{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T20:34:00Z","timestamp":1772138040449,"version":"3.50.1"},"reference-count":16,"publisher":"Oxford University Press (OUP)","issue":"Supplement_2","license":[{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"funder":[{"name":"National Library of Medicine of the National Institutes of Health","award":["R01LM013429"],"award-info":[{"award-number":["R01LM013429"]}]},{"DOI":"10.13039\/100000002","name":"National Institutes of Health","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,30]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:sec>\n                    <jats:title>Motivation<\/jats:title>\n                    <jats:p>Big data era in genomics promises a breakthrough in medicine, but sharing data in a private manner limit the pace of field. Widely accepted \u2018genomic data sharing beacon\u2019 protocol provides a standardized and secure interface for querying the genomic datasets. The data are only shared if the desired information (e.g. a certain variant) exists in the dataset. Various studies showed that beacons are vulnerable to re-identification (or membership inference) attacks. As beacons are generally associated with sensitive phenotype information, re-identification creates a significant risk for the participants. Unfortunately, proposed countermeasures against such attacks have failed to be effective, as they do not consider the utility of beacon protocol.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Results<\/jats:title>\n                    <jats:p>In this study, for the first time, we analyze the mitigation effect of the kinship relationships among beacon participants against re-identification attacks. We argue that having multiple family members in a beacon can garble the information for attacks since a substantial number of variants are shared among kin-related people. Using family genomes from HapMap and synthetically generated datasets, we show that having one of the parents of a victim in the beacon causes (i) significant decrease in the power of attacks and (ii) substantial increase in the number of queries needed to confirm an individual\u2019s beacon membership. We also show how the protection effect attenuates when more distant relatives, such as grandparents are included alongside the victim. Furthermore, we quantify the utility loss due adding relatives and show that it is smaller compared with flipping based techniques.<\/jats:p>\n                  <\/jats:sec>","DOI":"10.1093\/bioinformatics\/btaa821","type":"journal-article","created":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T07:11:23Z","timestamp":1599549083000},"page":"i903-i910","source":"Crossref","is-referenced-by-count":8,"title":["The effect of kinship in re-identification attacks against genomic data sharing beacons"],"prefix":"10.1093","volume":"36","author":[{"given":"Kerem","family":"Ayoz","sequence":"first","affiliation":[{"name":"Bilkent University Computer Engineering Department, , Ankara 06800, Turkey"}]},{"given":"Miray","family":"Aysen","sequence":"additional","affiliation":[{"name":"Bilkent University Computer Engineering Department, , Ankara 06800, Turkey"}]},{"given":"Erman","family":"Ayday","sequence":"additional","affiliation":[{"name":"Bilkent University Computer Engineering Department, , Ankara 06800, Turkey"},{"name":"Case Western Reserve University Computer and Data Sciences Department, , Cleveland, OH 44106, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8613-6619","authenticated-orcid":false,"given":"A Ercument","family":"Cicek","sequence":"additional","affiliation":[{"name":"Bilkent University Computer Engineering Department, , Ankara 06800, Turkey"},{"name":"Carnegie Mellon University Computational Biology Department, , Pittsburgh, PA 15213, USA"}]}],"member":"286","published-online":{"date-parts":[[2020,12,29]]},"reference":[{"key":"2023062409321238500_btaa821-B1","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1186\/s12920-017-0278-x","article-title":"Aftermath of Bustamante attack on genomic beacon service","volume":"10","author":"Al Aziz","year":"2017","journal-title":"BMC Med. Genomics"},{"key":"2023062409321238500_btaa821-B2","article-title":"Genome reconstruction attacks against genomic data-sharing beacons","author":"Ayoz","year":"2020"},{"key":"2023062409321238500_btaa821-B3","first-page":"476","article-title":"Discrimination as a consequence of genetic testing","volume":"50","author":"Billings","year":"1992","journal-title":"Am. J. Hum. Genet"},{"key":"2023062409321238500_btaa821-B4","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1186\/s13059-017-1212-4","article-title":"The impact of rare and low-frequency genetic variants in common disease","volume":"18","author":"Bomba","year":"2017","journal-title":"Genome Biol"},{"key":"2023062409321238500_btaa821-B5","first-page":"45","article-title":"Real-time protection of genomic data sharing in beacon services","author":"Bu","year":"2018"},{"key":"2023062409321238500_btaa821-B6","doi-asserted-by":"crossref","first-page":"1333","DOI":"10.1109\/TCBB.2017.2709740","article-title":"An inference attack on genomic data using kinship, complex correlations, and phenotype information","volume":"15","author":"Deznabi","year":"2018","journal-title":"IEEE\/ACM Trans. Comput. Biol. Bioinform"},{"key":"2023062409321238500_btaa821-B7","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1038\/s41587-019-0046-x","article-title":"Federated discovery and sharing of genomic data using beacons","volume":"37","author":"Fiume","year":"2019","journal-title":"Nat. Biotechnol"},{"key":"2023062409321238500_btaa821-B8","first-page":"1141","article-title":"Addressing the concerns of the lacks family: quantification of kin genomic privacy","author":"Humbert","year":"2013"},{"key":"2023062409321238500_btaa821-B9","doi-asserted-by":"crossref","first-page":"789","DOI":"10.1038\/nature02168","article-title":"The international HapMap project","volume":"426","year":"2003","journal-title":"Nature"},{"key":"2023062409321238500_btaa821-B10","doi-asserted-by":"crossref","first-page":"1299","DOI":"10.1038\/nature04226","article-title":"A haplotype map of the human genome","volume":"437","year":"2005","journal-title":"Nature"},{"key":"2023062409321238500_btaa821-B11","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1186\/s13059-018-1506-1","article-title":"Consumer genomics will change your life, whether you get tested or not","volume":"19","author":"Khan","year":"2018","journal-title":"Genome Biol"},{"key":"2023062409321238500_btaa821-B12","first-page":"1497","article-title":"Genetic discrimination, genetic privacy: rethinking employee protections for a brave new workplace","volume":"96","author":"Kim","year":"2001","journal-title":"Northwest Univ. Law Rev"},{"key":"2023062409321238500_btaa821-B13","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1126\/science.274.5287.621","article-title":"Genetic discrimination: perspectives of consumers","volume":"274","author":"Lapham","year":"1996","journal-title":"Science"},{"key":"2023062409321238500_btaa821-B14","doi-asserted-by":"crossref","first-page":"799","DOI":"10.1093\/jamia\/ocw167","article-title":"Addressing beacon re-identification attacks: quantification and mitigation of privacy risks","volume":"24","author":"Raisaro","year":"2017","journal-title":"J. Am. Med. Inform. Assoc"},{"key":"2023062409321238500_btaa821-B15","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1016\/j.ajhg.2015.09.010","article-title":"Privacy risks from genomic data-sharing beacons","volume":"97","author":"Shringarpure","year":"2015","journal-title":"Am. J. Hum. Genet"},{"key":"2023062409321238500_btaa821-B16","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1093\/bioinformatics\/bty643","article-title":"Re-identification of individuals in genomic data-sharing beacons via allele inference","volume":"35","author":"von Thenen","year":"2019","journal-title":"Bioinformatics"}],"container-title":["Bioinformatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/bioinformatics\/article-pdf\/36\/Supplement_2\/i903\/50693636\/btaa821.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/bioinformatics\/article-pdf\/36\/Supplement_2\/i903\/50693636\/btaa821.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,24]],"date-time":"2023-06-24T19:51:57Z","timestamp":1687636317000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/bioinformatics\/article\/36\/Supplement_2\/i903\/6055924"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12]]},"references-count":16,"journal-issue":{"issue":"Supplement_2","published-print":{"date-parts":[[2020,12,30]]}},"URL":"https:\/\/doi.org\/10.1093\/bioinformatics\/btaa821","relation":{"has-preprint":[{"id-type":"doi","id":"10.1101\/2020.01.30.926907","asserted-by":"object"}]},"ISSN":["1367-4803","1367-4811"],"issn-type":[{"value":"1367-4803","type":"print"},{"value":"1367-4811","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2020,12]]},"published":{"date-parts":[[2020,12]]}}}