Reconstructing Genotypes in Private Genomic ...
Document type :
Article dans une revue scientifique: Article original
DOI :
Title :
Reconstructing Genotypes in Private Genomic Databases from Genetic Risk Scores
Author(s) :
Paige, Brooks [Auteur]
Bell, James [Auteur]
Bellet, Aurelien [Auteur]
Machine Learning in Information Networks [MAGNET]
Gascón, Adrià [Auteur]
Ezer, Daphne [Auteur]
Bell, James [Auteur]
Bellet, Aurelien [Auteur]

Machine Learning in Information Networks [MAGNET]
Gascón, Adrià [Auteur]
Ezer, Daphne [Auteur]
Journal title :
Journal of Computational Biology
Pages :
435-451
Publisher :
Mary Ann Liebert
Publication date :
2021
ISSN :
1066-5277
English keyword(s) :
genetic risk scores
genomic privacy
GWAS
long-term privacy
reconstruction attack
genomic privacy
GWAS
long-term privacy
reconstruction attack
HAL domain(s) :
Informatique [cs]/Apprentissage [cs.LG]
Statistiques [stat]/Machine Learning [stat.ML]
Statistiques [stat]/Machine Learning [stat.ML]
English abstract : [en]
Some organizations such as 23andMe and the UK Biobank have large genomic databases that they re-use for multiple different genome-wide association studies. Even research studies that compile smaller genomic databases often ...
Show more >Some organizations such as 23andMe and the UK Biobank have large genomic databases that they re-use for multiple different genome-wide association studies. Even research studies that compile smaller genomic databases often utilize these databases to investigate many related traits. It is common for the study to report a genetic risk score (GRS) model for each trait within the publication. Here, we show that under some circumstances, these GRS models can be used to recover the genetic variants of individuals in these genomic databases—a reconstruction attack. In particular, if two GRS models are trained by using a largely overlapping set of participants, it is often possible to determine the genotype for each of the individuals who were used to train one GRS model, but not the other. We demonstrate this theoretically and experimentally by analyzing the Cornell Dog Genome database. The accuracy of our reconstruction attack depends on how accurately we can estimate the rate of co-occurrence of pairs of single nucleotide polymorphisms within the private database, so if this aggregate information is ever released, it would drastically reduce the security of a private genomic database. Caution should be applied when using the same database for multiple analysis, especially when a small number of individuals are included or excluded from one part of the study.Show less >
Show more >Some organizations such as 23andMe and the UK Biobank have large genomic databases that they re-use for multiple different genome-wide association studies. Even research studies that compile smaller genomic databases often utilize these databases to investigate many related traits. It is common for the study to report a genetic risk score (GRS) model for each trait within the publication. Here, we show that under some circumstances, these GRS models can be used to recover the genetic variants of individuals in these genomic databases—a reconstruction attack. In particular, if two GRS models are trained by using a largely overlapping set of participants, it is often possible to determine the genotype for each of the individuals who were used to train one GRS model, but not the other. We demonstrate this theoretically and experimentally by analyzing the Cornell Dog Genome database. The accuracy of our reconstruction attack depends on how accurately we can estimate the rate of co-occurrence of pairs of single nucleotide polymorphisms within the private database, so if this aggregate information is ever released, it would drastically reduce the security of a private genomic database. Caution should be applied when using the same database for multiple analysis, especially when a small number of individuals are included or excluded from one part of the study.Show less >
Language :
Anglais
Peer reviewed article :
Oui
Audience :
Internationale
Popular science :
Non
Collections :
Source :
Files
- https://hal.inria.fr/hal-03498165/document
- Open access
- Access the document
- https://doi.org/10.1089/cmb.2020.0445
- Open access
- Access the document
- https://doi.org/10.1089/cmb.2020.0445
- Open access
- Access the document
- https://hal.inria.fr/hal-03498165/document
- Open access
- Access the document
- https://doi.org/10.1089/cmb.2020.0445
- Open access
- Access the document
- https://doi.org/10.1089/cmb.2020.0445
- Open access
- Access the document
- https://hal.inria.fr/hal-03498165/document
- Open access
- Access the document
- https://doi.org/10.1089/cmb.2020.0445
- Open access
- Access the document
- https://doi.org/10.1089/cmb.2020.0445
- Open access
- Access the document
- document
- Open access
- Access the document
- jcb21.pdf
- Open access
- Access the document
- cmb.2020.0445
- Open access
- Access the document
- document
- Open access
- Access the document
- jcb21.pdf
- Open access
- Access the document