Why Methods for Genomic Data Privacy Fail and How We Can Fix It

نویسنده

  • Bradley Malin
چکیده

The increasing integration of patient-specific genomic data into clinical practice and research raises serious privacy concerns. Various privacy enhancing techniques that “de-identify” the data through the removal of explicit identifiers, such as name or Social Security number, have been proposed and deployed. While advocates of these systems have the best of intentions, they are fundamentally flawed, due to a lack of formal modeling and proofs of privacy. These systems fail to account for information that can be inferred from genomic data, as well as, the environment into which data is shared. This research addresses the extent to which these systems are susceptible to computational “re-identification” attacks. The attacks we employ exploit residual information in genomic data and relates it to explicit identity. Though susceptibility varies, each of the protection methods studied is deficient in their protection against re-identification. Our findings stress the need for genomic data privacy protection methods that allow for provable guarantees of privacy.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Why Pseudonyms Don’t Anonymize: A Computational Re-identification Analysis of Genomic Data Privacy Protection Systems

Objectives: In order to supply patient-derived genomic data for medical research purposes, care must be taken to protect the identities of the patients from unwanted intrusions. Recently, several protection techniques that employ the use of trusted third parties (TTPs), and other identity protecting schemas, have been proposed and deployed. The goal of this paper is to analyze the susceptibilit...

متن کامل

A Brief Philosophical Encounter with Science and Medicine

We show a lot of respect for science today. To back up our claims, we tend to appeal to scientific methods. It seems that we all agree that these methods are effective for gaining the truth. We can ask why science has its special status as a supplier of knowledge about our external world and our bodies. Of course, one should not always trust what scientists say. Nonetheless, epistemological jus...

متن کامل

تجلی مفهوم درونگرایی در بازار های ایرانی

One of the symbols and symptoms that identify Islamic civilization is the Islamic Urbanization as a place for dwelling and activity. Urban areas and structures by manifestation of custom values should identify society’s civilization. And help them to achieve their purposes and ambitions. an Iranian Muslim architect ‘s belief has always been a priority for all of his works And to create his work...

متن کامل

Formal Privacy Analysis of Communication Protocols for Identity Management

Over the years, formal methods have been developed for the analysis of security and privacy aspects of communication in IT systems. However, existing methods are insufficient to deal with privacy, especially in identity management (IdM), as they fail to take into account whether personal information can be linked to its data subject. In this paper, we propose a general formal method to analyze ...

متن کامل

Application of qualitative research in management (why, when and how)

Application of qualitative research in management (why, when and how) Qualitative research has been increasingly used in all sciences. In this paper we will discuss about the applications of qualitative research methods in management sciences. The differences between quantitative and qualitative researches will be clarified and the statistical methods which are suitable for such researches will...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004