Your browser doesn't support javascript.
loading
Expanding Access to Large-Scale Genomic Data While Promoting Privacy: A Game Theoretic Approach.
Wan, Zhiyu; Vorobeychik, Yevgeniy; Xia, Weiyi; Clayton, Ellen Wright; Kantarcioglu, Murat; Malin, Bradley.
Afiliação
  • Wan Z; Department of Electrical Engineering and Computer Science, Vanderbilt University, Nashville, TN 37212, USA. Electronic address: zhiyu.wan@vanderbilt.edu.
  • Vorobeychik Y; Department of Electrical Engineering and Computer Science, Vanderbilt University, Nashville, TN 37212, USA.
  • Xia W; Department of Electrical Engineering and Computer Science, Vanderbilt University, Nashville, TN 37212, USA.
  • Clayton EW; Center for Biomedical Ethics and Society, Vanderbilt University Medical Center, Nashville, TN 37203, USA; Law School, Vanderbilt University, Nashville, TN 37203, USA; Department of Pediatrics, Vanderbilt University Medical Center, Nashville, TN 37232, USA.
  • Kantarcioglu M; Department of Computer Science, University of Texas at Dallas, Richardson, TX 75080, USA.
  • Malin B; Department of Electrical Engineering and Computer Science, Vanderbilt University, Nashville, TN 37212, USA; Department of Biomedical Informatics, Vanderbilt University Medical Center, Nashville, TN 37203, USA. Electronic address: b.malin@vanderbilt.edu.
Am J Hum Genet ; 100(2): 316-322, 2017 02 02.
Article em En | MEDLINE | ID: mdl-28065469
ABSTRACT
Emerging scientific endeavors are creating big data repositories of data from millions of individuals. Sharing data in a privacy-respecting manner could lead to important discoveries, but high-profile demonstrations show that links between de-identified genomic data and named persons can sometimes be reestablished. Such re-identification attacks have focused on worst-case scenarios and spurred the adoption of data-sharing practices that unnecessarily impede research. To mitigate concerns, organizations have traditionally relied upon legal deterrents, like data use agreements, and are considering suppressing or adding noise to genomic variants. In this report, we use a game theoretic lens to develop more effective, quantifiable protections for genomic data sharing. This is a fundamentally different approach because it accounts for adversarial behavior and capabilities and tailors protections to anticipated recipients with reasonable resources, not adversaries with unlimited means. We demonstrate this approach via a new public resource with genomic summary data from over 8,000 individuals-the Sequence and Phenotype Integration Exchange (SPHINX)-and show that risks can be balanced against utility more effectively than with traditional approaches. We further show the generalizability of this framework by applying it to other genomic data collection and sharing endeavors. Recognizing that such models are dependent on a variety of parameters, we perform extensive sensitivity analyses to show that our findings are robust to their fluctuations.
Assuntos
Palavras-chave

Texto completo: 1 Coleções: 01-internacional Base de dados: MEDLINE Assunto principal: Genômica / Privacidade Genética / Bases de Dados Genéticas / Disseminação de Informação / Modelos Teóricos Tipo de estudo: Prognostic_studies Limite: Humans Idioma: En Revista: Am J Hum Genet Ano de publicação: 2017 Tipo de documento: Article

Texto completo: 1 Coleções: 01-internacional Base de dados: MEDLINE Assunto principal: Genômica / Privacidade Genética / Bases de Dados Genéticas / Disseminação de Informação / Modelos Teóricos Tipo de estudo: Prognostic_studies Limite: Humans Idioma: En Revista: Am J Hum Genet Ano de publicação: 2017 Tipo de documento: Article