,et al.  On Jim Watson's APOE status: genetic information is hard to hide , 2009, European Journal of Human Genetics.

[49]  Stephen E. Fienberg,et al.  Privacy-Preserving Data Sharing for Genome-Wide Association Studies , 2012, J. Priv. Confidentiality.

[50]  Yaniv Erlich,et al.  Identity inference of genomic data using long-range familial searches , 2018, Science.

[51]  Bradley Malin,et al.  How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems , 2004, J. Biomed. Informatics.

[52]  Brian T. Naughton,et al.  Web-Based, Participant-Driven Studies Yield Novel Genetic Associations for Common Traits , 2010, PLoS genetics.

[53]  S. Nelson,et al.  Resolving Individuals Contributing Trace Amounts of DNA to Highly Complex Mixtures Using High-Density SNP Genotyping Microarrays , 2008, PLoS genetics.

[54]  Bradley Malin,et al.  Determining the identifiability of DNA database entries , 2000, AMIA.

[55]  Markus Jakobsson,et al.  Cryptographic Approaches to Provacy in Forensic DNA Databases , 2000, Public Key Cryptography.

[56]  David J. Wu,et al.  Secure genome-wide association analysis using multiparty computation , 2018, Nature Biotechnology.

[57]  Jean-Pierre Hubaux,et al.  Protecting and evaluating genomic privacy in medical tests and personalized medicine , 2013, WPES.

[58]  Zhicong Huang,et al.  Differential Privacy with Bounded Priors: Reconciling Utility and Privacy in Genome-Wide Association Studies , 2015, CCS.

[59]  Vitaly Shmatikov,et al.  Towards Practical Privacy for Genomic Computation , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[60]  Michael I. Jordan,et al.  Genomic privacy and limits of individual detection in a pool , 2009, Nature Genetics.

[61]  Stefan Katzenbeisser,et al.  Privacy-Preserving Matching of DNA Profiles , 2008, IACR Cryptol. ePrint Arch..

[62]  Kamal Obbad,et al.  ‘Fit-for-purpose?’ – challenges and opportunities for applications of blockchain technology in the future of healthcare , 2019, BMC Medicine.

[63]  Elaine R. Mardis,et al.  A decade’s perspective on DNA sequencing technology , 2011, Nature.

[64]  Zhen Lin,et al.  Genomic Research and Human Subject Privacy , 2004, Science.

[65]  Dynamic consent in the digital age of biology: online initiatives and regulatory considerations. , 2013, Journal of primary health care.

[66]  J. Gitschier,et al.  Inferential genotyping of Y chromosomes in Latter-Day Saints founders and comparison to Utah samples in the HapMap project. , 2009, American journal of human genetics.

[67]  Wenliang Du,et al.  Secure and private sequence comparisons , 2003, WPES '03.

[68]  B A Malin,et al.  Protecting Genomic Sequence Anonymity with Generalization Lattices , 2005, Methods of Information in Medicine.

[69]  Zhicong Huang,et al.  GenoGuard: Protecting Genomic Data against Brute-Force Attacks , 2015, 2015 IEEE Symposium on Security and Privacy.

[70]  Ninghui Li,et al.  On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy , 2011, ASIACCS '12.

[71]  Emily Christofides,et al.  Company disclosure and consumer perceptions of the privacy implications of direct-to-consumer genetic testing , 2016 .

[72]  Nita A. Farahany,et al.  Redefining Genomic Privacy: Trust and Empowerment , 2014, bioRxiv.

[73]  Michael Naehrig,et al.  Private Computation on Encrypted Genomic Data , 2014, LATINCRYPT.

[74]  Erman Ayday,et al.  Inference Attacks against Kin Genomic Privacy , 2017, IEEE Security & Privacy.

[75]  P. A. Kelly,et al.  Balancing the Risks and Benefits of Genomic Data Sharing: Genome Research Participants’ Perspectives , 2011, Public Health Genomics.

[76]  W. Burke,et al.  Exploring pathways to trust: a tribal perspective on data sharing , 2014, Genetics in Medicine.

[77]  A. Maxmen AI researchers embrace Bitcoin technology to share medical data. , 2018 .

[78]  Bradley A. Areheart,et al.  GINA, Big Data, and the Future of Employee Privacy , 2018 .

[79]  Emiliano De Cristofaro,et al.  Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective , 2017, Proc. Priv. Enhancing Technol..

[80]  Eran Halperin,et al.  Identifying Personal Genomes by Surname Inference , 2013, Science.

[81]  Katie R. Eyer The New Jim Crow Is the Old Jim Crow , 2019 .

[82]  Mete Akgün,et al.  Privacy preserving processing of genomic data: A survey , 2015, J. Biomed. Informatics.

[83]  Emiliano De Cristofaro,et al.  Fast and Private Genomic Testing for Disease Susceptibility , 2014, WPES.

[84]  Bonnie Berger,et al.  Realizing privacy preserving genome-wide association studies , 2016, Bioinform..

[85]  Amy L. McGuire,et al.  Genealogy databases and the future of criminal investigation , 2018, Science.

[86]  J. Denny,et al.  The "All of Us" Research Program. , 2019, The New England journal of medicine.

[87]  Ellen M. Greytak,et al.  Privacy and genetic genealogy data , 2018, Science.

[88]  Thomas Ristenpart,et al.  Honey Encryption: Security Beyond the Brute-Force Bound , 2014, IACR Cryptol. ePrint Arch..

[89]  Carl A. Gunter,et al.  Privacy in the Genomic Era , 2014, ACM Comput. Surv..

[90]  Xiaoqian Jiang,et al.  Privacy-preserving GWAS analysis on federated genomic datasets , 2015, BMC Medical Informatics and Decision Making.

[91]  Michael T. Goodrich,et al.  The Mastermind Attack on Genomic Data , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[92]  Andelka M. Phillips,et al.  ‘Only a click away — DTC genetics for ancestry, health, love…and more: A view of the business and regulatory landscape’ , 2016, Applied & translational genomics.

[93]  Luc Rocher,et al.  Estimating the success of re-identifications in incomplete datasets using generative models , 2019, Nature Communications.

[94]  C. Bustamante,et al.  Privacy Risks from Genomic Data-Sharing Beacons , 2015, American journal of human genetics.

[95]  Michael Backes,et al.  Membership Privacy in MicroRNA-based Studies , 2016, CCS.

[96]  Candace Timpte,et al.  The Genetic Information Nondiscrimination Act , 2013 .