{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T22:00:34Z","timestamp":1709244034111},"reference-count":33,"publisher":"Oxford University Press (OUP)","issue":"15","license":[{"start":{"date-parts":[[2017,4,4]],"date-time":"2017-04-04T00:00:00Z","timestamp":1491264000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/about_us\/legal\/notices"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,8,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:sec>\n                  <jats:title>Motivation<\/jats:title>\n                  <jats:p>Due to the limited power of small-scale genome-wide association studies (GWAS), researchers tend to collaborate and establish a larger consortium in order to perform large-scale GWAS. Genome-wide association meta-analysis (GWAMA) is a statistical tool that aims to synthesize results from multiple independent studies to increase the statistical power and reduce false-positive findings of GWAS. However, it has been demonstrated that the aggregate data of individual studies are subject to inference attacks, hence privacy concerns arise when researchers share study data in GWAMA.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Results<\/jats:title>\n                  <jats:p>In this article, we propose a secure quality control (SQC) protocol, which enables checking the quality of data in a privacy-preserving way without revealing sensitive information to a potential adversary. SQC employs state-of-the-art cryptographic and statistical techniques for privacy protection. We implement the solution in a meta-analysis pipeline with real data to demonstrate the efficiency and scalability on commodity machines. The distributed execution of SQC on a cluster of 128 cores for one million genetic variants takes less than one hour, which is a modest cost considering the 10-month time span usually observed for the completion of the QC procedure that includes timing of logistics.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Availability and Implementation<\/jats:title>\n                  <jats:p>SQC is implemented in Java and is publicly available at https:\/\/github.com\/acs6610987\/secureqc<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Supplementary information<\/jats:title>\n                  <jats:p>Supplementary data are available at Bioinformatics online.<\/jats:p>\n               <\/jats:sec>","DOI":"10.1093\/bioinformatics\/btx193","type":"journal-article","created":{"date-parts":[[2017,3,31]],"date-time":"2017-03-31T20:29:55Z","timestamp":1490992195000},"page":"2273-2280","source":"Crossref","is-referenced-by-count":8,"title":["SQC: secure quality control for meta-analysis of genome-wide association studies"],"prefix":"10.1093","volume":"33","author":[{"given":"Zhicong","family":"Huang","sequence":"first","affiliation":[{"name":"School of Computer and Communication Sciences, \u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne, Lausanne, Switzerland"}]},{"given":"Huang","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Computer and Communication Sciences, \u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne, Lausanne, Switzerland"}]},{"given":"Jacques","family":"Fellay","sequence":"additional","affiliation":[{"name":"School of Life Sciences, \u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne, Lausanne, Switzerland"},{"name":"Swiss Institute of Bioinformatics, Lausanne, Switzerland"}]},{"given":"Zolt\u00e1n","family":"Kutalik","sequence":"additional","affiliation":[{"name":"Swiss Institute of Bioinformatics, Lausanne, Switzerland"},{"name":"Institute of Social and Preventive Medicine, University Hospital Lausanne (CHUV), Lausanne, Switzerland"}]},{"given":"Jean-Pierre","family":"Hubaux","sequence":"additional","affiliation":[{"name":"School of Computer and Communication Sciences, \u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne, Lausanne, Switzerland"}]}],"member":"286","published-online":{"date-parts":[[2017,4,4]]},"reference":[{"key":"2023063012505515300_btx193-B1","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1145\/1468075.1468121","volume-title":"Proceedings of the April 30\u2013May 2, 1968, Spring Joint Computer Conference, AFIPS \u201968 (Spring)","author":"Batcher","year":"1968"},{"key":"2023063012505515300_btx193-B2","doi-asserted-by":"crossref","DOI":"10.1093\/bioinformatics\/btw758","article-title":"PRINCESS: Privacy-protecting Rare disease International Network Collaboration via Encryption through Software guard extensionS","author":"Chen","year":"2017","journal-title":"Bioinformatics"},{"key":"2023063012505515300_btx193-B3","volume-title":"19th Annual Network and Distributed System Security Symposium (NDSS)","author":"Chen","year":"2012"},{"key":"2023063012505515300_btx193-B4","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"Dwork","year":"2014","journal-title":"Found Trends Theor. Comput. Sci"},{"key":"2023063012505515300_btx193-B5","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1038\/nrg3723","article-title":"Routes for breaching and protecting genetic privacy","volume":"15","author":"Erlich","year":"2014","journal-title":"Nat. Rev. Genet"},{"key":"2023063012505515300_btx193-B6","author":"Fan","year":"2012"},{"key":"2023063012505515300_btx193-B7","doi-asserted-by":"crossref","first-page":"628","DOI":"10.1109\/ICDMW.2011.140","volume-title":"2011 IEEE 11th International Conference on Data Mining Workshops (ICDMW)","author":"Fienberg","year":"2011"},{"key":"2023063012505515300_btx193-B8","volume-title":"Proceedings of the 23rd USENIX Security Symposium","author":"Fredrikson","year":"2014"},{"key":"2023063012505515300_btx193-B9","doi-asserted-by":"crossref","first-page":"e1000167.","DOI":"10.1371\/journal.pgen.1000167","article-title":"Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays","volume":"4","author":"Homer","year":"2008","journal-title":"PLoS Genet"},{"key":"2023063012505515300_btx193-B10","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1016\/j.ajhg.2012.02.008","article-title":"On sharing quantitative trait GWAS results in an era of multiple-omics data and the limits of genomic privacy","volume":"90","author":"Im","year":"2012","journal-title":"Am. J. Hum. Genet"},{"key":"2023063012505515300_btx193-B11","doi-asserted-by":"crossref","first-page":"1253","DOI":"10.1038\/ng.455","article-title":"A new statistic and its power to infer membership in a genome-wide association study using genotype frequencies","volume":"41","author":"Jacobs","year":"2009","journal-title":"Nat. Genet"},{"key":"2023063012505515300_btx193-B12","doi-asserted-by":"crossref","first-page":"1079","DOI":"10.1145\/2487575.2487687","volume-title":"Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD \u201913","author":"Johnson","year":"2013"},{"key":"2023063012505515300_btx193-B13","doi-asserted-by":"crossref","first-page":"S3.","DOI":"10.1186\/1472-6947-15-S5-S3","article-title":"Private genome analysis through homomorphic encryption","volume":"15","author":"Kim","year":"2015","journal-title":"BMC Med. Inform. Decis. Mak"},{"key":"2023063012505515300_btx193-B14","volume-title":"Sorting and Searching","author":"Knuth","year":"1998","edition":"2nd edn."},{"key":"2023063012505515300_btx193-B15","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1109\/SP.2015.29","volume-title":"2015 IEEE Symposium on Security and Privacy (SP)","author":"Liu","year":"2015"},{"key":"2023063012505515300_btx193-B16","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1109\/SP.2015.43","volume-title":"2015 IEEE Symposium on Security and Privacy","author":"Liu","year":"2015"},{"key":"2023063012505515300_btx193-B17","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1001\/jama.2010.120","article-title":"Potential for revealing individual-level information in genome-wide association studies","volume":"303","author":"Lumley","year":"2010","journal-title":"JAMA"},{"key":"2023063012505515300_btx193-B18","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1109\/SP.2015.30","volume-title":"2015 IEEE Symposium on Security and Privacy (SP)","author":"Nayak","year":"2015"},{"key":"2023063012505515300_btx193-B19","doi-asserted-by":"crossref","first-page":"965","DOI":"10.1038\/ng.436","article-title":"Genomic privacy and limits of individual detection in a pool","volume":"41","author":"Sankararaman","year":"2009","journal-title":"Nat. Genet"},{"key":"2023063012505515300_btx193-B20","doi-asserted-by":"crossref","first-page":"1652","DOI":"10.1093\/bioinformatics\/btw050","article-title":"Efficient privacy-preserving string search and an application in genomics","volume":"32","author":"Shimizu","year":"2016","journal-title":"Bioinformatics"},{"key":"2023063012505515300_btx193-B21","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/SPW.2015.25","volume-title":"2015 IEEE Security and Privacy Workshops (SPW)","author":"Simmons","year":"2015"},{"key":"2023063012505515300_btx193-B22","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1016\/j.cels.2016.04.013","article-title":"Enabling privacy-preserving GWASs in heterogeneous human populations","volume":"3","author":"Simmons","year":"2016","journal-title":"Cell Syst"},{"key":"2023063012505515300_btx193-B23","first-page":"356","article-title":"MetaSeq: privacy preserving meta-analysis of sequencing-based association studies","author":"Singh","year":"2013","journal-title":"Pac. Symp. Biocomput"},{"key":"2023063012505515300_btx193-B24","first-page":"1286","volume-title":"Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security, CCS \u201915","author":"Tram\u00e8r","year":"2015"},{"key":"2023063012505515300_btx193-B25","doi-asserted-by":"crossref","first-page":"e1000628.","DOI":"10.1371\/journal.pgen.1000628","article-title":"The limits of individual identification from sample allele frequencies: theory and statistical analysis","volume":"5","author":"Visscher","year":"2009","journal-title":"PLOS Genet"},{"key":"2023063012505515300_btx193-B26","first-page":"534","volume-title":"Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS \u201909","author":"Wang","year":"2009"},{"key":"2023063012505515300_btx193-B27","first-page":"211","article-title":"HEALER: homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS","volume":"32","author":"Wang","year":"2016","journal-title":"Bioinf. Oxf. Engl"},{"key":"2023063012505515300_btx193-B28","doi-asserted-by":"crossref","first-page":"1192","DOI":"10.1038\/nprot.2014.071","article-title":"Quality control and conduct of genome-wide association meta-analyses","volume":"9","author":"Winkler","year":"2014","journal-title":"Nat. Protoc"},{"key":"2023063012505515300_btx193-B29","doi-asserted-by":"crossref","first-page":"1173","DOI":"10.1038\/ng.3097","article-title":"Defining the role of common variation in the genomic and biological architecture of adult human height","volume":"46","author":"Wood","year":"2014","journal-title":"Nat Genet"},{"key":"2023063012505515300_btx193-B30","doi-asserted-by":"crossref","first-page":"3334","DOI":"10.1093\/bioinformatics\/btu561","article-title":"SecureMA: protecting participant privacy in genetic association meta-analysis","volume":"30","author":"Xie","year":"2014","journal-title":"Bioinformatics"},{"key":"2023063012505515300_btx193-B31","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.jbi.2014.01.008","article-title":"Scalable privacy-preserving data sharing methodology for genome-wide association studies","volume":"50","author":"Yu","year":"2014","journal-title":"J. Biomed. Inform"},{"key":"2023063012505515300_btx193-B32","doi-asserted-by":"crossref","first-page":"44\u201344.","DOI":"10.1126\/science.1165490","article-title":"Protecting aggregate genomic data","volume":"322","author":"Zerhouni","year":"2008","journal-title":"Science"},{"key":"2023063012505515300_btx193-B33","first-page":"990","volume-title":"Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201914","author":"Zhang","year":"2014"}],"container-title":["Bioinformatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/bioinformatics\/article-pdf\/33\/15\/2273\/50756627\/bioinformatics_33_15_2273.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/bioinformatics\/article-pdf\/33\/15\/2273\/50756627\/bioinformatics_33_15_2273.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,30]],"date-time":"2023-06-30T12:51:27Z","timestamp":1688129487000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/bioinformatics\/article\/33\/15\/2273\/3100439"}},"subtitle":[],"editor":[{"given":"Alfonso","family":"Valencia","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2017,4,4]]},"references-count":33,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2017,8,1]]}},"URL":"https:\/\/doi.org\/10.1093\/bioinformatics\/btx193","relation":{},"ISSN":["1367-4803","1367-4811"],"issn-type":[{"value":"1367-4803","type":"print"},{"value":"1367-4811","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2017,8,1]]},"published":{"date-parts":[[2017,4,4]]}}}