scholarly journals Privacy-preserving storage of sequenced genomic data

BMC Genomics ◽  
2021 ◽  
Vol 22 (1) ◽  
Author(s):  
Rastislav Hekel ◽  
Jaroslav Budis ◽  
Marcel Kucharik ◽  
Jan Radvanszky ◽  
Zuzana Pös ◽  
...  

Abstract Background The current and future applications of genomic data may raise ethical and privacy concerns. Processing and storing of this data introduce a risk of abuse by potential offenders since the human genome contains sensitive personal information. For this reason, we have developed a privacy-preserving method, named Varlock providing secure storage of sequenced genomic data. We used a public set of population allele frequencies to mask the personal alleles detected in genomic reads. Each personal allele described by the public set is masked by a randomly selected population allele with respect to its frequency. Masked alleles are preserved in an encrypted confidential file that can be shared in whole or in part using public-key cryptography. Results Our method masked the personal variants and introduced new variants detected in a personal masked genome. Alternative alleles with lower population frequency were masked and introduced more often. We performed a joint PCA analysis of personal and masked VCFs, showing that the VCFs between the two groups cannot be trivially mapped. Moreover, the method is reversible and personal alleles in specific genomic regions can be unmasked on demand. Conclusion Our method masks personal alleles within genomic reads while preserving valuable non-sensitive properties of sequenced DNA fragments for further research. Personal alleles in the desired genomic regions may be restored and shared with patients, clinics, and researchers. We suggest that the method can provide an additional security layer for storing and sharing of the raw aligned reads.

2020 ◽  
Author(s):  
Rastislav Hekel ◽  
Jaroslav Budiš ◽  
Marcel Kucharík ◽  
Jan Radvanszky ◽  
Tomáš Szemes

AbstractIntroductionCurrent and future applications of genomic data may raise ethical and privacy concerns. Processing and storing genomic data introduces a risk of abuse by a potential adversary since the human genome contains information about sensitive personal traits. For this reason, we developed a privacy preserving method, called Varlock, for secure storage and dissemination of sequenced genomic data.Materials and methodsThe Varlock uses a set of population allele frequencies to mask personal alleles detected in genomic reads. Each detected allele is replaced by a randomly selected population allele concerning its frequency. Masked alleles are preserved in an encrypted confidential file that can be shared, in whole or in part, using public-key cryptography.ResultsOur method masked personal variants and introduced new variants called on an individual’s genome, while alternative alleles with lower population frequency were masked and introduced more often. We performed joint PCA analysis of personal and masked VCFs, showing that the VCFs between the two groups can not be trivially mapped. Moreover, the method is reversible; therefore, personal alleles can be unmasked in specific genomic regions on demand.ConclusionOur method masks personal alleles within mapped reads while preserving valuable non-sensitive properties of sequenced DNA fragments for further research. Accordingly, masked reads can be stored publicly, since they are deprived of sensitive personal information. Personal alleles may be restored in arbitrary genomic regions for interested parties: patients, medical units, and researchers.


Author(s):  
Anna Rohunen ◽  
Jouni Markkula

Personal data is increasingly collected with the support of rapidly advancing information and communication technology, which raises privacy concerns among data subjects. In order to address these concerns and offer the full benefits of personal data intensive services to the public, service providers need to understand how to evaluate privacy concerns in evolving service contexts. By analyzing the earlier used privacy concerns evaluation instruments, we can learn how to adapt them to new contexts. In this article, the historical development of the most widely used privacy concerns evaluation instruments is presented and analyzed regarding privacy concerns' dimensions. Privacy concerns' core dimensions, and the types of context dependent dimensions, to be incorporated into evaluation instruments are identified. Following this, recommendations on how to utilize the existing evaluation instruments are given, as well as suggestions for future research dealing with validation and standardization of the instruments.


The widespread of Internet usage has resulted in a greater number and variety of applications involving different types of private information. In order to diminish privacy concerns and strengthen user trust, security improvements in terms of authentication are necessary. The solutions need to be convenient, entailing ease of use and higher mobility. The suggested approach is to make use of the already popular mobile phone and to involve the mobile network, benefiting from Subscriber Identity Module (SIM) card’s tamper resistance to become trusted entities guarding personal information and identifying users. Mobile phone’s SIM card is convenient for safely storing security parameters essential for secured communication. It becomes secure entity compulsory for getting access to privacy sensitive Internet applications, like those involving money transfers. Utilizing the NFC interface passes the personal user keys only when needed, giving additional strength to the traditional public key cryptography approach in terms of security and portability.


Author(s):  
Teddy Mantoro ◽  
Admir Milišic ◽  
Media Ayu

The widespread of Internet usage has resulted in a greater number and variety of applications involving different types of private information. In order to diminish privacy concerns and strengthen user trust, security improvements in terms of authentication are necessary. The solutions need to be convenient, entailing ease of use and higher mobility. The suggested approach is to make use of the already popular mobile phone and to involve the mobile network, benefiting from Subscriber Identity Module (SIM) card’s tamper resistance to become trusted entities guarding personal information and identifying users. Mobile phone’s SIM card is convenient for safely storing security parameters essential for secured communication. It becomes secure entity compulsory for getting access to privacy sensitive Internet applications, like those involving money transfers. Utilizing the NFC interface passes the personal user keys only when needed, giving additional strength to the traditional public key cryptography approach in terms of security and portability.


Author(s):  
Anna Rohunen ◽  
Jouni Markkula

Personal data is increasingly collected with the support of rapidly advancing information and communication technology, which raises privacy concerns among data subjects. In order to address these concerns and offer the full benefits of personal data-intensive services to the public, service providers need to understand how to evaluate privacy concerns in evolving service contexts. By analyzing the earlier privacy concerns evaluation instruments, we can learn how to adapt them to new contexts. In this chapter, the historical development of the most widely used privacy concerns evaluation instruments is presented and analyzed regarding privacy concerns' dimensions. Privacy concerns' core dimensions and the types of context dependent dimensions to be incorporated into evaluation instruments are identified. Following this, recommendations on how to utilize the existing evaluation instruments are given, as well as suggestions for future research dealing with validation and standardization of the instruments.


2019 ◽  
Author(s):  
Dennis Grishin ◽  
Jean Louis Raisaro ◽  
Juan Ramón Troncoso-Pastoriza ◽  
Kamal Obbad ◽  
Kevin Quinn ◽  
...  

AbstractThe growing number of health-data breaches, the use of genomic databases for law enforcement purposes and the lack of transparency of personal-genomics companies are raising unprecedented privacy concerns. To enable a secure exploration of genomic datasets with controlled and transparent data access, we propose a novel approach that combines cryptographic privacy-preserving technologies, such as homomorphic encryption and secure multi-party computation, with the auditability of blockchains. This approach provides strong security guarantees against realistic threat models by empowering individual citizens to decide who can query and access their genomic data and by ensuring end-to-end data confidentiality. Our open-source implementation supports queries on the encrypted genomic data of hundreds of thousands of individuals, with minimal overhead. Our work opens a path towards multi-functional, privacy-preserving genomic-data analysis.One Sentence SummaryA citizen-centered open-source response to the privacy concerns that hinder population genomics, based on modern cryptography.


2015 ◽  
Vol 5 (1) ◽  
pp. 51-64
Author(s):  
Tinu Jain ◽  
Prashant Mishra

Internet is quickly becoming the public electronic marketplace. Though the internet has revolutionized retail and direct marketing, the full scale incorporation and acceptance of the internet marketplace with the modern business is limited. One major inhibition shown by the internet buyers is in the form of lack of confidence in the newly developed marketing machinery/technology and concern related fear and distrust regarding loss of personal privacy due to easy access of personal information to the marketers. This concern about personal information and privacy varies with consumers especially with countries. It is also suggested that importance provided to various privacy dimensions would vary. The research investigates different dimensions and their interrelationship to identify factors affecting privacy concern among Net buyers in India.


2019 ◽  
pp. 1214-1229
Author(s):  
Tinu Jain ◽  
Prashant Mishra

Internet is quickly becoming the public electronic marketplace. Though the internet has revolutionized retail and direct marketing, the full scale incorporation and acceptance of the internet marketplace with the modern business is limited. One major inhibition shown by the internet buyers is in the form of lack of confidence in the newly developed marketing machinery/technology and concern related fear and distrust regarding loss of personal privacy due to easy access of personal information to the marketers. This concern about personal information and privacy varies with consumers especially with countries. It is also suggested that importance provided to various privacy dimensions would vary. The research investigates different dimensions and their interrelationship to identify factors affecting privacy concern among Net buyers in India.


Author(s):  
Pawel Popiel

Engaging normative theories of the press and research examining the evolution of privacy coverage, this study examines press coverage of mobile app privacy issues between 2013 and 2016. The research sheds light on how the press frames privacy concerns within the mobile app context. Since such coverage can define the norms circumscribing the flows of users’ personal information, this study contributes to the debate about the role of the press in alerting the public to privacy issues that carry significant public interest implications. Ultimately, mobile privacy coverage favors certain solutions over others, emphasizes privacy tradeoffs over privacy rights, and balances user powerlessness with mobile app convenience and innovation, with implications for privacy discourses in public and policy arenas.


Author(s):  
Tinu Jain ◽  
Prashant Mishra

Internet is quickly becoming the public electronic marketplace. Though the internet has revolutionized retail and direct marketing, the full scale incorporation and acceptance of the internet marketplace with the modern business is limited. One major inhibition shown by the internet buyers is in the form of lack of confidence in the newly developed marketing machinery/technology and concern related fear and distrust regarding loss of personal privacy due to easy access of personal information to the marketers. This concern about personal information and privacy varies with consumers especially with countries. It is also suggested that importance provided to various privacy dimensions would vary. The research investigates different dimensions and their interrelationship to identify factors affecting privacy concern among Net buyers in India.


Sign in / Sign up

Export Citation Format

Share Document