Attacks on genetic privacy via uploads to genealogical databases

被引:25
|
作者
Edge, Michael D. [1 ,2 ,3 ]
Coop, Graham [1 ,2 ]
机构
[1] Univ Calif Davis, Ctr Populat Biol, Davis, CA 95616 USA
[2] Univ Calif Davis, Dept Evolut & Ecol, Davis, CA 95616 USA
[3] Univ Southern Calif, Quantitat & Computat Biol, Dept Biol Sci, Los Angeles, CA 90007 USA
来源
ELIFE | 2020年 / 9卷
基金
美国国家卫生研究院;
关键词
WHOLE-GENOME ASSOCIATION; DESCENT; IDENTITY; INFERENCE; HOMOZYGOSITY; RELATIVES; ANCESTRY; POLICY; FUTURE;
D O I
10.7554/eLife.51810
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
Direct-to-consumer (DTC) genetics services are increasingly popular, with tens of millions of customers. Several DTC genealogy services allow users to upload genetic data to search for relatives, identified as people with genomes that share identical by state (IBS) regions. Here, we describe methods by which an adversary can learn database genotypes by uploading multiple datasets. For example, an adversary who uploads approximately 900 genomes could recover at least one allele at SNP sites across up to 82% of the genome of a median person of European ancestries. In databases that detect IBS segments using unphased genotypes, approximately 100 falsified uploads can reveal enough genetic information to allow genome-wide genetic imputation. We provide a proof-of-concept demonstration in the GEDmatch database, and we suggest countermeasures that will prevent the exploits we describe.
引用
收藏
页数:25
相关论文
共 50 条
  • [1] Protecting Privacy When Genetic Databases Are Commercialized
    Prince, Anya E. R.
    Spector-Bagdady, Kayte
    JAMA-JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION, 2025,
  • [2] 'ANONYMOUS' GENETIC DATABASES VULNERABLE TO PRIVACY LEAKS
    Kudiabor, Helena
    NATURE, 2024, 634 (8035) : 764 - 765
  • [3] Practical Attacks on Relational Databases Protected via Searchable Encryption
    Abdelraheem, Mohamed Ahmed
    Andersson, Tobias
    Gehrmann, Christian
    Glackin, Cornelius
    INFORMATION SECURITY (ISC 2018), 2018, 11060 : 171 - 191
  • [4] GENEALOGICAL AND GENETIC PROFILES
    CAZES, MH
    JACQUARD, A
    ANNALES DE GENETIQUE, 1976, 19 (02): : 85 - 90
  • [5] Differential Privacy for Databases
    Near, Joseph P.
    He, Xi
    FOUNDATIONS AND TRENDS IN DATABASES, 2021, 11 (02): : 109 - 225
  • [6] A genealogical estimate of genetic relationships
    Fan, Caoqi
    Mancuso, Nicholas
    Chiang, Charleston W. K.
    AMERICAN JOURNAL OF HUMAN GENETICS, 2022, 109 (05) : 812 - 824
  • [7] Complexity of Insider Attacks to Databases
    Kul, Gokhan
    Upadhyaya, Shambhu
    Hughes, Andrew
    PROCEEDINGS OF THE 2017 INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS (MIST'17), 2017, : 25 - 32
  • [8] Privacy preservation for recommendation databases
    Riyana, Surapon
    Natwichai, Juggapong
    SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2018, 12 (3-4) : 259 - 273
  • [9] Toward privacy in public databases
    Chawla, S
    Dwork, C
    McSherry, F
    Smith, A
    Wee, H
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2005, 3378 : 363 - 385
  • [10] Differential Privacy for Growing Databases
    Cummings, Rachel
    Krehbiel, Sara
    Lai, Kevin A.
    Tantipongpipat, Uthaipon
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 31 (NIPS 2018), 2018, 31