iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/3431504
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:09:15Z","timestamp":1722298155649},"reference-count":45,"publisher":"Association for Computing Machinery (ACM)","issue":"2","funder":[{"name":"CPRIT Scholar in Cancer Research","award":["CPRIT RR180012"]},{"name":"NSERC Discovery Grants","award":["RGPIN-2015-04147"]},{"name":"National Institute of Health","award":["R01GM114612"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Comput. Healthcare"],"published-print":{"date-parts":[[2021,4,30]]},"abstract":"\n Digitization of healthcare records contributed to a large volume of functional scientific data that can help researchers to understand the behaviour of many diseases. However, the privacy implications of this data, particularly genomics data, have surfaced recently as the collection, dissemination, and analysis of human genomics data is highly sensitive. There have been multiple privacy attacks relying on the uniqueness of the human genome that reveals a participant or a certain group\u2019s presence in a dataset. Therefore, the current data sharing policies have ruled out any public dissemination and adopted precautionary measures prior to genomics data release, which hinders timely scientific innovation. In this article, we investigate an approach that only releases the statistics from genomic data rather than the whole dataset and propose a generalized Differentially Private mechanism for Genome-wide Association Studies (GWAS). Our method provides a quantifiable privacy guarantee that adds noise to the intermediate outputs but ensures satisfactory accuracy of the private results. Furthermore, the proposed method offers multiple adjustable parameters that the data owners can set based on the optimal privacy requirements. These variables are presented as equalizers that balance between the privacy and utility of the GWAS. The method also incorporates\n Online Bin Packing<\/jats:italic>\n technique [1], which further bounds the privacy loss linearly, growing according to the number of open bins and scales with the incoming queries. Finally, we implemented and benchmarked our approach using\n seven<\/jats:italic>\n different GWAS studies to test the performance of the proposed methods. The experimental results demonstrate that for 1,000 arbitrary online queries, our algorithms are more than 80% accurate with reasonable privacy loss and exceed the state-of-the-art approaches on multiple studies (i.e., EigenStrat, LMM, TDT).\n <\/jats:p>","DOI":"10.1145\/3431504","type":"journal-article","created":{"date-parts":[[2021,3,5]],"date-time":"2021-03-05T11:06:40Z","timestamp":1614942400000},"page":"1-27","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Online Algorithm for Differentially Private Genome-wide Association Studies"],"prefix":"10.1145","volume":"2","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-6161-8275","authenticated-orcid":false,"given":"Md Momin Al","family":"Aziz","sequence":"first","affiliation":[{"name":"Computer Science, University of Manitoba, Winnipeg, Canada Canada"}]},{"given":"Shahin","family":"Kamali","sequence":"additional","affiliation":[{"name":"Computer Science, University of Manitoba, Winnipeg, Canada Canada"}]},{"given":"Noman","family":"Mohammed","sequence":"additional","affiliation":[{"name":"Computer Science, University of Manitoba, Winnipeg, Canada Canada"}]},{"given":"Xiaoqian","family":"Jiang","sequence":"additional","affiliation":[{"name":"School of Biomedical Informatics, University of Texas Health Science Center at Houston, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,3,5]]},"reference":[{"key":"e_1_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-014-9955-8"},{"key":"e_1_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1377\/hlthaff.23.2.116"},{"key":"e_1_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2015.07.005"},{"key":"e_1_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2767007"},{"key":"e_1_2_2_5_1","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1093\/bib\/bbx139","article-title":"Privacy-preserving techniques of genomic data\u2014A survey","volume":"20","author":"Al Aziz Md Momin","year":"2019","journal-title":"Brief. Bioinform."},{"key":"e_1_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0006"},{"key":"e_1_2_2_7_1","doi-asserted-by":"crossref","first-page":"055","DOI":"10.1055\/s-0038-1641216","article-title":"Between access and privacy: Challenges in sharing health data","volume":"27","author":"Malin Bradley","year":"2018","journal-title":"Yearbook Med. Info."},{"key":"e_1_2_2_8_1","unstructured":"The Personal Information Protection and Electronic Documents Act (PIPEDA). [n.d.]. Retrieved from https:\/\/goo.gl\/TScuoW. The Personal Information Protection and Electronic Documents Act (PIPEDA). [n.d.]. Retrieved from https:\/\/goo.gl\/TScuoW."},{"key":"e_1_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMp030020"},{"key":"e_1_2_2_10_1","volume-title":"Theory of Cryptography","author":"Dwork Cynthia"},{"key":"e_1_2_2_11_1","volume-title":"Proceedings of the 33rd International Conference on Automata, Languages and Programming\u2014Volume Part II (ICALP\u201906)","author":"Dwork Cynthia","year":"2006"},{"key":"e_1_2_2_12_1","volume-title":"Proceedings of the IEEE 27th Computer Security Foundations Symposium. 398--410","author":"Hsu J."},{"key":"e_1_2_2_13_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Haeberlen Andreas","year":"2011"},{"key":"e_1_2_2_14_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium (USENIXSecurity\u201914)","author":"Fredrikson Matthew","year":"2014"},{"key":"e_1_2_2_15_1","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1186\/s12920-017-0278-x","article-title":"Aftermath of bustamante attack on genomic beacon service","volume":"10","author":"Al Aziz Md Momin","year":"2017","journal-title":"BMC Med. Genom."},{"key":"e_1_2_2_16_1","volume-title":"Proceedings of the 51st Annual IEEE Symposium on Foundations of Computer Science (FOCS\u201910)","author":"Hardt Moritz"},{"key":"e_1_2_2_17_1","volume-title":"Fienberg","author":"Yu Fei","year":"2014"},{"key":"e_1_2_2_18_1","doi-asserted-by":"crossref","first-page":"S2","DOI":"10.1186\/1472-6947-14-S1-S2","article-title":"Differentially private genome data dissemination through top-down specialization","volume":"14","author":"Wang Shuang","year":"2014","journal-title":"BMC Med. Info. Decision Making"},{"key":"e_1_2_2_19_1","first-page":"137","article-title":"Privacy-preserving data sharing for genome-wide association studies","volume":"5","author":"Uhlerop Caroline","year":"2013","journal-title":"J. Privacy Confidential."},{"key":"e_1_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487687"},{"key":"e_1_2_2_21_1","volume-title":"Proceedings of the 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC\u201917)","author":"Sei Yuichi","year":"2017"},{"key":"e_1_2_2_22_1","volume-title":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 1286--1297","author":"Tram\u00e8r Florian","year":"2015"},{"key":"e_1_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btw009"},{"key":"e_1_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2014.01.008"},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cels.2016.04.013"},{"key":"e_1_2_2_26_1","doi-asserted-by":"crossref","first-page":"3716","DOI":"10.1093\/bioinformatics\/btx470","article-title":"Mechanisms to protect the privacy of families when using the transmission disequilibrium test in genome-wide association studies","volume":"33","author":"Wang Meng","year":"2017","journal-title":"Bioinformatics"},{"key":"e_1_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2018.2829760"},{"key":"e_1_2_2_28_1","first-page":"144","article-title":"Somewhat practical fully homomorphic encryption","volume":"2012","author":"Fan Junfeng","year":"2012","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_2_2_29_1","first-page":"3","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"Dwork Cynthia","year":"2014","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"e_1_2_2_30_1","volume-title":"Proceedings of the ACM SIGMOD International Conference on Management of Data. 19--30","author":"McSherry Frank D.","year":"2009"},{"key":"e_1_2_2_31_1","volume-title":"Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201910)","volume":"10","author":"Roy Indrajit","year":"2010"},{"key":"e_1_2_2_32_1","doi-asserted-by":"crossref","first-page":"1328","DOI":"10.1109\/TCBB.2018.2854776","article-title":"Med Co: Enabling secure and privacy-preserving exploration of distributed clinical and genomic data","volume":"16","author":"Raisaro Jean Louis","year":"2018","journal-title":"IEEE\/ACM Trans. Comput. Biol. Bioinform."},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2018.2854782"},{"key":"e_1_2_2_34_1","doi-asserted-by":"crossref","first-page":"e2005485","DOI":"10.1371\/journal.pbio.2005485","article-title":"Population genetics and GWAS: A primer","volume":"16","author":"Gibson Greg","year":"2018","journal-title":"PLoS Biol."},{"key":"e_1_2_2_36_1","unstructured":"Harmonic Series. [n.d.]. Retrieved from https:\/\/en.wikipedia.org\/wiki\/Harmonic_series_(mathematics). Harmonic Series. [n.d.]. Retrieved from https:\/\/en.wikipedia.org\/wiki\/Harmonic_series_(mathematics)."},{"key":"e_1_2_2_37_1","unstructured":"Eric W. Weisstein. [n.d.]. Block-Stacking problem. https:\/\/mathworld.wolfram.com\/BookStackingProblem.html. Eric W. Weisstein. [n.d.]. Block-Stacking problem. https:\/\/mathworld.wolfram.com\/BookStackingProblem.html."},{"key":"e_1_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2685505"},{"key":"e_1_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1965.10480775"},{"key":"e_1_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1038\/nmeth.1974"},{"key":"e_1_2_2_41_1","unstructured":"Differential Privacy GWAS-implementation. [n.d.]. Retrieved from https:\/\/github.com\/mominbuet\/DifferentialPrivacyGWAS. Differential Privacy GWAS-implementation. [n.d.]. Retrieved from https:\/\/github.com\/mominbuet\/DifferentialPrivacyGWAS."},{"key":"e_1_2_2_42_1","volume-title":"Palmer","author":"Cardon Lon R.","year":"2003"},{"key":"e_1_2_2_43_1","doi-asserted-by":"crossref","first-page":"i136","DOI":"10.1093\/bioinformatics\/btaa475","article-title":"Inference attacks against differentially private query results from genomic datasets including dependent tuples","volume":"36","author":"Almadhoun Nour","year":"2020","journal-title":"Bioinformatics"},{"key":"e_1_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pcbi.1002822"},{"key":"e_1_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/585265.585269"},{"key":"e_1_2_2_46_1","doi-asserted-by":"crossref","unstructured":"M. R. Garey and D. S. Johnson. 1981. Approximation algorithms for Bin packing problems: A survey. In Analysis and Design of Algorithms in Combinatorial Optimization. International Centre for Mechanical Sciences (Courses and Lectures) vol 266 G. Ausiello and M. Lucertini (Eds.). Springer. DOI:https:\/\/doi.org\/10.1007\/978-3-7091-2748-3_8 M. R. Garey and D. S. Johnson. 1981. Approximation algorithms for Bin packing problems: A survey. In Analysis and Design of Algorithms in Combinatorial Optimization. International Centre for Mechanical Sciences (Courses and Lectures) vol 266 G. Ausiello and M. Lucertini (Eds.). Springer. DOI:https:\/\/doi.org\/10.1007\/978-3-7091-2748-3_8","DOI":"10.1007\/978-3-7091-2748-3_8"}],"container-title":["ACM Transactions on Computing for Healthcare"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3431504","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T20:06:38Z","timestamp":1672603598000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3431504"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,5]]},"references-count":45,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,4,30]]}},"alternative-id":["10.1145\/3431504"],"URL":"http:\/\/dx.doi.org\/10.1145\/3431504","relation":{},"ISSN":["2691-1957","2637-8051"],"issn-type":[{"value":"2691-1957","type":"print"},{"value":"2637-8051","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,5]]},"assertion":[{"value":"2020-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-10-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-03-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}