{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T11:24:34Z","timestamp":1775561074288,"version":"3.50.1"},"reference-count":28,"publisher":"Oxford University Press (OUP)","issue":"6","license":[{"start":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T00:00:00Z","timestamp":1747612800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000002","name":"National Institutes of Health","doi-asserted-by":"publisher","award":["R01LM013429"],"award-info":[{"award-number":["R01LM013429"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,2]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:sec>\n                    <jats:title>Motivation<\/jats:title>\n                    <jats:p>Genomic data-sharing beacon protocol, developed by the Global Alliance for Genomics and Health, offers a privacy-preserving mechanism for querying genomic datasets while restricting direct data access. Despite their design, beacons remain vulnerable to privacy attacks. This study introduces a novel privacy vulnerability of the protocol: one can reconstruct large portions of the genomes of all beacon participants by only using the summary statistics reported by the protocol.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Results<\/jats:title>\n                    <jats:p>We introduce a novel optimization-based algorithm that leverages beacon responses and SNP correlations for reconstruction. By optimizing for the SNP correlations and allele frequencies, the proposed approach achieves genome reconstruction with a substantially higher F1-score (70%) compared to baseline methods (45%) on beacons generated using individuals from the HapMap and OpenSNP datasets. We show that reconstructed genomes can be used by downstream applications such as in membership inference attacks against other beacons. Our findings reveal that beacons releasing allele frequencies substantially increase the reconstruction risk, underscoring the need for enhanced privacy-preserving mechanisms to protect genomic data.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Availability and implementation<\/jats:title>\n                    <jats:p>Our implementation is available at https:\/\/github.com\/ASAP-Bilkent\/Beacon-Reconstruction-Attack.<\/jats:p>\n                  <\/jats:sec>","DOI":"10.1093\/bioinformatics\/btaf273","type":"journal-article","created":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T11:34:48Z","timestamp":1747654488000},"source":"Crossref","is-referenced-by-count":4,"title":["Beacon Reconstruction Attack: Reconstruction of genomes in genomic data-sharing beacons using summary statistics"],"prefix":"10.1093","volume":"41","author":[{"given":"Kousar","family":"Saleem","sequence":"first","affiliation":[{"name":"Computer Engineering Department, Bilkent University , \u00dcniversiteler Mahallesi , Ankara, 06800, T\u00fcrkiye"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8613-6619","authenticated-orcid":false,"given":"A Ercument","family":"Cicek","sequence":"additional","affiliation":[{"name":"Computer Engineering Department, Bilkent University , \u00dcniversiteler Mahallesi , Ankara, 06800, T\u00fcrkiye"}]},{"given":"Sinem","family":"Sav","sequence":"additional","affiliation":[{"name":"Computer Engineering Department, Bilkent University , \u00dcniversiteler Mahallesi , Ankara, 06800, T\u00fcrkiye"}]}],"member":"286","published-online":{"date-parts":[[2025,5,19]]},"reference":[{"key":"2025070408320813100_btaf273-B1","author":"Ayoz","year":"2021"},{"issue":"Supplement_2","key":"2025070408320813100_btaf273-B2","doi-asserted-by":"crossref","first-page":"i903","DOI":"10.1093\/bioinformatics\/btaa821","article-title":"The effect of kinship in re-identification attacks against genomic data sharing beacons","volume":"36","author":"Ayoz","year":"2020","journal-title":"Bioinformatics"},{"issue":"Supplement_1","key":"2025070408320813100_btaf273-B3","doi-asserted-by":"crossref","first-page":"i161","DOI":"10.1093\/bioinformatics\/btab305","article-title":"Haplotype-based membership inference from summary genomic data","volume":"37","author":"Bu","year":"2021","journal-title":"Bioinformatics"},{"key":"2025070408320813100_btaf273-B4","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1016\/j.cels.2020.03.006","article-title":"Privacy-preserving biomedical database queries with optimal privacy-utility trade-offs","volume":"10","author":"Cho","year":"2020","journal-title":"Cell Syst"},{"key":"2025070408320813100_btaf273-B5","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1093\/biostatistics\/kxq035","article-title":"On inferring presence of an individual in a mixture: a Bayesian approach","volume":"11","author":"Clayton","year":"2010","journal-title":"Biostatistics"},{"key":"2025070408320813100_btaf273-B6","first-page":"1","volume-title":"International Colloquium on Automata, Languages, and Programming","author":"Dwork"},{"key":"2025070408320813100_btaf273-B7","first-page":"1","volume-title":"International Conference on Theory and Applications of Models of Computation","author":"Dwork"},{"key":"2025070408320813100_btaf273-B8","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1038\/nrg3723","article-title":"Routes for breaching and protecting genetic privacy","volume":"15","author":"Erlich","year":"2014","journal-title":"Nat Rev Genet"},{"key":"2025070408320813100_btaf273-B9","first-page":"628","author":"Fienberg"},{"key":"2025070408320813100_btaf273-B10","doi-asserted-by":"crossref","first-page":"789","DOI":"10.1038\/nature02168","article-title":"The international hapmap project","volume":"426","author":"Gibbs","year":"2003","journal-title":"Nature"},{"key":"2025070408320813100_btaf273-B11","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1126\/science.1229566","article-title":"Identifying personal genomes by surname inference","volume":"339","author":"Gymrek","year":"2013","journal-title":"Science"},{"key":"2025070408320813100_btaf273-B12","doi-asserted-by":"crossref","first-page":"e1000167","DOI":"10.1371\/journal.pgen.1000167","article-title":"Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays","volume":"4","author":"Homer","year":"2008","journal-title":"PLoS Genet"},{"key":"2025070408320813100_btaf273-B13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3035538","article-title":"Quantifying interdependent risks in genomic privacy","volume":"20","author":"Humbert","year":"2017","journal-title":"ACM Transactions on Privacy and Security (TOPS)"},{"key":"2025070408320813100_btaf273-B14","doi-asserted-by":"crossref","first-page":"870","DOI":"10.1038\/ng2075","article-title":"A genome-wide association study identifies alleles in fgfr2 associated with risk of sporadic postmenopausal breast cancer","volume":"39","author":"Hunter","year":"2007","journal-title":"Nat Genet"},{"key":"2025070408320813100_btaf273-B15","doi-asserted-by":"crossref","first-page":"1253","DOI":"10.1038\/ng.455","article-title":"A new statistic and its power to infer membership in a genome-wide association study using genotype frequencies","volume":"41","author":"Jacobs","year":"2009","journal-title":"Nat Genet"},{"key":"2025070408320813100_btaf273-B16","first-page":"1079","author":"Johnson","year":"2013"},{"key":"2025070408320813100_btaf273-B17","doi-asserted-by":"publisher","author":"Kingma","year":"2014","DOI":"10.48550\/arXiv.1412.6980,"},{"key":"2025070408320813100_btaf273-B18","doi-asserted-by":"publisher","author":"Poorghaffar","year":"2024","DOI":"10.1101\/2024.10.28.620587,"},{"key":"2025070408320813100_btaf273-B19","doi-asserted-by":"crossref","first-page":"799","DOI":"10.1093\/jamia\/ocw167","article-title":"Addressing beacon re-identification attacks: quantification and mitigation of privacy risks","volume":"24","author":"Raisaro","year":"2017","journal-title":"J Am Med Inf Assoc"},{"key":"2025070408320813100_btaf273-B20","first-page":"32","author":"Samani","year":"2015"},{"key":"2025070408320813100_btaf273-B21","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1016\/j.ajhg.2015.09.010","article-title":"Privacy risks from genomic data-sharing beacons","volume":"97","author":"Shringarpure","year":"2015","journal-title":"Am J Hum Genet"},{"key":"2025070408320813100_btaf273-B22","first-page":"1286","author":"Tram\u00e8r","year":"2015"},{"key":"2025070408320813100_btaf273-B23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3603627","article-title":"Defending against membership inference attacks on beacon services","volume":"26","author":"Venkatesaramani","year":"2023","journal-title":"ACM Trans Privacy Security"},{"key":"2025070408320813100_btaf273-B24","first-page":"1113","article-title":"Enabling tradeoffs in privacy and utility in genomic data beacons and summary statistics","volume":"33","author":"Venkatesaramani","year":"2023","journal-title":"Genome Res"},{"key":"2025070408320813100_btaf273-B25","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1093\/bioinformatics\/bty643","article-title":"Re-identification of individuals in genomic data-sharing beacons via allele inference","volume":"35","author":"Von Thenen","year":"2019","journal-title":"Bioinformatics"},{"key":"2025070408320813100_btaf273-B26","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1186\/s12920-017-0282-1","article-title":"Controlling the signal: practical privacy protection of genomic data sharing through beacon services","volume":"10","author":"Wan","year":"2017","journal-title":"BMC Medical Genomics"},{"key":"2025070408320813100_btaf273-B27","first-page":"534","author":"Wang","year":"2009"},{"key":"2025070408320813100_btaf273-B28","doi-asserted-by":"crossref","first-page":"602","DOI":"10.1038\/nn.4524","article-title":"Whole genome sequencing resource identifies 18 new candidate genes for autism spectrum disorder","volume":"20","author":"Yuen","year":"2017","journal-title":"Nature Neurosci"}],"container-title":["Bioinformatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/bioinformatics\/advance-article-pdf\/doi\/10.1093\/bioinformatics\/btaf273\/63235921\/btaf273.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/bioinformatics\/article-pdf\/41\/6\/btaf273\/63235921\/btaf273.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/bioinformatics\/article-pdf\/41\/6\/btaf273\/63235921\/btaf273.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T08:32:21Z","timestamp":1751617941000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/bioinformatics\/article\/doi\/10.1093\/bioinformatics\/btaf273\/8137839"}},"subtitle":[],"editor":[{"given":"Inanc","family":"Birol","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2025,5,19]]},"references-count":28,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,6,2]]}},"URL":"https:\/\/doi.org\/10.1093\/bioinformatics\/btaf273","relation":{"has-preprint":[{"id-type":"doi","id":"10.1101\/2024.12.10.627379","asserted-by":"object"}]},"ISSN":["1367-4811"],"issn-type":[{"value":"1367-4811","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2025,6]]},"published":{"date-parts":[[2025,5,19]]},"article-number":"btaf273"}}