Contributors |
|
xi | |
|
SECTION I Privacy challenges in genomic data sharing |
|
|
|
Chapter 1 Criticality of data sharing in genomic research and public views of genomic data sharing |
|
|
3 | (16) |
|
|
|
3 | (1) |
|
2 Advancing research and scientific knowledge |
|
|
4 | (1) |
|
3 Importance of genomic data sharing in curing diseases |
|
|
5 | (6) |
|
3.1 Rare disease perspective |
|
|
5 | (1) |
|
|
6 | (3) |
|
3.3 Genome-wide association studies perspective |
|
|
9 | (2) |
|
4 Impact of large-scale data sharing on basic research and discovery |
|
|
11 | (4) |
|
4.1 The International HapMap Project |
|
|
11 | (1) |
|
|
12 | (1) |
|
4.3 The Cancer Genome Atlas project |
|
|
13 | (1) |
|
4.4 Encyclopedia of DNA Elements Project |
|
|
13 | (1) |
|
4.5 Genotype-Tissue Expression Project |
|
|
14 | (1) |
|
|
15 | (1) |
|
6 Patient/public perspective |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
16 | (3) |
|
Chapter 2 Genomic data access policy models |
|
|
19 | (14) |
|
|
1 Data-sharing policy developments |
|
|
19 | (1) |
|
2 Open-access policy model |
|
|
20 | (2) |
|
3 Controlled-access policy model |
|
|
22 | (3) |
|
4 Registered-access policy model |
|
|
25 | (3) |
|
5 Ongoing concerns and developments |
|
|
28 | (2) |
|
5.1 Maintaining consent: Consent Codes |
|
|
28 | (1) |
|
5.2 Data-sharing risk assessment: choosing the right access level |
|
|
29 | (1) |
|
|
30 | (3) |
|
Chapter 3 Information leaks in genomic data: inference attacks |
|
|
33 | (18) |
|
|
1 Inference attacks on statistical genomic databases |
|
|
33 | (1) |
|
2 Inference attacks on genomic data-sharing beacons |
|
|
34 | (4) |
|
3 Inference attacks on kin genomic privacy |
|
|
38 | (5) |
|
4 Inference attacks using genotype---phenotype associations |
|
|
43 | (3) |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
47 | (4) |
|
Chapter 4 Genealogical search using whole-genome genotype profiles |
|
|
51 | (46) |
|
|
|
|
|
|
|
51 | (1) |
|
2 History of personal genetic data |
|
|
51 | (2) |
|
|
52 | (1) |
|
|
52 | (1) |
|
2.3 UK Biobank and beyond |
|
|
52 | (1) |
|
3 Direct-to-consumer genetic companies |
|
|
53 | (3) |
|
|
53 | (1) |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
55 | (1) |
|
4 How to encode genotype information at the genome scale |
|
|
56 | (12) |
|
|
56 | (2) |
|
|
58 | (1) |
|
|
58 | (2) |
|
|
60 | (8) |
|
5 Identity-by-descent segment and familial relatedness |
|
|
68 | (8) |
|
|
68 | (2) |
|
|
70 | (1) |
|
|
71 | (1) |
|
5.4 How IBD is related to family relationships |
|
|
72 | (2) |
|
5.5 Expected IBD family sharing |
|
|
74 | (2) |
|
|
76 | (5) |
|
6.1 What is a genealogy search |
|
|
76 | (2) |
|
6.2 Genotype-based method |
|
|
78 | (1) |
|
6.3 Haplotype-based method |
|
|
79 | (2) |
|
6.4 Benchmarking of IBD detection: runtime, power, and accuracy |
|
|
81 | (1) |
|
|
81 | (1) |
|
7.1 Methods used by DTC companies |
|
|
81 | (1) |
|
8 Challenges and unmet needs |
|
|
82 | (2) |
|
|
82 | (2) |
|
|
84 | (1) |
|
8.3 Benchmarking of genealogical search |
|
|
84 | (1) |
|
|
84 | (2) |
|
|
86 | (1) |
|
|
86 | (1) |
|
|
86 | (11) |
|
SECTION II Privacy-preserving techniques for responsible genomic data sharing |
|
|
|
Chapter 5 Homomorphic encryption |
|
|
97 | (26) |
|
|
|
97 | (4) |
|
|
98 | (1) |
|
1.2 Homomorphic encryption |
|
|
98 | (1) |
|
1.3 Note about terminology |
|
|
99 | (1) |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
100 | (1) |
|
|
101 | (15) |
|
|
101 | (1) |
|
2.2 Partially homomorphic encryption |
|
|
101 | (1) |
|
2.3 Mathematical background |
|
|
102 | (2) |
|
2.4 (Ring) Learning With Errors |
|
|
104 | (2) |
|
2.5 The Brakerski---Fan---Vercauteren scheme |
|
|
106 | (6) |
|
2.6 Computing on encrypted integers |
|
|
112 | (1) |
|
|
112 | (2) |
|
2.8 Approximate arithmetic on encrypted numbers |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
116 | (2) |
|
3.1 Outsourced storage and computation |
|
|
116 | (1) |
|
|
116 | (1) |
|
|
117 | (1) |
|
|
117 | (1) |
|
3.5 Biomedical applications |
|
|
118 | (1) |
|
|
118 | (2) |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
120 | (3) |
|
Chapter 6 Secure multi-party computation |
|
|
123 | (12) |
|
|
|
123 | (1) |
|
|
124 | (2) |
|
|
126 | (7) |
|
|
127 | (1) |
|
3.2 Multiplicative triples |
|
|
127 | (1) |
|
3.3 Generic MPC in linear rounds |
|
|
127 | (1) |
|
3.4 Generic MPC in constant rounds |
|
|
128 | (5) |
|
3.5 Pool-based cut-and-choose |
|
|
133 | (1) |
|
|
133 | (2) |
|
Chapter 7 Game theory for privacy-preserving sharing of genomic data |
|
|
135 | (26) |
|
|
|
|
|
|
|
135 | (2) |
|
|
137 | (1) |
|
3 Membership-inference game |
|
|
138 | (4) |
|
3.1 The game and its solutions |
|
|
138 | (3) |
|
3.2 Limitations of the model |
|
|
141 | (1) |
|
|
142 | (8) |
|
4.1 The game and its solutions |
|
|
142 | (7) |
|
4.2 Limitations of the model |
|
|
149 | (1) |
|
|
150 | (3) |
|
5.1 The game and its solutions |
|
|
150 | (2) |
|
5.2 Limitations of the model |
|
|
152 | (1) |
|
|
153 | (2) |
|
6.1 The game and its solutions |
|
|
153 | (2) |
|
6.2 Limitations of the model |
|
|
155 | (1) |
|
|
155 | (2) |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
157 | (4) |
|
Chapter 8 Trusted execution environment with Intel SGX |
|
|
161 | (30) |
|
|
|
|
|
|
|
161 | (2) |
|
2 Trusted execution environment |
|
|
163 | (3) |
|
3 Intel Software Guard Extensions |
|
|
166 | (16) |
|
3.1 Hardware architecture |
|
|
168 | (7) |
|
|
175 | (3) |
|
|
178 | (3) |
|
3.4 Performance properties |
|
|
181 | (1) |
|
4 HW-MPC and SGX in cloud |
|
|
182 | (6) |
|
|
183 | (1) |
|
4.2 Developing with SGX in the cloud |
|
|
183 | (1) |
|
4.3 Deploying SGX applications |
|
|
184 | (2) |
|
4.4 Open questions on SGX in the cloud |
|
|
186 | (1) |
|
4.5 Putting it all together |
|
|
187 | (1) |
|
|
188 | (1) |
|
|
189 | (2) |
Index |
|
191 | |