首页> 外文会议>Association for Computing Machinery Conference on Computer and Communications Security >Learning Your Identity and Disease from Research Papers; Information Leaks in Genome Wide Association Study
【24h】

Learning Your Identity and Disease from Research Papers; Information Leaks in Genome Wide Association Study

机译:从研究论文学习你的身份和疾病; 基因组宽协会研究中的信息泄漏

获取原文

摘要

Genome-wide association studies (GWAS) aim at discovering the association between genetic variations, particularly single-nucleotide polymorphism (SNP), and common diseases, which is well recognized to be one of the most important and active areas in biomedical research. Also renowned is the privacy implication of such studies, which has been brought into the limelight by the recent attack proposed by Homer et al. Homer's attack demonstrates that it is possible to identify a GWAS participant from the allele frequencies of a large number of SNPs. Such a threat, unfortunately, was found in our research to be significantly understated. In this paper, we show that individuals can actually be identified from even a relatively small set of statistics, as those routinely published in GWAS papers. We present two attacks. The first one extends Homer's attack with a much more powerful test statistic, based on the correlations among different SNPs described by coefficient of determination (r2). This attack can determine the presence of an individual from the statistics related to a couple of hundred SNPs. The second attack can lead to complete disclosure of hundreds of participants' SNPs, through analyzing the information derived from published statistics. We also found that those attacks can succeed even when the precisions of the statistics are low and part of data is missing. We evaluated our attacks on the real human genomes and concluded that such threats are completely realistic.
机译:基因组 - 范围协会研究(GWAS)目的是发现遗传变异,特别是单核苷酸多态性(SNP)和常见疾病之间的关联,这被公认是生物医学研究中最重要和最活跃的区域之一。此外,还具有着名的这些研究的隐私含义,这已经被Homer等人提出的最近攻击所带来的敏捷。 Homer的攻击表明,可以从大量SNP的等位基因频率识别GWAS参与者。不幸的是,在我们的研究中发现了这种威胁,以显着低估。在本文中,我们表明,甚至可以从一个相对较小的统计数据中识别个人,因为那些经常在GWAS文件中公布的统计数据。我们提出了两次攻击。第一个基于通过确定系数(R2)描述的不同SNP之间的相关性,将HOMER的攻击延伸到更强大的测试统计。这种攻击可以确定与几百个SNP相关的统计数据的个人存在。通过分析来自已发布统计数据的信息,第二次攻击可能会导致数百名参与者的SNPS完整披露。我们还发现,即使统计的精度低,部分数据丢失,这些攻击也会成功。我们评估了对真实人类基因组的攻击,得出结论,这种威胁是完全逼真的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号