the genomics revolution: the good, the bad, the ugly
TRANSCRIPT
![Page 1: The Genomics Revolution: The Good, The Bad, The Ugly](https://reader035.vdocument.in/reader035/viewer/2022062823/587021cd1a28ab7f428b81ab/html5/thumbnails/1.jpg)
The Genomics Revolution:The Good, The Bad, and The Ugly
(The Privacy Edition)
Emiliano De CristofaroUniversity College London
https://emilianodc.com @emilianodc_
![Page 2: The Genomics Revolution: The Good, The Bad, The Ugly](https://reader035.vdocument.in/reader035/viewer/2022062823/587021cd1a28ab7f428b81ab/html5/thumbnails/2.jpg)
From: James Bannon, ARK
![Page 3: The Genomics Revolution: The Good, The Bad, The Ugly](https://reader035.vdocument.in/reader035/viewer/2022062823/587021cd1a28ab7f428b81ab/html5/thumbnails/3.jpg)
From: The Economist
3
![Page 4: The Genomics Revolution: The Good, The Bad, The Ugly](https://reader035.vdocument.in/reader035/viewer/2022062823/587021cd1a28ab7f428b81ab/html5/thumbnails/4.jpg)
How to read the genome?
Genotyping
Testing for genetic differences usinga set of markers
Sequencing
Determining the full nucleotide order of an organism’s genome
![Page 5: The Genomics Revolution: The Good, The Bad, The Ugly](https://reader035.vdocument.in/reader035/viewer/2022062823/587021cd1a28ab7f428b81ab/html5/thumbnails/5.jpg)
![Page 6: The Genomics Revolution: The Good, The Bad, The Ugly](https://reader035.vdocument.in/reader035/viewer/2022062823/587021cd1a28ab7f428b81ab/html5/thumbnails/6.jpg)
![Page 7: The Genomics Revolution: The Good, The Bad, The Ugly](https://reader035.vdocument.in/reader035/viewer/2022062823/587021cd1a28ab7f428b81ab/html5/thumbnails/7.jpg)
![Page 8: The Genomics Revolution: The Good, The Bad, The Ugly](https://reader035.vdocument.in/reader035/viewer/2022062823/587021cd1a28ab7f428b81ab/html5/thumbnails/8.jpg)
![Page 9: The Genomics Revolution: The Good, The Bad, The Ugly](https://reader035.vdocument.in/reader035/viewer/2022062823/587021cd1a28ab7f428b81ab/html5/thumbnails/9.jpg)
![Page 10: The Genomics Revolution: The Good, The Bad, The Ugly](https://reader035.vdocument.in/reader035/viewer/2022062823/587021cd1a28ab7f428b81ab/html5/thumbnails/10.jpg)
But… not all dataare created equal!
![Page 11: The Genomics Revolution: The Good, The Bad, The Ugly](https://reader035.vdocument.in/reader035/viewer/2022062823/587021cd1a28ab7f428b81ab/html5/thumbnails/11.jpg)
Privacy Researcher’s PerspectiveTreasure trove of sensitive information
Ethnic heritage, predisposition to diseases
Genome = the ultimate identifierHard to anonymize / de-identify
Sensitivity is perpetualCannot be “revoked”Leaking one’s genome ≈ leaking relatives’ genome
![Page 12: The Genomics Revolution: The Good, The Bad, The Ugly](https://reader035.vdocument.in/reader035/viewer/2022062823/587021cd1a28ab7f428b81ab/html5/thumbnails/12.jpg)
The Greater Goodvs
Privacy?
![Page 13: The Genomics Revolution: The Good, The Bad, The Ugly](https://reader035.vdocument.in/reader035/viewer/2022062823/587021cd1a28ab7f428b81ab/html5/thumbnails/13.jpg)
A New Research Community
Studying privacy issues
Privacy-preserving genetic testing
http://genomeprivacy.org
![Page 14: The Genomics Revolution: The Good, The Bad, The Ugly](https://reader035.vdocument.in/reader035/viewer/2022062823/587021cd1a28ab7f428b81ab/html5/thumbnails/14.jpg)
De-Anonymization
Melissa Gymrek et al. “Identifying Personal Genomes by Surname Inference.” Science Vol. 339, No. 6117, 2013
![Page 15: The Genomics Revolution: The Good, The Bad, The Ugly](https://reader035.vdocument.in/reader035/viewer/2022062823/587021cd1a28ab7f428b81ab/html5/thumbnails/15.jpg)
Aggregation
Re-identification of aggregated dataStatistics from allele frequencies can be used to identify genetic trial participants [1]Presence of an individual in a group can be determined by using allele frequencies and his DNA profile [2]
[1] R. Wang et al. “Learning Your Identity and Disease from Research Papers: Information Leaks in Genome Wide Association Study.” CCS, 2009[2] N. Homer et al. Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays. PLoS Genetics,2008
![Page 16: The Genomics Revolution: The Good, The Bad, The Ugly](https://reader035.vdocument.in/reader035/viewer/2022062823/587021cd1a28ab7f428b81ab/html5/thumbnails/16.jpg)
Kin PrivacyQuantifying how much privacy do relatives lose when one’s genome is leaked?
M. Humbert et al., “Addressing the Concerns of the Lacks Family: Quantification of Kin Genomic Privacy.” Proceedings of ACM CCS, 2013
Also read: Ayday, De Cristofaro, Hubaux, and Tsudik.
“Whole Genome Sequencing: Revolutionary Medicineor Privacy Nightmare?”
![Page 17: The Genomics Revolution: The Good, The Bad, The Ugly](https://reader035.vdocument.in/reader035/viewer/2022062823/587021cd1a28ab7f428b81ab/html5/thumbnails/17.jpg)
![Page 18: The Genomics Revolution: The Good, The Bad, The Ugly](https://reader035.vdocument.in/reader035/viewer/2022062823/587021cd1a28ab7f428b81ab/html5/thumbnails/18.jpg)
The rise of a new research community
Studying privacy issues
Privacy-preserving genetic testing
![Page 19: The Genomics Revolution: The Good, The Bad, The Ugly](https://reader035.vdocument.in/reader035/viewer/2022062823/587021cd1a28ab7f428b81ab/html5/thumbnails/19.jpg)
Differential Privacy
Computing number/location of SNPs associated to diseaseSignificance/correlation between a SNP and a diseaseA. Johnson and V. Shmatikov. “Privacy-Preserving Data Exploration inGenome-Wide Association Studies.” Proceedings of KDD, 2013
![Page 20: The Genomics Revolution: The Good, The Bad, The Ugly](https://reader035.vdocument.in/reader035/viewer/2022062823/587021cd1a28ab7f428b81ab/html5/thumbnails/20.jpg)
Computing on Encrypted Genomes
Encrypt data & outsource to the cloudPerform private computation over encrypted dataUsing partial & fully homomorphic encryption
Examples:Pearson Goodness-of-Fit test, linkage disequilibriumEstimation Maximization, Cochran-Armitage TT, etc.
K. Lauter, A. Lopez-Alt, M. Naehrig. Private Computation on Encrypted Genomic Data
![Page 21: The Genomics Revolution: The Good, The Bad, The Ugly](https://reader035.vdocument.in/reader035/viewer/2022062823/587021cd1a28ab7f428b81ab/html5/thumbnails/21.jpg)
Computing on Encrypted Genomes
L. Kamm, D. Bogdanov, S. Laur, J. Vilo. A new way to protect privacy in large- scale genome-wide association studies.Bioinformatics 29(7), 2013.
![Page 22: The Genomics Revolution: The Good, The Bad, The Ugly](https://reader035.vdocument.in/reader035/viewer/2022062823/587021cd1a28ab7f428b81ab/html5/thumbnails/22.jpg)
Private Personal Genomic Tests
Individuals retain control of their sequenced genome
Allow doctors/labs to run genetics tests, but:1. Genome never disclosed, only test output is2. Keep test specifics confidential
… two main approaches …
![Page 23: The Genomics Revolution: The Good, The Bad, The Ugly](https://reader035.vdocument.in/reader035/viewer/2022062823/587021cd1a28ab7f428b81ab/html5/thumbnails/23.jpg)
(i) D
NA
sam
ple
(ii) Encrypted SNPs
(i) Encrypted clinical
and environmental data
(iii)
Dis
ease
R
isk
Com
puta
tion
SEQUENCING INSTITUTION
TESTING FACILITY
STORAGE AND PROCESSING UNIT
PATIENT
1. Using Semi-Trusted Parties
![Page 24: The Genomics Revolution: The Good, The Bad, The Ugly](https://reader035.vdocument.in/reader035/viewer/2022062823/587021cd1a28ab7f428b81ab/html5/thumbnails/24.jpg)
1. Using Semi-Trusted PartiesAyday et al. (WPES’13)
Data is encrypted and stored at a “Storage Process Unit”Disease susceptibility testing
Ayday et al. (DPM’13)
Encrypting raw genomic data (short reads)Allowing medical unit to privately retrieve them
Danezis and De Cristofaro (WPES’14)Regression for disease susceptibility
![Page 25: The Genomics Revolution: The Good, The Bad, The Ugly](https://reader035.vdocument.in/reader035/viewer/2022062823/587021cd1a28ab7f428b81ab/html5/thumbnails/25.jpg)
doctoror lab
genome
individual
test specifics
Secure Function Evaluation
test result test result
• Private Set Intersection (PSI)• Authorized PSI• Private Pattern Matching• Homomorphic Encryption• Garbled Circuits• […]
Output reveals nothing beyond test result
• Testing SNPs• Personalized Medicine • Compatibility Testing• Paternity/Ancestry Testing• […]
2. Users keep sequenced genomes
![Page 26: The Genomics Revolution: The Good, The Bad, The Ugly](https://reader035.vdocument.in/reader035/viewer/2022062823/587021cd1a28ab7f428b81ab/html5/thumbnails/26.jpg)
2. Users keep sequenced genomesBaldi et al. (CCS’11)
Privacy-preserving version of a few genetic tests, based on private set operationsPaternity test, Personalized Medicine, Compatibility Tests(First work to consider fully sequenced genomes)
De Cristofaro et al. (WPES’12), extends the aboveFramework and prototype deployment on AndroidAdds Ancestry/Genealogy Testing
![Page 27: The Genomics Revolution: The Good, The Bad, The Ugly](https://reader035.vdocument.in/reader035/viewer/2022062823/587021cd1a28ab7f428b81ab/html5/thumbnails/27.jpg)
Open ProblemsEncryption can’t guarantee security past 30-50 yrs
Efficiency, Reliability, Availability
Sequencing errors
How much understanding required from users we are trying to protect?
![Page 28: The Genomics Revolution: The Good, The Bad, The Ugly](https://reader035.vdocument.in/reader035/viewer/2022062823/587021cd1a28ab7f428b81ab/html5/thumbnails/28.jpg)
Thank you!Special thanks to
E. Ayday, P. Baldi, R. Baronio, G. Danezis, S. Faber,P. Gasti, J-P. Hubaux, B. Malin, G. Tsudik
![Page 29: The Genomics Revolution: The Good, The Bad, The Ugly](https://reader035.vdocument.in/reader035/viewer/2022062823/587021cd1a28ab7f428b81ab/html5/thumbnails/29.jpg)
We all leave biological cells behind…
Hair, saliva, etc., can be collected and sequenced?
Compare this “attack” to re-identifying millions of DNA donors or hacking into a DTC’s DB…
The former: expensive, prone to mistakes, only works against a handful of targeted victims
The latter: cheaper, more scalable
Why do we even careabout genome privacy?