Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2810103.2813610acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Differential Privacy with Bounded Priors: Reconciling Utility and Privacy in Genome-Wide Association Studies

Published: 12 October 2015 Publication History

Abstract

Differential privacy (DP) has become widely accepted as a rigorous definition of data privacy, with stronger privacy guarantees than traditional statistical methods. However, recent studies have shown that for reasonable privacy budgets, differential privacy significantly affects the expected utility. Many alternative privacy notions which aim at relaxing DP have since been proposed, with the hope of providing a better tradeoff between privacy and utility.
At CCS'13, Li et al. introduced the membership privacy framework, wherein they aim at protecting against set membership disclosure by adversaries whose prior knowledge is captured by a family of probability distributions. In the context of this framework, we investigate a relaxation of DP, by considering prior distributions that capture more reasonable amounts of background knowledge. We show that for different privacy budgets, DP can be used to achieve membership privacy for various adversarial settings, thus leading to an interesting tradeoff between privacy guarantees and utility.
We re-evaluate methods for releasing differentially private chi2-statistics in genome-wide association studies and show that we can achieve a higher utility than in previous works, while still guaranteeing membership privacy in a relevant adversarial setting.

References

[1]
M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi. Geo-indistinguishability: Differential privacy for location-based systems. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS '13, pages 901--914, New York, NY, USA, 2013. ACM.
[2]
R. Bassily, A. Groce, J. Katz, and A. Smith. Coupled-worlds privacy: Exploiting adversarial uncertainty in statistical data privacy. In Foundations of Computer Science (FOCS), 2013 IEEE 54th Annual Symposium on, pages 439--448. IEEE, 2013.
[3]
R. Bhaskar, S. Laxman, A. Smith, and A. Thakurta. Discovering frequent patterns in sensitive data. In Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 503--512. ACM, 2010.
[4]
C. Dwork. Differential privacy. In Automata, languages and programming, pages 1--12. Springer, 2006.
[5]
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In Proceedings of the Third Conference on Theory of Cryptography, TCC'06, pages 265--284, Berlin, Heidelberg, 2006. Springer-Verlag.
[6]
M. Fredrikson, E. Lantz, S. Jha, S. Lin, D. Page, and T. Ristenpart. Privacy in pharmacogenetics: An end-to-end case study of personalized warfarin dosing. In 23rd USENIX Security Symposium (USENIX Security 14), pages 17--32, San Diego, CA, Aug. 2014. USENIX Association.
[7]
A. Friedman and A. Schuster. Data mining with differential privacy. In Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 493--502. ACM, 2010.
[8]
J. Gehrke, M. Hay, E. Lui, and R. Pass. Crowd-blending privacy. In Advances in Cryptology--CRYPTO 2012, pages 479--496. Springer, 2012.
[9]
N. Homer, S. Szelinger, M. Redman, D. Duggan, W. Tembe, J. Muehling, J. V. Pearson, D. A. Stephan, S. F. Nelson, and D. W. Craig. Resolving individuals contributing trace amounts of dna to highly complex mixtures using high-density snp genotyping microarrays. PLoS genetics, 4(8):e1000167, 2008.
[10]
A. Johnson and V. Shmatikov. Privacy-preserving data exploration in genome-wide association studies. In Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '13, pages 1079--1087, New York, NY, USA, 2013. ACM.
[11]
D. Kifer and A. Machanavajjhala. No free lunch in data privacy. In Proceedings of the 2011 ACM SIGMOD International Conference on Management of Data, SIGMOD '11, pages 193--204, New York, NY, USA, 2011. ACM.
[12]
J. Lee and C. Clifton. Differential identifiability. In Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '12, pages 1041--1049, New York, NY, USA, 2012. ACM.
[13]
N. Li, W. Qardaji, and D. Su. On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy. In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ASIACCS '12, pages 32--33, New York, NY, USA, 2012. ACM.
[14]
N. Li, W. Qardaji, D. Su, Y. Wu, and W. Yang. Membership privacy: a unifying framework for privacy definitions. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pages 889--900, New York, NY, USA, 2013. ACM.
[15]
E. Lui and R. Pass. Outlier privacy. In Y. Dodis and J. Nielsen, editors, Theory of Cryptography, volume 9015 of Lecture Notes in Computer Science, pages 277--305. Springer Berlin Heidelberg, 2015.
[16]
A. Machanavajjhala, J. Gehrke, and M. Götz. Data publishing against realistic adversaries. Proc. VLDB Endow., 2(1):790--801, Aug. 2009.
[17]
F. McSherry and K. Talwar. Mechanism design via differential privacy. In Foundations of Computer Science, 2007. FOCS'07. 48th Annual IEEE Symposium on, pages 94--103. IEEE, 2007.
[18]
C. C. Spencer, Z. Su, P. Donnelly, and J. Marchini. Designing genome-wide association studies: sample size, power, imputation, and the choice of genotyping chip. PLoS genetics, 5(5):e1000477, 2009.
[19]
C. Uhler, A. Slavkovic, and S. E. Fienberg. Privacy-preserving data sharing for genome-wide association studies. Journal of Privacy and Confidentiality, 5(1), 2013.
[20]
R. Wang, Y. F. Li, X. Wang, H. Tang, and X. Zhou. Learning your identity and disease from research papers: Information leaks in genome wide association study. In Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09, pages 534--544, New York, NY, USA, 2009. ACM.
[21]
F. A. Wright, H. Huang, X. Guan, K. Gamiel, C. Jeffries, W. T. Barry, F. P.-M. de Villena, P. F. Sullivan, K. C. Wilhelmsen, and F. Zou. Simulating association studies: a data-based resampling method for candidate regions or whole genome scans. Bioinformatics, 23(19):2581--2588, 2007.
[22]
F. Yu, S. E. Fienberg, A. B. Slavković, and C. Uhler. Scalable privacy-preserving data sharing methodology for genome-wide association studies. Journal of biomedical informatics, 2014.

Cited By

View all
  • (2024)ReActHE: A homomorphic encryption friendly deep neural network for privacy-preserving biomedical predictionSmart Health10.1016/j.smhl.2024.10046932(100469)Online publication date: Jun-2024
  • (2023)Ensuring Trust in Genomics Research2023 5th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)10.1109/TPS-ISA58951.2023.00011(1-12)Online publication date: 1-Nov-2023
  • (2023)Pointwise Maximal LeakageIEEE Transactions on Information Theory10.1109/TIT.2023.330437869:12(8054-8080)Online publication date: Dec-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
October 2015
1750 pages
ISBN:9781450338325
DOI:10.1145/2810103
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 October 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. GWAS
  2. data-driven medicine
  3. differential privacy
  4. genomic privacy
  5. membership privacy

Qualifiers

  • Research-article

Conference

CCS'15
Sponsor:

Acceptance Rates

CCS '15 Paper Acceptance Rate 128 of 660 submissions, 19%;
Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '24
ACM SIGSAC Conference on Computer and Communications Security
October 14 - 18, 2024
Salt Lake City , UT , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)56
  • Downloads (Last 6 weeks)4
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2024)ReActHE: A homomorphic encryption friendly deep neural network for privacy-preserving biomedical predictionSmart Health10.1016/j.smhl.2024.10046932(100469)Online publication date: Jun-2024
  • (2023)Ensuring Trust in Genomics Research2023 5th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)10.1109/TPS-ISA58951.2023.00011(1-12)Online publication date: 1-Nov-2023
  • (2023)Pointwise Maximal LeakageIEEE Transactions on Information Theory10.1109/TIT.2023.330437869:12(8054-8080)Online publication date: Dec-2023
  • (2023)Maliciously Secure and Efficient Large-Scale Genome-Wide Association Study With Multi-Party ComputationIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.315249820:2(1243-1257)Online publication date: 1-Mar-2023
  • (2023)Privacy Computing with Right to Be Forgotten in Trusted Execution EnvironmentGLOBECOM 2023 - 2023 IEEE Global Communications Conference10.1109/GLOBECOM54140.2023.10437471(2566-2571)Online publication date: 4-Dec-2023
  • (2023)Enhancing Security and Privacy Preservation of Sensitive Information in e-Health Datasets Using FCA ApproachIEEE Access10.1109/ACCESS.2023.328540711(62591-62604)Online publication date: 2023
  • (2023)A Survey on Differential Privacy for Medical Data AnalysisAnnals of Data Science10.1007/s40745-023-00475-311:2(733-747)Online publication date: 10-Jun-2023
  • (2022)A Survey on Differential Privacy for Unstructured Data ContentACM Computing Surveys10.1145/349023754:10s(1-28)Online publication date: 13-Sep-2022
  • (2022)Privacy-Preserving Aggregate Mobility Data Release: An Information-Theoretic Deep Reinforcement Learning ApproachIEEE Transactions on Information Forensics and Security10.1109/TIFS.2022.315236117(849-864)Online publication date: 2022
  • (2022)Local Information Privacy and Its Application to Privacy-Preserving Data AggregationIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2020.304173319:3(1918-1935)Online publication date: 1-May-2022
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media