Mechanisms for Hiding Sensitive Genotypes with Information-Theoretic Privacy

被引:0
|
作者
Ye, Fangwei [1 ]
Cho, Hyunghoon [2 ]
El Rouayheb, Salim [1 ]
机构
[1] Rutgers State Univ, Piscataway Township, NJ 08854 USA
[2] Broad Inst MIT & Harvard, Cambridge, MA 02142 USA
关键词
IMPUTATION;
D O I
10.1109/isit44484.2020.9174492
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The growing availability of personal genomics services comes with increasing concerns for genomic privacy. Individuals may wish to withhold sensitive genotypes that contain critical health-related information when sharing their data with such services. A straightforward solution that masks only the sensitive genotypes does not ensure privacy due to the correlation structure within the genome. Here, we develop an information-theoretic mechanism for masking sensitive genotypes, which ensures no information about the sensitive genotypes is leaked. We also propose an efficient algorithmic implementation of our mechanism for genomic data governed by hidden Markov models. Our work is a step towards more rigorous control of privacy in genomic data sharing.
引用
收藏
页码:902 / 907
页数:6
相关论文
共 50 条
  • [21] Competitive Privacy in the Smart Grid: An Information-theoretic Approach
    Sankar, Lalitha
    Kar, Soummya
    Tandon, Ravi
    Poor, H. Vincent
    2011 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2011,
  • [22] Information-theoretic Bounds for Differentially Private Mechanisms
    Barthe, Gilles
    Koepf, Boris
    2011 IEEE 24TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2011, : 191 - 204
  • [23] INFORMATION-THEORETIC DATA-HIDING: RECENT ACHIEVEMENTS AND OPEN PROBLEMS
    Voloshynovskiy, Sviatoslav
    Deguillaumet, Frederic
    Koval, Oleksiy
    Pun, Thierry
    INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2005, 5 (01) : 5 - 35
  • [24] Generative Adversarial Privacy: A Data-Driven Approach to Information-Theoretic Privacy
    Huang, Chong
    Kairouz, Peter
    Sankar, Lalitha
    2018 CONFERENCE RECORD OF 52ND ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS, AND COMPUTERS, 2018, : 2162 - 2166
  • [25] Information-theoretic analysis of security in side-informed data hiding
    Pérez-Freire, L
    Comesaña, P
    Pérez-González, F
    INFORMATION HIDING, 2005, 3727 : 131 - 145
  • [26] An overview of information-theoretic security and privacy: Metrics, limits and applications
    Bloch M.
    Günlü O.
    Yener A.
    Oggier F.
    Poor H.V.
    Sankar L.
    Schaefer R.F.
    IEEE Journal on Selected Areas in Information Theory, 2021, 2 (01): : 5 - 22
  • [27] Information-Theoretic Privacy for Smart Metering Systems with a Rechargeable Battery
    Li, Simon
    Khisti, Ashish
    Mahajan, Aditya
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (05) : 3679 - 3695
  • [28] An Information-Theoretic Approach to Time-Series Data Privacy
    Amar, Yousef
    Haddadi, Hamed
    Mortier, Richard
    PROCEEDINGS OF THE WORKSHOP ON PRIVACY BY DESIGN IN DISTRIBUTED SYSTEMS (P2DS'18), 2015,
  • [29] Approaching the Information-Theoretic Limit of Privacy Disclosure With Utility Guarantees
    Yang, Qing
    Wang, Cheng
    Yuan, Haifeng
    Cui, Jipeng
    Teng, Hu
    Chen, Xue
    Jiang, Changjun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 3339 - 3352
  • [30] On Information-Theoretic Metrics for Symmetric-Key Encryption and Privacy
    Calmon, Flavio P.
    Varia, Mayank
    Medard, Muriel
    2014 52ND ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2014, : 889 - 894