{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T07:13:48Z","timestamp":1769757228728,"version":"3.49.0"},"reference-count":29,"publisher":"Oxford University Press (OUP)","issue":"Supplement_1","license":[{"start":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T00:00:00Z","timestamp":1594598400000},"content-version":"vor","delay-in-days":12,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:sec>\n                  <jats:title>Motivation<\/jats:title>\n                  <jats:p>The rapid decrease in the sequencing technology costs leads to a revolution in medical research and clinical care. Today, researchers have access to large genomic datasets to study associations between variants and complex traits. However, availability of such genomic datasets also results in new privacy concerns about personal information of the participants in genomic studies. Differential privacy (DP) is one of the rigorous privacy concepts, which received widespread interest for sharing summary statistics from genomic datasets while protecting the privacy of participants against inference attacks. However, DP has a known drawback as it does not consider the correlation between dataset tuples. Therefore, privacy guarantees of DP-based mechanisms may degrade if the dataset includes dependent tuples, which is a common situation for genomic datasets due to the inherent correlations between genomes of family members.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Results<\/jats:title>\n                  <jats:p>In this article, using two real-life genomic datasets, we show that exploiting the correlation between the dataset participants results in significant information leak from differentially private results of complex queries. We formulate this as an attribute inference attack and show the privacy loss in minor allele frequency (MAF) and chi-square queries. Our results show that using the results of differentially private MAF queries and utilizing the dependency between tuples, an adversary can reveal up to 50% more sensitive information about the genome of a target (compared to original privacy guarantees of standard DP-based mechanisms), while differentially privacy chi-square queries can reveal up to 40% more sensitive information. Furthermore, we show that the adversary can use the inferred genomic data obtained from the attribute inference attack to infer the membership of a target in another genomic dataset (e.g. associated with a sensitive trait). Using a log-likelihood-ratio test, our results also show that the inference power of the adversary can be significantly high in such an attack even using inferred (and hence partially incorrect) genomes.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Availability and implementation<\/jats:title>\n                  <jats:p>https:\/\/github.com\/nourmadhoun\/Inference-Attacks-Differential-Privacy<\/jats:p>\n               <\/jats:sec>","DOI":"10.1093\/bioinformatics\/btaa475","type":"journal-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T12:13:01Z","timestamp":1588594381000},"page":"i136-i145","source":"Crossref","is-referenced-by-count":19,"title":["Inference attacks against differentially private query results from genomic datasets including dependent tuples"],"prefix":"10.1093","volume":"36","author":[{"given":"Nour","family":"Almadhoun","sequence":"first","affiliation":[{"name":"Bilkent University Computer Engineering Department, , Bilkent, Ankara 06800, Turkey"}]},{"given":"Erman","family":"Ayday","sequence":"additional","affiliation":[{"name":"Bilkent University Computer Engineering Department, , Bilkent, Ankara 06800, Turkey"},{"name":"Case Western Reserve University Department of Computer and Data Sciences, , Cleveland, OH 44106, USA"}]},{"given":"\u00d6zg\u00fcr","family":"Ulusoy","sequence":"additional","affiliation":[{"name":"Bilkent University Computer Engineering Department, , Bilkent, Ankara 06800, Turkey"}]}],"member":"286","published-online":{"date-parts":[[2020,7,13]]},"reference":[{"key":"2024021913323618700_btaa475-B1","doi-asserted-by":"crossref","first-page":"1696","DOI":"10.1093\/bioinformatics\/btz837","article-title":"Differential privacy under dependent tuples\u2014the case of genomic privacy","volume":"36","author":"Almadhoun","year":"2020","journal-title":"Bioinformatics"},{"key":"2024021913323618700_btaa475-B2","first-page":"319","author":"Backes","year":"2016"},{"key":"2024021913323618700_btaa475-B3","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/j.ajhg.2018.07.015","article-title":"A one-penny imputed genome from next-generation reference panels","volume":"103","author":"Browning","year":"2018","journal-title":"Am. J. Hum. Genet"},{"key":"2024021913323618700_btaa475-B4","doi-asserted-by":"crossref","first-page":"13.","DOI":"10.1186\/1751-0473-8-13","article-title":"Crowdsourcing the corpasome","volume":"8","author":"Corpas","year":"2013","journal-title":"Source Code Biol. Med"},{"key":"2024021913323618700_btaa475-B5","article-title":"Partitions of an integer","volume":"12009","author":"D\u2019Errico","year":"2018","journal-title":"MATLAB Central File Exchange"},{"key":"2024021913323618700_btaa475-B6","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1126\/science.1181498","article-title":"Human genome sequencing using unchained base reads on self-assembling DNA nanoarrays","volume":"327","author":"Drmanac","year":"2010","journal-title":"Science"},{"key":"2024021913323618700_btaa475-B7","first-page":"1","author":"Dwork","year":"2008"},{"key":"2024021913323618700_btaa475-B8","first-page":"265","author":"Dwork","year":"2006"},{"key":"2024021913323618700_btaa475-B9","first-page":"17","author":"Fredrikson","year":"2014"},{"key":"2024021913323618700_btaa475-B10","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1038\/nrg3455","article-title":"Sequencing studies in human genetics: design and interpretation","volume":"14","author":"Goldstein","year":"2013","journal-title":"Nat. Rev. Genet"},{"key":"2024021913323618700_btaa475-B11","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1126\/science.1229566","article-title":"Identifying personal genomes by surname inference","volume":"339","author":"Gymrek","year":"2013","journal-title":"Science"},{"key":"2024021913323618700_btaa475-B12","doi-asserted-by":"crossref","first-page":"e1000167.","DOI":"10.1371\/journal.pgen.1000167","article-title":"Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays","volume":"4","author":"Homer","year":"2008","journal-title":"PLoS Genet"},{"key":"2024021913323618700_btaa475-B13","first-page":"99","article-title":"De-anonymizing genomic databases using phenotypic traits","volume":"2015","author":"Humbert","year":"2015","journal-title":"Proc. Priv. Enhanc. Technol"},{"key":"2024021913323618700_btaa475-B14","doi-asserted-by":"crossref","first-page":"e26345.","DOI":"10.1371\/journal.pone.0026345","article-title":"myKaryoView: a light-weight client for visualization of genomic data","volume":"6","author":"Jimenez","year":"2011","journal-title":"PLoS One"},{"key":"2024021913323618700_btaa475-B15","author":"Johnson","year":"2013"},{"key":"2024021913323618700_btaa475-B16","author":"Kifer","year":"2011"},{"key":"2024021913323618700_btaa475-B17","author":"Liu","year":"2016"},{"key":"2024021913323618700_btaa475-B18","first-page":"94","author":"McSherry","year":"2007"},{"key":"2024021913323618700_btaa475-B19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2767007","article-title":"Privacy in the genomic era","volume":"48","author":"Naveed","year":"2015","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"2024021913323618700_btaa475-B20","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1098\/rsta.1933.0009","article-title":"IX. On the problem of the most efficient tests of statistical hypotheses","volume":"231","author":"Neyman","year":"1933","journal-title":"Philos. Trans. R. Soc. Lond. Ser. A"},{"key":"2024021913323618700_btaa475-B21","author":"Nissim","year":"2007"},{"key":"2024021913323618700_btaa475-B22","doi-asserted-by":"crossref","first-page":"965","DOI":"10.1038\/ng.436","article-title":"Genomic privacy and limits of individual detection in a pool","volume":"41","author":"Sankararaman","year":"2009","journal-title":"Nat. Genet"},{"key":"2024021913323618700_btaa475-B23","author":"Song","year":"2017"},{"key":"2024021913323618700_btaa475-B24","doi-asserted-by":"crossref","first-page":"19.","DOI":"10.1186\/s12910-016-0101-9","article-title":"23andMe: a new two-sided data-banking market model","volume":"17","author":"Stoekl\u00e9","year":"2016","journal-title":"BMC Med. Ethics"},{"key":"2024021913323618700_btaa475-B25","first-page":"137.","article-title":"Privacy-preserving data sharing for genome-wide association studies","volume":"5","author":"Uhler","year":"2013","journal-title":"J. Priv. Confid"},{"key":"2024021913323618700_btaa475-B26","author":"Wang","year":"2009"},{"key":"2024021913323618700_btaa475-B27","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.jbi.2014.01.008","article-title":"Scalable privacy-preserving data sharing methodology for genome-wide association studies","volume":"50","author":"Yu","year":"2014","journal-title":"J. Biomed. Inf"},{"key":"2024021913323618700_btaa475-B28","first-page":"1","volume-title":"2017 IEEE Globecom Workshops (GC Wkshps)","author":"Zhao","year":"2017"},{"key":"2024021913323618700_btaa475-B29","first-page":"607","volume-title":"European Symposium on Research in Computer Security","author":"Zhou","year":"2011"}],"container-title":["Bioinformatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/bioinformatics\/article-pdf\/36\/Supplement_1\/i136\/56702470\/bioinformatics_36_supplement1_i136.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/bioinformatics\/article-pdf\/36\/Supplement_1\/i136\/56702470\/bioinformatics_36_supplement1_i136.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,19]],"date-time":"2024-02-19T13:38:13Z","timestamp":1708349893000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/bioinformatics\/article\/36\/Supplement_1\/i136\/5870519"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,1]]},"references-count":29,"journal-issue":{"issue":"Supplement_1","published-print":{"date-parts":[[2020,7,1]]}},"URL":"https:\/\/doi.org\/10.1093\/bioinformatics\/btaa475","relation":{},"ISSN":["1367-4803","1367-4811"],"issn-type":[{"value":"1367-4803","type":"print"},{"value":"1367-4811","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2020,7]]},"published":{"date-parts":[[2020,7,1]]}}}