Unknown

Dataset Information

0

Privacy-preserving techniques of genomic data-a survey.


ABSTRACT: Genomic data hold salient information about the characteristics of a living organism. Throughout the past decade, pinnacle developments have given us more accurate and inexpensive methods to retrieve genome sequences of humans. However, with the advancement of genomic research, there is a growing privacy concern regarding the collection, storage and analysis of such sensitive human data. Recent results show that given some background information, it is possible for an adversary to reidentify an individual from a specific genomic data set. This can reveal the current association or future susceptibility of some diseases for that individual (and sometimes the kinship between individuals) resulting in a privacy violation. Regardless of these risks, our genomic data hold much importance in analyzing the well-being of us and the future generation. Thus, in this article, we discuss the different privacy and security-related problems revolving around human genomic data. In addition, we will explore some of the cardinal cryptographic concepts, which can bring efficacy in secure and private genomic data computation. This article will relate the gaps between these two research areas-Cryptography and Genomics.

SUBMITTER: Aziz MMA 

PROVIDER: S-EPMC6585383 | biostudies-literature | 2019 May

REPOSITORIES: biostudies-literature

altmetric image

Publications

Privacy-preserving techniques of genomic data-a survey.

Aziz Md Momin Al MMA   Sadat Md Nazmus MN   Alhadidi Dima D   Wang Shuang S   Jiang Xiaoqian X   Brown Cheryl L CL   Mohammed Noman N  

Briefings in bioinformatics 20190501 3


Genomic data hold salient information about the characteristics of a living organism. Throughout the past decade, pinnacle developments have given us more accurate and inexpensive methods to retrieve genome sequences of humans. However, with the advancement of genomic research, there is a growing privacy concern regarding the collection, storage and analysis of such sensitive human data. Recent results show that given some background information, it is possible for an adversary to reidentify an  ...[more]

Similar Datasets

| S-EPMC8487550 | biostudies-literature
| S-EPMC5131820 | biostudies-literature
| S-EPMC8276015 | biostudies-literature
| S-EPMC10311306 | biostudies-literature
| S-EPMC9858402 | biostudies-literature
| S-EPMC9246511 | biostudies-literature
| S-EPMC7041894 | biostudies-literature
| S-EPMC4985613 | biostudies-literature
| S-EPMC8650276 | biostudies-literature
| S-EPMC10148292 | biostudies-literature