Attacks on genetic privacy via uploads to genealogical databases

被引:25
|
作者
Edge, Michael D. [1 ,2 ,3 ]
Coop, Graham [1 ,2 ]
机构
[1] Univ Calif Davis, Ctr Populat Biol, Davis, CA 95616 USA
[2] Univ Calif Davis, Dept Evolut & Ecol, Davis, CA 95616 USA
[3] Univ Southern Calif, Quantitat & Computat Biol, Dept Biol Sci, Los Angeles, CA 90007 USA
来源
ELIFE | 2020年 / 9卷
基金
美国国家卫生研究院;
关键词
WHOLE-GENOME ASSOCIATION; DESCENT; IDENTITY; INFERENCE; HOMOZYGOSITY; RELATIVES; ANCESTRY; POLICY; FUTURE;
D O I
10.7554/eLife.51810
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
Direct-to-consumer (DTC) genetics services are increasingly popular, with tens of millions of customers. Several DTC genealogy services allow users to upload genetic data to search for relatives, identified as people with genomes that share identical by state (IBS) regions. Here, we describe methods by which an adversary can learn database genotypes by uploading multiple datasets. For example, an adversary who uploads approximately 900 genomes could recover at least one allele at SNP sites across up to 82% of the genome of a median person of European ancestries. In databases that detect IBS segments using unphased genotypes, approximately 100 falsified uploads can reveal enough genetic information to allow genome-wide genetic imputation. We provide a proof-of-concept demonstration in the GEDmatch database, and we suggest countermeasures that will prevent the exploits we describe.
引用
收藏
页数:25
相关论文
共 50 条
  • [21] Genealogical trees from genetic distances
    Prignano, L.
    Serva, M.
    EUROPEAN PHYSICAL JOURNAL B, 2009, 69 (03): : 455 - 463
  • [22] Protecting databases from inference attacks
    Hinke, Thomas H.
    Delugach, Harry S.
    Wolf, Randall P.
    Computers and Security, 1997, 16 (08): : 687 - 708
  • [23] Surviving information warfare attacks on databases
    Ammann, P
    Jajodia, S
    McCollum, CD
    Blaustein, BT
    1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, : 164 - 174
  • [24] An Analysis of Complexity of Insider Attacks to Databases
    Kul, Gokhan
    Upadhyaya, Shambhu
    Hughes, Andrew
    ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS, 2021, 12 (01)
  • [25] Genetic databases
    Wahlestedt, C
    EUROPEAN PSYCHIATRY, 2002, 17 : 70S - 71S
  • [26] Inference Attacks and Information Security in Databases
    Poltavtsev, A. A.
    Khabarov, A. R.
    Selyankin, A. O.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2020, 54 (08) : 829 - 833
  • [27] Inference Attacks and Information Security in Databases
    A. A. Poltavtsev
    A. R. Khabarov
    A. O. Selyankin
    Automatic Control and Computer Sciences, 2020, 54 : 829 - 833
  • [28] Generic Attacks on Secure Outsourced Databases
    Kellaris, Georgios
    Kollios, George
    Nissim, Kobbi
    O'Neill, Adam
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1329 - 1340
  • [29] Protecting databases from inference attacks
    Hinke, TH
    Delugach, HS
    Wolf, RP
    COMPUTERS & SECURITY, 1997, 16 (08) : 687 - 708
  • [30] Privacy by diversity in sequential releases of databases
    Shmueli, Erez
    Tassa, Tamir
    INFORMATION SCIENCES, 2015, 298 : 344 - 372