Addressing Beacon re-identification attacks: quantification and mitigation of privacy risks

dc.contributor.authorRaisaro, Jean Louis
dc.contributor.authorTramer, Florian
dc.contributor.authorJi, Zhanglong
dc.contributor.authorBu, Diyue
dc.contributor.authorZhao, Yongan
dc.contributor.authorCarey, Knox
dc.contributor.authorLloyd, David
dc.contributor.authorSofia, Heidi
dc.contributor.authorBaker, Dixie
dc.contributor.authorFlicek, Paul
dc.contributor.authorShringarpure, Suyash
dc.contributor.authorBustamante, Carlos
dc.contributor.authorWang, Shuang
dc.contributor.authorJiang, Xiaoqian
dc.contributor.authorOhno-Machado, Lucila
dc.contributor.authorTang, Haixu
dc.contributor.authorWang, XiaoFeng
dc.contributor.authorHubaux, Jean-Pierre
dc.date.accessioned2025-02-20T16:58:56Z
dc.date.available2025-02-20T16:58:56Z
dc.date.issued2017-02-20
dc.description.abstractThe Global Alliance for Genomics and Health (GA4GH) created the Beacon Project as a means of testing the willingness of data holders to share genetic data in the simplest technical context—a query for the presence of a specified nucleotide at a given position within a chromosome. Each participating site (or “beacon”) is responsible for assuring that genomic data are exposed through the Beacon service only with the permission of the individual to whom the data pertains and in accordance with the GA4GH policy and standards. While recognizing the inference risks associated with large-scale data aggregation, and the fact that some beacons contain sensitive phenotypic associations that increase privacy risk, the GA4GH adjudged the risk of re-identification based on the binary yes/no allele-presence query responses as acceptable. However, recent work demonstrated that, given a beacon with specific characteristics (including relatively small sample size and an adversary who possesses an individual’s whole genome sequence), the individual’s membership in a beacon can be inferred through repeated queries for variants present in the individual’s genome. In this paper, we propose three practical strategies for reducing re-identification risks in beacons. The first two strategies manipulate the beacon such that the presence of rare alleles is obscured; the third strategy budgets the number of accesses per user for each individual genome. Using a beacon containing data from the 1000 Genomes Project, we demonstrate that the proposed strategies can effectively reduce re-identification risk in beacon-like datasets.
dc.identifier.citationRaisaro, Jean Louis, et al. "Addressing Beacon re-identification attacks: quantification and mitigation of privacy risks." Journal of the American Medical Informatics Association, 2017-2-20, https://doi.org/10.1093/jamia/ocw167.
dc.identifier.issn1527-974X
dc.identifier.otherBRITE 1466
dc.identifier.urihttps://hdl.handle.net/2022/32960
dc.language.isoen
dc.relation.isversionofhttps://doi.org/10.1093/jamia/ocw167
dc.relation.isversionofhttps://www.ncbi.nlm.nih.gov/pmc/articles/PMC5881894/
dc.relation.journalJournal of the American Medical Informatics Association
dc.titleAddressing Beacon re-identification attacks: quantification and mitigation of privacy risks

Files

Can’t use the file because of accessibility barriers? Contact us