Privacy Protection for Genomic Data: Current Techniques and Challenges

  • Muzammil M. Baig
  • Jiuyong Li
  • Jixue Liu
  • Hua Wang
  • Junhu Wang
Part of the Studies in Computational Intelligence book series (SCI, volume 265)

Abstract

Human genomic data is a treasure that holds rich information for bioresearch. The share of human genomic data is necessary for the continuous progress of biology, medicine and health research. However, human genomic data also contains private information of individuals. Human genomic data may be maliciously used to find out the genetic tendency for a disease, and even to track descendents and relatives of the individual. In this paper, we review some techniques for protecting privacy in sharing human genomic data and discuss problems and challenges.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Altman, R., Klein, T.: Challenges for biomedical informatics and pharmacogenomics. Annual Review of Pharmacology and Toxicology 42, 113–133 (2002)CrossRefGoogle Scholar
  2. McGurie, A.L., Gibbs, R.A.: No longer de-identified. Science 312, 370 (2006)CrossRefGoogle Scholar
  3. Burnett, L., Barlow-Stewart, K., Pros, A.L., Aizenberg, H.: The gene trustee: a universal identification system that ensures privacy and confidentiality for human genetic databases. Journal of Law and Medicine 4(10), 506–513 (2003)Google Scholar
  4. Churches, T.: A proposed architecture and method of operation for improving the protection of privacy and confidentiality in disease registers. BMC Medical Research Methodology 1, 3–15 (2003)Google Scholar
  5. Claude, D., Benigni, X., Barillot, E., Vaysseix, G.: Dbcat: A catalog of 500 biological databases. Nucleic Acids Research 1(28), 8–9 (2009)Google Scholar
  6. Evans, W., Relling, M.: Pharmacogenomics: Translating functional genomics into rational therapeutics. Science 286, 487–491 (1999)CrossRefGoogle Scholar
  7. Gaudet, D., Arsnault, S., Belanger, C.: Procedure to protect confidentiality of familial data in community genetics and genomics research. Clinical Genetics 55(4), 259–264 (1999)CrossRefGoogle Scholar
  8. GINA, Genetic Information Non-discrimination Act. US (2008), http://www.genome.gov/24519851
  9. Gulcher, J., Kristjansson, K., Gudbjartsson, H., Stefanson, K.: Protection of privacy by third-party encryption in genetic research. European Journal of Human Genetics 8, 739–742 (2000)CrossRefGoogle Scholar
  10. Gulcher, J., Kong, A., Stefanson, K.: The genealogic approach to human genetics. Cancer 7(1), 61–68 (2001)Google Scholar
  11. HGDP, Human Genome Diversity Project (2002), http://www.stanford.edu/group/morrinst/hgdp.html
  12. Liebecq, C.: Biochemical Nomenclature and Related Documents: A Compendium, 2nd edn. Chapel Hill, NC, Portland Press (2009)Google Scholar
  13. Lin, Z., Hewitt, M., Altman, R.B.: Using binning to maintain confidentiality of medical data. In: American Medical Informatics Association Annual Symposium, pp. 454–458 (2002)Google Scholar
  14. Lin, Z., Owen, A.B., Altman, R.B.: Genomic research and human subject privacy. Science 305, 183 (2004)CrossRefGoogle Scholar
  15. Malin, B.A.: An evaluation of the current state of genomic data privacy protection technology and a roadmap for the future. Journal of the American Medical Informatics Association 12, 28–34 (2005)CrossRefGoogle Scholar
  16. Malin, B.A.: Protecting genomic sequence anonymity with generalization lattices. Methods of Information in Medicine 44(5), 687–692 (2005)Google Scholar
  17. Malin, B.A., Sweeny, L.: Determining the identifiability of dna database entries. Journal of the American Medical Informatics Association, 537–541 (2000)Google Scholar
  18. Malin, B.A., Sweeny, L.: Re-identification of DNA through an automated linkage process. Journal of the American Medical Informatics Association, 423–427 (2001)Google Scholar
  19. Malin, B.A., Sweeny, L.: Inferring genotype from clinical phenotype through a knowledge based algorithm. In: Pacific Symposium of Biocomputing, pp. 41–52 (2002)Google Scholar
  20. Malin, B.A., Sweeny, L.: How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems. Journal of the American Medical Informatics Association 37, 179–192 (2004)Google Scholar
  21. de Moor, G.J., Claerhout, B., de Meyer, F.: Privacy enhancing technologies: the key to secure communication and management of clinical and genomic data. Methods of Information in Medicine 42, 148–153 (2003)Google Scholar
  22. West, M., Ginsburg, G., Huang, A., Nevins, J.: Embracing the complexity of genomic data for personalized medicine. Genome Research 16, 559–566 (2006)CrossRefGoogle Scholar
  23. NHGRI, Guidance on Human Subjects Issues in Large-Scale DNA Sequencing. National Human Genome Research Institute (1996), http://www.genome.gov/10000921
  24. Roses, A.: Pharmacogenetics and pharmacogenomics in the discovery and development of medicines. Nature 38, 815–818 (2000)Google Scholar
  25. Sweeney, L.: Weaving technology and policy together to maintain confidentiality. Journal of Law and Medicine 25, 98–111 (1997)CrossRefGoogle Scholar
  26. Sweeney, L.: Uniqueness of simple demographics in the U.S. population. Tech. Rep. LIDAP-WP4, Data Privacy Laboratory, Carnegie Mellon University, Pittsburgh, PA (2000)Google Scholar
  27. Sweeney, L.: K-anonymity: A model for protecting privacy. Uncertainty, Fuzziness and Knowledge-based Systems 10, 557–570 (2002)MATHCrossRefMathSciNetGoogle Scholar
  28. Vaszar, L.T., Cho, M.K., Raffin, T.A.: Privacy issues in personalized medicine. Pharmacogenomics 4, 107–112 (2003)CrossRefGoogle Scholar
  29. Wylie, J.E., Mineau, G.P.: Biomedical databases: protecting privacy and promoting research. Trends Biotechnol. 21, 113–116 (2003)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Muzammil M. Baig
    • 1
  • Jiuyong Li
    • 1
  • Jixue Liu
    • 1
  • Hua Wang
    • 2
  • Junhu Wang
    • 3
  1. 1.School of Computer and Information ScienceUniversity of South AustraliaMawson LakesAustralia
  2. 2.Department of Mathematics and ComputingUniversity of Southern QueenslandToowoombaAustralia
  3. 3.School of Information and Communication TechnologyGriffith UniversityGold CostAustralia

Personalised recommendations