Genomic Data Sharing under Dependent Local Differential Privacy

被引:8
作者
Yilmaz, Emre [1 ]
Ji, Tianxi [2 ]
Ayday, Erman [2 ]
Li, Pan [2 ]
机构
[1] Univ Houston Downtown, Houston, TX 77002 USA
[2] Case Western Reserve Univ, Cleveland, OH 44106 USA
来源
CODASPY'22: PROCEEDINGS OF THE TWELVETH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY | 2022年
基金
美国国家科学基金会; 美国国家卫生研究院;
关键词
Genomics; Data sharing; Local differential privacy;
D O I
10.1145/3508398.3511519
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy-preserving genomic data sharing is prominent to increase the pace of genomic research, and hence to pave the way towards personalized genomic medicine. In this paper, we introduce (epsilon, T)-dependent local differential privacy (LDP) for privacy-preserving sharing of correlated data and propose a genomic data sharing mechanism under this privacy definition. We first show that the original definition of LDP is not suitable for genomic data sharing, and then we propose a new mechanism to share genomic data. The proposed mechanism considers the correlations in data during data sharing, eliminates statistically unlikely data values beforehand, and adjusts the probability distributions for each shared data point accordingly. By doing so, we show that we can avoid an attacker from inferring the correct values of the shared data points by utilizing the correlations in the data. By adjusting the probability distributions of the shared states of each data point, we also improve the utility of shared data for the data collector. Furthermore, we develop a greedy algorithm that strategically identifies the processing order of the shared data points with the aim of maximizing the utility of the shared data. Our evaluation results on a real-life genomic dataset show the superiority of the proposed mechanism compared to the randomized response mechanism (a widely used technique to achieve LDP).
引用
收藏
页码:77 / 88
页数:12
相关论文
共 50 条
  • [41] Privacy Protection Method for K-modes Clustering Data with Local Differential Privacy
    Zhang S.-B.
    Yuan L.-J.
    Mao X.-J.
    Zhu G.-M.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2022, 50 (09): : 2181 - 2188
  • [42] Local Differential Privacy for correlated location data release in ITS
    Chong, Kah Meng
    Malip, Amizah
    COMPUTER NETWORKS, 2024, 255
  • [43] SPoFC: A framework for stream data aggregation with local differential privacy
    Yang, Mengmeng
    Lam, Kwok-Yan
    Zhu, Tianqing
    Tang, Chenghua
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (05)
  • [44] Adaptive personalized privacy-preserving data collection scheme with local differential privacy
    Song, Haina
    Shen, Hua
    Zhao, Nan
    He, Zhangqing
    Xiong, Wei
    Wu, Minghu
    Zhang, Mingwu
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2024, 36 (04)
  • [45] A novel local differential privacy federated learning under multi-privacy regimes
    Liu, Chun
    Tian, Youliang
    Tang, Jinchuan
    Dang, Shuping
    Chen, Gaojie
    EXPERT SYSTEMS WITH APPLICATIONS, 2023, 227
  • [46] Controlling the signal: Practical privacy protection of genomic data sharing through Beacon services
    Zhiyu Wan
    Yevgeniy Vorobeychik
    Murat Kantarcioglu
    Bradley Malin
    BMC Medical Genomics, 10
  • [47] Controlling the signal: Practical privacy protection of genomic data sharing through Beacon services
    Wan, Zhiyu
    Vorobeychik, Yevgeniy
    Kantarcioglu, Murat
    Malin, Bradley
    BMC MEDICAL GENOMICS, 2017, 10
  • [48] Privacy at Scale: Local Differential Privacy in Practice
    Cormode, Graham
    Jha, Somesh
    Kulkarni, Tejas
    Li, Ninghui
    Srivastava, Divesh
    Wang, Tianhao
    SIGMOD'18: PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2018, : 1655 - 1658
  • [49] Open Access Data Sharing in Genomic Research
    Pereira, Stacey
    Gibbs, Richard A.
    McGuire, Amy L.
    GENES, 2014, 5 (03): : 739 - 747
  • [50] Privacy Passport: Privacy-Preserving Cross-Domain Data Sharing
    Chen, Xue
    Wang, Cheng
    Yang, Qing
    Teng, Hu
    Jiang, Changjun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 636 - 650