{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:11:47Z","timestamp":1761581507931,"version":"3.41.0"},"reference-count":53,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2017,1,9]],"date-time":"2017-01-09T00:00:00Z","timestamp":1483920000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Priv. Secur."],"published-print":{"date-parts":[[2017,2,28]]},"abstract":"<jats:p>The genome is a unique identifier for human individuals. The genome also contains highly sensitive information, creating a high potential for misuse of genomic data (for example, genetic discrimination). In this article, we investigate how genomic privacy can be measured in scenarios where an adversary aims to infer a person\u2019s genomic markers by constructing probability distributions on the values of genetic variations. We measured the strength of privacy metrics by requiring that metrics are monotonic with increasing adversary strength and uncovered serious problems with several existing metrics currently used to measure genomic privacy. We provide suggestions on metric selection, interpretation, and visualization and illustrate the work flow using case studies for three real-world diseases.<\/jats:p>","DOI":"10.1145\/3020003","type":"journal-article","created":{"date-parts":[[2017,1,10]],"date-time":"2017-01-10T15:41:17Z","timestamp":1484062877000},"page":"1-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Evaluating the Strength of Genomic Privacy Metrics"],"prefix":"10.1145","volume":"20","author":[{"given":"Isabel","family":"Wagner","sequence":"first","affiliation":[{"name":"De Montfort University, Leicester, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2017,1,9]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/375551.375602"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40956-4_7"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-79026-8_23"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54568-9_9"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831486"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517843"},{"volume-title":"Privacy-Preserving Data Mining: Models and Algorithms. Number 34 in Advances in Database Systems","author":"Bertino Elisa","key":"e_1_2_1_7_1"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39077-7_12"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133608"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179529.1179539"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1777688.1777693"},{"key":"e_1_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Claudia Diaz Stefaan Seys Joris Claessens and Bart Preneel. 2003. Towards measuring anonymity. In Privacy Enhancing Technologies. 54--68.   Claudia Diaz Stefaan Seys Joris Claessens and Bart Preneel. 2003. Towards measuring anonymity. In Privacy Enhancing Technologies. 54--68.","DOI":"10.1007\/3-540-36467-6_5"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314347"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1181498"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_2_1_16_1","first-page":"6","article-title":"Routes for breaching and protecting genetic privacy","volume":"15","author":"Erlich Yaniv","year":"2014","journal-title":"Nat. Rev. Genet."},{"key":"e_1_2_1_17_1","unstructured":"Matthew Fredrikson Eric Lantz Somesh Jha Simon Lin David Page and Thomas Ristenpart. 2014. Privacy in pharmacogenetics: An end-to-end case study of personalized Warfarin dosing. In USENIX Security. USENIX.   Matthew Fredrikson Eric Lantz Somesh Jha Simon Lin David Page and Thomas Ristenpart. 2014. Privacy in pharmacogenetics: An end-to-end case study of personalized Warfarin dosing. In USENIX Security. USENIX."},{"volume-title":"Proceedings of the 1st International Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS\u201907)","year":"2007","author":"Freudiger Julien","key":"e_1_2_1_18_1"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.4"},{"key":"e_1_2_1_20_1","first-page":"7284","article-title":"US employer agrees to stop genetic testing","volume":"322","author":"Gottlieb Scott","year":"2001","journal-title":"Br. Med. J."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0089204"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7295484"},{"key":"e_1_2_1_23_1","first-page":"2","article-title":"Violin plots: A box plot-density trace synergism","volume":"52","author":"Hintze Jerry L.","year":"1998","journal-title":"Am. Stat."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pgen.1000167"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516707"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665945"},{"key":"e_1_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Mathias Humbert K\u00e9vin Huguenin Joachim Hugonot Erman Ayday and Jean-Pierre Hubaux. 2015. De-anonymizing genomic databases using phenotypic traits.  Mathias Humbert K\u00e9vin Huguenin Joachim Hugonot Erman Ayday and Jean-Pierre Hubaux. 2015. De-anonymizing genomic databases using phenotypic traits.","DOI":"10.1515\/popets-2015-0020"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622047"},{"volume-title":"Proceedings of the AMIA Symposium (AMIA\u201902)","author":"Lin Zhen","key":"e_1_2_1_29_1"},{"key":"e_1_2_1_30_1","unstructured":"Changchang Liu and Prateek Mittal. 2016. LinkMirage: Enabling privacy-preserving analytics on social relationships. In NDSS.  Changchang Liu and Prateek Mittal. 2016. LinkMirage: Enabling privacy-preserving analytics on social relationships. In NDSS."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1055\/s-0038-1634025"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmva.2006.11.013"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54568-9_1"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.22"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2767007"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1038\/ejhg.2008.198"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08506-7_11"},{"key":"e_1_2_1_38_1","first-page":"6822","article-title":"A map of human genome sequence variation containing 1.42 million single nucleotide polymorphisms","volume":"409","author":"Sachidanandam Ravi","year":"2001","journal-title":"Nature"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.21"},{"volume-title":"Proceedings of the 2nd Internationl Symposium on Privacy Enhancing Technologies (PETS\u201902)","year":"2002","author":"Serjantov Andrei","key":"e_1_2_1_40_1"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/29.1.308"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.18"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1038\/nrg2361"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36213-2_26"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature15393"},{"key":"e_1_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Sarah A. Tishkoff and Kenneth K. Kidd. 2004. Implications of biogeography of human populations for \u201crace\u201d and medicine. Nat. Genet. 36 (Oct. 2004) S21--S27.  Sarah A. Tishkoff and Kenneth K. Kidd. 2004. Implications of biogeography of human populations for \u201crace\u201d and medicine. Nat. Genet. 36 (Oct. 2004) S21--S27.","DOI":"10.1038\/ng1438"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/2867541.2867766"},{"key":"e_1_2_1_49_1","unstructured":"Isabel Wagner and David Eckhoff. 2015. Technical privacy metrics: A systematic survey. arXiv:1512.00327 {cs math} (Dec. 2015). http:\/\/arxiv.org\/abs\/1512.00327  Isabel Wagner and David Eckhoff. 2015. Technical privacy metrics: A systematic survey. arXiv:1512.00327 {cs math} (Dec. 2015). http:\/\/arxiv.org\/abs\/1512.00327"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653726"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gkt1229"},{"key":"e_1_2_1_52_1","unstructured":"Kris Wetterstrand. 2016. DNA Sequencing Costs: Data from the NHGRI Genome Sequencing Program (GSP). Retrieved from https:\/\/www.genome.gov\/sequencingcostsdata.  Kris Wetterstrand. 2016. DNA Sequencing Costs: Data from the NHGRI Genome Sequencing Program (GSP). Retrieved from https:\/\/www.genome.gov\/sequencingcostsdata."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.13"}],"container-title":["ACM Transactions on Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3020003","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3020003","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:36:54Z","timestamp":1750217814000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3020003"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,9]]},"references-count":53,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,2,28]]}},"alternative-id":["10.1145\/3020003"],"URL":"https:\/\/doi.org\/10.1145\/3020003","relation":{},"ISSN":["2471-2566","2471-2574"],"issn-type":[{"type":"print","value":"2471-2566"},{"type":"electronic","value":"2471-2574"}],"subject":[],"published":{"date-parts":[[2017,1,9]]},"assertion":[{"value":"2016-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-11-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-01-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}