Digital DNA lifecycle security and privacy: an overview

被引:9
作者
Alsaffar, Muhalb M. [1 ,2 ]
Hasan, Mohammad [1 ]
McStay, Gavin P. [1 ,3 ]
Sedky, Mohamed [1 ]
机构
[1] Staffordshire Univ, Stoke On Trent, Staffs, England
[2] Univ Technol Baghdad, Baghdad, Iraq
[3] New York Inst Technol, New York, NY USA
关键词
digital DNA life cycle; genomic privacy; DNA privacy; genomic security; DNA security; digital DNA attacks; DNA attack; genomic privacy-preserving techniques; direct-to-consumer (DTC) security; re-creational genomic security; genomic attacks; GENOMIC DATA; PRECISION MEDICINE; DATA-STORAGE; INDIVIDUALS; REIDENTIFICATION; IDENTIFICATION; ATTACKS;
D O I
10.1093/bib/bbab607
中图分类号
Q5 [生物化学];
学科分类号
071010 ; 081704 ;
摘要
DNA sequencing technologies have advanced significantly in the last few years leading to advancements in biomedical research which has improved personalised medicine and the discovery of new treatments for diseases. Sequencing technology advancement has also reduced the cost of DNA sequencing, which has led to the rise of direct-to-consumer (DTC) sequencing, e.g. , , etc. In the meantime, concerns have emerged over privacy and security in collecting, handling, analysing and sharing DNA and genomic data. DNA data are unique and can be used to identify individuals. Moreover, those data provide information on people's current disease status and disposition, e.g. mental health or susceptibility for developing cancer. DNA privacy violation does not only affect the owner but also affects their close consanguinity due to its hereditary nature. This article introduces and defines the term 'digital DNA life cycle' and presents an overview of privacy and security threats and their mitigation techniques for predigital DNA and throughout the digital DNA life cycle. It covers DNA sequencing hardware, software and DNA sequence pipeline in addition to common privacy attacks and their countermeasures when DNA digital data are stored, queried or shared. Likewise, the article examines DTC genomic sequencing privacy and security.
引用
收藏
页数:16
相关论文
共 107 条
[1]   A survey on genomic data by privacy-preserving techniques perspective [J].
Abinaya, B. ;
Santhi, S. .
COMPUTATIONAL BIOLOGY AND CHEMISTRY, 2021, 93
[2]   Identifying disease-causing mutations with privacy protection [J].
Akguen, Mete ;
Uenal, Ali Burak ;
Erguener, Bekir ;
Pfeifer, Nico ;
Kohlbacher, Oliver .
BIOINFORMATICS, 2020, 36 (21) :5205-5213
[3]   Privacy preserving processing of genomic data: A survey [J].
Akgun, Mete ;
Bayrak, A. Osman ;
Ozer, Bugra ;
Sagiroglu, M. Samil .
JOURNAL OF BIOMEDICAL INFORMATICS, 2015, 56 :103-111
[4]   Privacy-preserving techniques of genomic data-a survey [J].
Al Aziz, Md Momin ;
Sadat, Md Nazmus ;
Alhadidi, Dima ;
Wang, Shuang ;
Jiang, Xiaoqian ;
Brown, Cheryl L. ;
Mohammed, Noman .
BRIEFINGS IN BIOINFORMATICS, 2019, 20 (03) :887-895
[5]   Aftermath of bustamante attack on genomic beacon service [J].
Al Aziz, Md Momin ;
Ghasemi, Reza ;
Waliullah, Md ;
Mohammed, Noman .
BMC MEDICAL GENOMICS, 2017, 10
[6]   Supply-Chain Security of Digital Microfluidic Biochips [J].
Ali, Sk Subidh ;
Ibrahim, Mohamed ;
Rajendran, Jeyavijayan ;
Sinanoglu, Ozgur ;
Chakrabarty, Krishnendu .
COMPUTER, 2016, 49 (08) :36-43
[7]   Inference attacks against differentially private query results from genomic datasets including dependent tuples [J].
Almadhoun, Nour ;
Ayday, Erman ;
Ulusoy, Ozgur .
BIOINFORMATICS, 2020, 36 :136-145
[8]  
[Anonymous], 2018, Genetics
[9]   Analysis of security and privacy challenges for DNA-genomics applications and databases [J].
Arshad, Saadia ;
Arshad, Junaid ;
Khan, Muhammad Mubashir ;
Parkinson, Simon .
JOURNAL OF BIOMEDICAL INFORMATICS, 2021, 119
[10]   The impact of quantum computing on cryptography [J].
Aumasson, Jean-Philippe .
Computer Fraud and Security, 2017, 2017 (06) :8-11