Unknown

Dataset Information

0

Secure genome-wide association analysis using multiparty computation.


ABSTRACT: Most sequenced genomes are currently stored in strict access-controlled repositories. Free access to these data could improve the power of genome-wide association studies (GWAS) to identify disease-causing genetic variants and aid the discovery of new drug targets. However, concerns over genetic data privacy may deter individuals from contributing their genomes to scientific studies and could prevent researchers from sharing data with the scientific community. Although cryptographic techniques for secure data analysis exist, none scales to computationally intensive analyses, such as GWAS. Here we describe a protocol for large-scale genome-wide analysis that facilitates quality control and population stratification correction in 9K, 13K, and 23K individuals while maintaining the confidentiality of underlying genotypes and phenotypes. We show the protocol could feasibly scale to a million individuals. This approach may help to make currently restricted data available to the scientific community and could potentially enable secure genome crowdsourcing, allowing individuals to contribute their genomes to a study without compromising their privacy.

SUBMITTER: Cho H 

PROVIDER: S-EPMC5990440 | biostudies-literature | 2018 Jul

REPOSITORIES: biostudies-literature

altmetric image

Publications

Secure genome-wide association analysis using multiparty computation.

Cho Hyunghoon H   Wu David J DJ   Berger Bonnie B  

Nature biotechnology 20180507 6


Most sequenced genomes are currently stored in strict access-controlled repositories. Free access to these data could improve the power of genome-wide association studies (GWAS) to identify disease-causing genetic variants and aid the discovery of new drug targets. However, concerns over genetic data privacy may deter individuals from contributing their genomes to scientific studies and could prevent researchers from sharing data with the scientific community. Although cryptographic techniques f  ...[more]

Similar Datasets

| S-EPMC6180364 | biostudies-other
| S-EPMC4726197 | biostudies-other
| S-EPMC9733077 | biostudies-literature
| S-EPMC4908319 | biostudies-literature
| S-EPMC7261120 | biostudies-literature
| S-EPMC7850908 | biostudies-literature
| S-EPMC6658266 | biostudies-literature
| S-EPMC8896632 | biostudies-literature
| S-EPMC6612817 | biostudies-other
| S-EPMC2908056 | biostudies-literature