{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:45:04Z","timestamp":1767339904492},"reference-count":25,"publisher":"Oxford University Press (OUP)","issue":"2","license":[{"start":{"date-parts":[[2017,9,12]],"date-time":"2017-09-12T00:00:00Z","timestamp":1505174400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/about_us\/legal\/notices"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,1,15]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:sec><jats:title>Motivation<\/jats:title><jats:p>Rapid and low cost sequencing of genomes enabled widespread use of genomic data in research studies and personalized customer applications, where genomic data is shared in public databases. Although the identities of the participants are anonymized in these databases, sensitive information about individuals can still be inferred. One such information is kinship.<\/jats:p><\/jats:sec><jats:sec><jats:title>Results<\/jats:title><jats:p>We define two routes kinship privacy can leak and propose a technique to protect kinship privacy against these risks while maximizing the utility of shared data. The method involves systematic identification of minimal portions of genomic data to mask as new participants are added to the database. Choosing the proper positions to hide is cast as an optimization problem in which the number of positions to mask is minimized subject to privacy constraints that ensure the familial relationships are not revealed. We evaluate the proposed technique on real genomic data. Results indicate that concurrent sharing of data pertaining to a parent and an offspring results in high risks of kinship privacy, whereas the sharing data from further relatives together is often safer. We also show arrival order of family members have a high impact on the level of privacy risks and on the utility of sharing data.<\/jats:p><\/jats:sec><jats:sec><jats:title>Availability and implementation<\/jats:title><jats:p>https:\/\/github.com\/tastanlab\/Kinship-Privacy<\/jats:p><\/jats:sec><jats:sec><jats:title>Supplementary information<\/jats:title><jats:p>Supplementary data are available at Bioinformatics online.<\/jats:p><\/jats:sec>","DOI":"10.1093\/bioinformatics\/btx568","type":"journal-article","created":{"date-parts":[[2017,9,11]],"date-time":"2017-09-11T19:15:06Z","timestamp":1505157306000},"page":"181-189","source":"Crossref","is-referenced-by-count":12,"title":["A utility maximizing and privacy preserving approach for protecting kinship in genomic databases"],"prefix":"10.1093","volume":"34","author":[{"given":"Gulce","family":"Kale","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, Bilkent University, Ankara, Turkey"}]},{"given":"Erman","family":"Ayday","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Bilkent University, Ankara, Turkey"}]},{"given":"Oznur","family":"Tastan","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Bilkent University, Ankara, Turkey"}]}],"member":"286","published-online":{"date-parts":[[2017,9,12]]},"reference":[{"key":"2023012712230612800_btx568-B1","author":"Belluz","year":"2014"},{"key":"2023012712230612800_btx568-B2","doi-asserted-by":"crossref","first-page":"871","DOI":"10.1093\/bioinformatics\/btw758","article-title":"Princess: privacy-protecting rare disease international network collaboration via encryption through software guard extensions","volume":"33","author":"Chen","year":"2017","journal-title":"Bioinformatics"},{"key":"2023012712230612800_btx568-B3","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1093\/biostatistics\/kxq035","article-title":"On inferring presence of an individual in a mixture: a Bayesian approach","volume":"11","author":"Clayton","year":"2010","journal-title":"Biostatistics"},{"key":"2023012712230612800_btx568-B4","article-title":"A complete public domain family genomics dataset","author":"Corpas","year":"2013","journal-title":"bioRxiv"},{"key":"2023012712230612800_btx568-B5","first-page":"1","article-title":"An inference attack on genomic data using kinship, complex correlations, and phenotype information","author":"Deznabi","year":"2017","journal-title":"IEEE\/ACM Trans. Comput. Biol. Bioinformatics"},{"key":"2023012712230612800_btx568-B6","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1038\/nrg3723","article-title":"Routes for breaching and protecting genetic privacy","volume":"15","author":"Erlich","year":"2014","journal-title":"Nat. Rev. Genet"},{"key":"2023012712230612800_btx568-B7","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1038\/nrg.2016.49","article-title":"Coming of age: ten years of next-generation sequencing technologies","volume":"17","author":"Goodwin","year":"2016","journal-title":"Nat. Rev. Genet"},{"key":"2023012712230612800_btx568-B8","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1126\/science.1229566","article-title":"Identifying personal genomes by surname inference","volume":"339","author":"Gymrek","year":"2013","journal-title":"Science"},{"key":"2023012712230612800_btx568-B9","doi-asserted-by":"crossref","first-page":"664","DOI":"10.1101\/gr.153346.112","article-title":"Identifying genetic relatives without compromising privacy","volume":"24","author":"He","year":"2014","journal-title":"Genome Res"},{"key":"2023012712230612800_btx568-B10","doi-asserted-by":"crossref","first-page":"e1000167.","DOI":"10.1371\/journal.pgen.1000167","article-title":"Resolving individuals contributing trace amounts of dna to highly complex mixtures using high-density snp genotyping microarrays","volume":"4","author":"Homer","year":"2008","journal-title":"PLoS Genet"},{"key":"2023012712230612800_btx568-B11","doi-asserted-by":"crossref","first-page":"i204","DOI":"10.1093\/bioinformatics\/btu294","article-title":"Privacy preserving protocol for detecting genetic relatives using rare variants","volume":"30","author":"Hormozdiari","year":"2014","journal-title":"Bioinformatics"},{"key":"2023012712230612800_btx568-B12","doi-asserted-by":"crossref","first-page":"768","DOI":"10.1101\/gr.115972.110","article-title":"Maximum-likelihood estimation of recent shared ancestry (ERSA)","volume":"21","author":"Huff","year":"2011","journal-title":"Genome Res"},{"key":"2023012712230612800_btx568-B13","author":"Humbert","year":"2013"},{"key":"2023012712230612800_btx568-B14","doi-asserted-by":"crossref","first-page":"1253","DOI":"10.1038\/ng.455","article-title":"A new statistic and its power to infer membership in a genome-wide association study using genotype frequencies","volume":"41","author":"Jacobs","year":"2009","journal-title":"Nat. Genet"},{"key":"2023012712230612800_btx568-B15","author":"Johnson","year":"2013"},{"key":"2023012712230612800_btx568-B16","author":"Lindor","year":"2012"},{"key":"2023012712230612800_btx568-B17","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1001\/jama.2010.120","article-title":"Potential for revealing individual-level information in genome-wide association studies","volume":"303","author":"Lumley","year":"2010","journal-title":"Jama"},{"key":"2023012712230612800_btx568-B18","doi-asserted-by":"crossref","first-page":"2867.","DOI":"10.1093\/bioinformatics\/btq559","article-title":"Robust relationship inference in genome-wide association studies","volume":"26","author":"Manichaikul","year":"2010","journal-title":"Bioinformatics"},{"key":"2023012712230612800_btx568-B19","doi-asserted-by":"crossref","first-page":"6.","DOI":"10.1145\/2767007","article-title":"Privacy in the genomic era","volume":"48","author":"Naveed","year":"2015","journal-title":"ACM Comput. Surv"},{"key":"2023012712230612800_btx568-B20","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1086\/519795","article-title":"PLINK: a tool set for whole-genome association and population-based linkage analyses","volume":"81","author":"Purcell","year":"2007","journal-title":"Am. J. Hum. Genet"},{"key":"2023012712230612800_btx568-B21","doi-asserted-by":"crossref","first-page":"1293","DOI":"10.1093\/bioinformatics\/btw009","article-title":"Realizing privacy preserving genome-wide association studies","volume":"32","author":"Simmons","year":"2016","journal-title":"Bioinformatics"},{"key":"2023012712230612800_btx568-B22","author":"Tram\u00e8r","year":"2015"},{"key":"2023012712230612800_btx568-B23","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1016\/j.ajhg.2016.12.002","article-title":"Expanding access to large-scale genomic data while promoting privacy: a game theoretic approach","volume":"100","author":"Wan","year":"2017","journal-title":"Am. J. Hum. Genet"},{"key":"2023012712230612800_btx568-B24","doi-asserted-by":"crossref","first-page":"3334","DOI":"10.1093\/bioinformatics\/btu561","article-title":"Securema: protecting participant privacy in genetic association meta-analysis","volume":"30","author":"Xie","year":"2014","journal-title":"Bioinformatics"},{"key":"2023012712230612800_btx568-B25","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.jbi.2014.01.008","article-title":"Scalable privacy-preserving data sharing methodology for genome-wide association studies","volume":"50","author":"Yu","year":"2014","journal-title":"J. Biomed. Inform"}],"container-title":["Bioinformatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/bioinformatics\/article-pdf\/34\/2\/181\/48912976\/bioinformatics_34_2_181.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/bioinformatics\/article-pdf\/34\/2\/181\/48912976\/bioinformatics_34_2_181.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T17:02:47Z","timestamp":1692982967000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/bioinformatics\/article\/34\/2\/181\/4124858"}},"subtitle":[],"editor":[{"given":"John","family":"Hancock","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2017,9,12]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,1,15]]}},"URL":"https:\/\/doi.org\/10.1093\/bioinformatics\/btx568","relation":{},"ISSN":["1367-4803","1367-4811"],"issn-type":[{"value":"1367-4803","type":"print"},{"value":"1367-4811","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2018,1,15]]},"published":{"date-parts":[[2017,9,12]]}}}