{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:32:33Z","timestamp":1759091553042,"version":"3.41.0"},"reference-count":71,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2017,2,6]],"date-time":"2017-02-06T00:00:00Z","timestamp":1486339200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Union's Horizon 2020 research and innovation programme under the Marie Skodowska-Curie","award":["707135"],"award-info":[{"award-number":["707135"]}]},{"name":"Scientific and Technological Research Council of Turkey, TUBITAK","award":["115C130"],"award-info":[{"award-number":["115C130"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Priv. Secur."],"published-print":{"date-parts":[[2017,2,28]]},"abstract":"<jats:p>\n            The rapid progress in human-genome sequencing is leading to a high availability of genomic data. These data is notoriously very sensitive and stable in time, and highly correlated among relatives. In this article, we study the implications of these familial correlations on kin genomic privacy. We formalize the problem and detail efficient reconstruction attacks based on graphical models and belief propagation. With our approach, an attacker can infer the genomes of the relatives of an individual whose genome or phenotype are observed by notably relying on Mendel\u2019s Laws, statistical relationships between the genomic variants, and between the genome and the phenotype. We evaluate the effect of these dependencies on privacy with respect to the amount of observed variants and the relatives sharing them. We also study how the algorithmic performance evolves when we take these various relationships into account. Furthermore, to quantify the level of genomic privacy as a result of the proposed inference attack, we discuss possible definitions of\n            <jats:italic>genomic privacy<\/jats:italic>\n            metrics, and compare their values and evolution. Genomic data reveals Mendelian disorders and the likelihood of developing severe diseases, such as Alzheimer\u2019s. We also introduce the quantification of\n            <jats:italic>health privacy<\/jats:italic>\n            , specifically, the measure of how well the predisposition to a disease is concealed from an attacker. We evaluate our approach on actual genomic data from a pedigree and show the threat extent by combining data gathered from a genome-sharing website as well as an online social network.\n          <\/jats:p>","DOI":"10.1145\/3035538","type":"journal-article","created":{"date-parts":[[2017,2,10]],"date-time":"2017-02-10T13:28:54Z","timestamp":1486733334000},"page":"1-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["Quantifying Interdependent Risks in Genomic Privacy"],"prefix":"10.1145","volume":"20","author":[{"given":"Mathias","family":"Humbert","sequence":"first","affiliation":[{"name":"CISPA, Saarland University, Saarbr\u00fccken, Germany"}]},{"given":"Erman","family":"Ayday","sequence":"additional","affiliation":[{"name":"Bilkent University, Ankara, Turkey"}]},{"given":"Jean-Pierre","family":"Hubaux","sequence":"additional","affiliation":[{"name":"EPFL, Lausanne, Switzerland"}]},{"given":"Amalio","family":"Telenti","sequence":"additional","affiliation":[{"name":"Human Longevity Inc., CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,2,6]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/375551.375602"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.59"},{"volume-title":"BPRS: Belief Propagation based iterative Recommender System","year":"2012","author":"Ayday Erman","key":"e_1_2_1_3_1"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.64"},{"key":"e_1_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Erman Ayday and Faramarz Fekri. 2012b. BP-P2P: A belief propagation-based trust and reputation management for P2P networks. In SECON.  Erman Ayday and Faramarz Fekri. 2012b. BP-P2P: A belief propagation-based trust and reputation management for P2P networks. In SECON.","DOI":"10.1109\/SECON.2012.6275830"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54568-9_9"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517843"},{"key":"e_1_2_1_8_1","unstructured":"Erman Ayday Jean Louis Raisaro Paul J. McLaren Jacques Fellay and Jean-Pierre Hubaux. 2013c. Privacy-preserving computation of disease risk by using genomic clinical and environmental data. HealthTech.   Erman Ayday Jean Louis Raisaro Paul J. McLaren Jacques Fellay and Jean-Pierre Hubaux. 2013c. Privacy-preserving computation of disease risk by using genomic clinical and environmental data. HealthTech."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046785"},{"key":"e_1_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Marina Blanton and Mehrdad Aliasgari. 2010. Secure outsourcing of DNA searching via finite automata. In DBSec\u201910.   Marina Blanton and Mehrdad Aliasgari. 2010. Secure outsourcing of DNA searching via finite automata. In DBSec\u201910.","DOI":"10.1007\/978-3-642-13739-6_4"},{"key":"e_1_2_1_11_1","first-page":"203","article-title":"Privacy-Preserving Matching of DNA Profiles","volume":"2008","author":"Bruekers Fons","year":"2008","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1038\/ng1863"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1186\/1755-8794-1-32"},{"key":"e_1_2_1_14_1","unstructured":"Jinghu Chen Ajay Dholakia Evangelos Eleflhetiou Mac P. C. Fossotier and Xiao-Yu Hu. 2002. Near optimum reduced-complexity decoding algorithm for LDPC codes. In IEEE ISIT\u201902.  Jinghu Chen Ajay Dholakia Evangelos Eleflhetiou Mac P. C. Fossotier and Xiao-Yu Hu. 2002. Near optimum reduced-complexity decoding algorithm for LDPC codes. In IEEE ISIT\u201902."},{"key":"e_1_2_1_15_1","unstructured":"Yangyi Chen Bo Peng XiaoFeng Wang and Haixu Tang. 2012. Large-scale privacy-preserving mapping of human genomic sequences on hybrid clouds. In NDSS\u201912.  Yangyi Chen Bo Peng XiaoFeng Wang and Haixu Tang. 2012. Large-scale privacy-preserving mapping of human genomic sequences on hybrid clouds. In NDSS\u201912."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-15-S5-S2"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665952"},{"volume-title":"Privacy Enhancing Technologies","author":"Diaz Claudia","key":"e_1_2_1_18_1"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665967"},{"key":"e_1_2_1_20_1","unstructured":"Radoje Drmanac Andrew B. Sparks Matthew J. Callow Aaron L. Halpern Norman L. Burns Bahram G. Kermani Paolo Carnevali Igor Nazarenko and others. 2010. Human genome sequencing using unchained base reads on self-assembling DNA nanoarrays. Science 327 5961 8--81.  Radoje Drmanac Andrew B. Sparks Matthew J. Callow Aaron L. Halpern Norman L. Burns Bahram G. Kermani Paolo Carnevali Igor Nazarenko and others. 2010. Human genome sequencing using unchained base reads on self-assembling DNA nanoarrays. Science 327 5961 8--81."},{"key":"e_1_2_1_21_1","unstructured":"Douglas S. Falconer and Trudy F. C. Mackay. 1996. Introduction to Quantitative Genetics (4th ed.). Addison Wesley Longman Harlow Essex UK.  Douglas S. Falconer and Trudy F. C. Mackay. 1996. Introduction to Quantitative Genetics (4th ed.). Addison Wesley Longman Harlow Essex UK."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2011.140"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/18.suppl_1.S189"},{"volume-title":"Proceedings of the 23rd USENIX Security Symposium (USENIX Security\u201913)","year":"2013","author":"Fredrikson Matthew","key":"e_1_2_1_24_1"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ajhg.2009.01.018"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0089204"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1229566"},{"key":"e_1_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Nils Homer Szabolcs Szelinger Margot Redman David Duggan Waibhav Tembe Jill Muehling John V. Pearson Dietrich A. Stephan Stanley F. Nelson and David W. Craig. 2008. Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays. PLoS Genetics 4.  Nils Homer Szabolcs Szelinger Margot Redman David Duggan Waibhav Tembe Jill Muehling John V. Pearson Dietrich A. Stephan Stanley F. Nelson and David W. Craig. 2008. Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays. PLoS Genetics 4.","DOI":"10.1371\/journal.pgen.1000167"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516707"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665945"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_24"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0020"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1995.1029"},{"volume-title":"Proceedings of the 10th International Conference on Uncertainty in Artificial Intelligence. Morgan Kaufmann Publishers Inc.","author":"Finn","key":"e_1_2_1_34_1"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.34"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-14-S1-S1"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487687"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2350-10-6"},{"key":"e_1_2_1_39_1","unstructured":"Michael I. Jordan. 2004. Graphical models. Statistical Science 140--155.  Michael I. Jordan. 2004. Graphical models. Statistical Science 140--155."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2007.908465"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665962"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-15-S5-S3"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1089\/cmb.2009.0174"},{"key":"e_1_2_1_44_1","unstructured":"Daphne Koller and Nir Friedman. 2009. Probabilistic Graphical Models: Principles and Techniques. MIT Press Cambridge MA.   Daphne Koller and Nir Friedman. 2009. Probabilistic Graphical Models: Principles and Techniques. MIT Press Cambridge MA."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.910572"},{"key":"e_1_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Steffen L. Lauritzen and Nuala A. Sheehan. 2003. Graphical models for genetic analyses. Statistical Science 489--514.  Steffen L. Lauritzen and Nuala A. Sheehan. 2003. Graphical models for genetic analyses. Statistical Science 489--514.","DOI":"10.1214\/ss\/1081443232"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.genom.9.081307.164242"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-15-S5-S1"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.909166"},{"key":"e_1_2_1_50_1","first-page":"1024","article-title":"The Bayes net toolbox for MATLAB","volume":"33","author":"Murphy Kevin","year":"2001","journal-title":"Computing Science and Statistics"},{"volume-title":"Proceedings of the 15th Conference on Uncertainty in Artificial Intelligence. Morgan Kaufmann Publishers Inc.","author":"Murphy Kevin P.","key":"e_1_2_1_51_1"},{"key":"e_1_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Judea Pearl. 1988. Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann Publishers Inc. San Francisco CA.   Judea Pearl. 1988. Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann Publishers Inc. San Francisco CA.","DOI":"10.1016\/B978-0-08-051489-5.50008-4"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.824918"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.21"},{"volume-title":"Privacy Enhancing Technologies","author":"Serjantov Andrei","key":"e_1_2_1_55_1"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1751-5823.2000.tb00389.x"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.18"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456403.1456407"},{"key":"e_1_2_1_59_1","doi-asserted-by":"crossref","unstructured":"Latanya Sweeney Akua Abu and Julia Winn. 2013. Identifying participants in the personal genome project by name. Available at SSRN 2257732.  Latanya Sweeney Akua Abu and Julia Winn. 2013. Identifying participants in the personal genome project by name. Available at SSRN 2257732.","DOI":"10.2139\/ssrn.2257732"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008947712763"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315309"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.5555\/2867541.2867766"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653726"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653703"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-14-S1-S2"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btu561"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2014.01.008"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-14-S1-S3"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-15-S5-S4"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-15-S5-S5"},{"key":"e_1_2_1_71_1","doi-asserted-by":"crossref","unstructured":"Xiaoyong Zhou Bo Peng Yong Fuga Li Yangyi Chen Haixu Tang and XiaoFeng Wang. 2011. To release or not to release: Evaluating information leaks in aggregate human-genome data. In ESORICS\u201911.   Xiaoyong Zhou Bo Peng Yong Fuga Li Yangyi Chen Haixu Tang and XiaoFeng Wang. 2011. To release or not to release: Evaluating information leaks in aggregate human-genome data. In ESORICS\u201911.","DOI":"10.1007\/978-3-642-23822-2_33"}],"container-title":["ACM Transactions on Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3035538","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3035538","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:34Z","timestamp":1750220614000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3035538"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,6]]},"references-count":71,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,2,28]]}},"alternative-id":["10.1145\/3035538"],"URL":"https:\/\/doi.org\/10.1145\/3035538","relation":{},"ISSN":["2471-2566","2471-2574"],"issn-type":[{"type":"print","value":"2471-2566"},{"type":"electronic","value":"2471-2574"}],"subject":[],"published":{"date-parts":[[2017,2,6]]},"assertion":[{"value":"2015-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-11-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-02-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}