Deterministic identification of specific individuals from GWAS results

Ruichu Cai, Zhifeng Hao, Marianne Winslett, Xiaokui Xiao, Yin Yang, Zhenjie Zhang, Shuigeng Zhou

Research output: Contribution to journalArticle

11 Citations (Scopus)

Abstract

Motivation: Genome-wide association studies (GWASs) are commonly applied on human genomic data to understand the causal gene combinations statistically connected to certain diseases. Patients involved in these GWASs could be re-identified when the studies release statistical information on a large number of single-nucleotide polymorphisms. Subsequent work, however, found that such privacy attacks are theoretically possible but unsuccessful and unconvincing in real settings. Results: We derive the first practical privacy attack that can successfully identify specific individuals from limited published associations from the Wellcome Trust Case Control Consortium (WTCCC) dataset. For GWAS results computed over 25 randomly selected loci, our algorithm always pinpoints at least one patient from the WTCCC dataset. Moreover, the number of re-identified patients grows rapidly with the number of published genotypes. Finally, we discuss prevention methods to disable the attack, thus providing a solution for enhancing patient privacy. Availability and implementation: Proofs of the theorems and additional experimental results are available in the support online documents. The attack algorithm codes are publicly available at https://sites.google.com/site/zhangzhenjie/GWAS-attack.zip. The genomic dataset used in the experiments is available at http://www.wtccc.org.uk/ on request.

Original languageEnglish
Pages (from-to)1701-1707
Number of pages7
JournalBioinformatics
Volume31
Issue number11
DOIs
Publication statusPublished - 2015
Externally publishedYes

Fingerprint

Genome-Wide Association Study
Privacy
Genome
Genes
Attack
Case-control
Genomics
Single nucleotide Polymorphism
Single Nucleotide Polymorphism
Nucleotides
Polymorphism
Genotype
Locus
Availability
Gene
Datasets
Experimental Results
Theorem
Experiment
Experiments

ASJC Scopus subject areas

  • Statistics and Probability
  • Medicine(all)
  • Biochemistry
  • Molecular Biology
  • Computer Science Applications
  • Computational Theory and Mathematics
  • Computational Mathematics

Cite this

Cai, R., Hao, Z., Winslett, M., Xiao, X., Yang, Y., Zhang, Z., & Zhou, S. (2015). Deterministic identification of specific individuals from GWAS results. Bioinformatics, 31(11), 1701-1707. https://doi.org/10.1093/bioinformatics/btv018

Deterministic identification of specific individuals from GWAS results. / Cai, Ruichu; Hao, Zhifeng; Winslett, Marianne; Xiao, Xiaokui; Yang, Yin; Zhang, Zhenjie; Zhou, Shuigeng.

In: Bioinformatics, Vol. 31, No. 11, 2015, p. 1701-1707.

Research output: Contribution to journalArticle

Cai, R, Hao, Z, Winslett, M, Xiao, X, Yang, Y, Zhang, Z & Zhou, S 2015, 'Deterministic identification of specific individuals from GWAS results', Bioinformatics, vol. 31, no. 11, pp. 1701-1707. https://doi.org/10.1093/bioinformatics/btv018
Cai, Ruichu ; Hao, Zhifeng ; Winslett, Marianne ; Xiao, Xiaokui ; Yang, Yin ; Zhang, Zhenjie ; Zhou, Shuigeng. / Deterministic identification of specific individuals from GWAS results. In: Bioinformatics. 2015 ; Vol. 31, No. 11. pp. 1701-1707.
@article{fd4261879d6441ca9ea0a2bec83c6fa4,
title = "Deterministic identification of specific individuals from GWAS results",
abstract = "Motivation: Genome-wide association studies (GWASs) are commonly applied on human genomic data to understand the causal gene combinations statistically connected to certain diseases. Patients involved in these GWASs could be re-identified when the studies release statistical information on a large number of single-nucleotide polymorphisms. Subsequent work, however, found that such privacy attacks are theoretically possible but unsuccessful and unconvincing in real settings. Results: We derive the first practical privacy attack that can successfully identify specific individuals from limited published associations from the Wellcome Trust Case Control Consortium (WTCCC) dataset. For GWAS results computed over 25 randomly selected loci, our algorithm always pinpoints at least one patient from the WTCCC dataset. Moreover, the number of re-identified patients grows rapidly with the number of published genotypes. Finally, we discuss prevention methods to disable the attack, thus providing a solution for enhancing patient privacy. Availability and implementation: Proofs of the theorems and additional experimental results are available in the support online documents. The attack algorithm codes are publicly available at https://sites.google.com/site/zhangzhenjie/GWAS-attack.zip. The genomic dataset used in the experiments is available at http://www.wtccc.org.uk/ on request.",
author = "Ruichu Cai and Zhifeng Hao and Marianne Winslett and Xiaokui Xiao and Yin Yang and Zhenjie Zhang and Shuigeng Zhou",
year = "2015",
doi = "10.1093/bioinformatics/btv018",
language = "English",
volume = "31",
pages = "1701--1707",
journal = "Bioinformatics",
issn = "1367-4803",
publisher = "Oxford University Press",
number = "11",

}

TY - JOUR

T1 - Deterministic identification of specific individuals from GWAS results

AU - Cai, Ruichu

AU - Hao, Zhifeng

AU - Winslett, Marianne

AU - Xiao, Xiaokui

AU - Yang, Yin

AU - Zhang, Zhenjie

AU - Zhou, Shuigeng

PY - 2015

Y1 - 2015

N2 - Motivation: Genome-wide association studies (GWASs) are commonly applied on human genomic data to understand the causal gene combinations statistically connected to certain diseases. Patients involved in these GWASs could be re-identified when the studies release statistical information on a large number of single-nucleotide polymorphisms. Subsequent work, however, found that such privacy attacks are theoretically possible but unsuccessful and unconvincing in real settings. Results: We derive the first practical privacy attack that can successfully identify specific individuals from limited published associations from the Wellcome Trust Case Control Consortium (WTCCC) dataset. For GWAS results computed over 25 randomly selected loci, our algorithm always pinpoints at least one patient from the WTCCC dataset. Moreover, the number of re-identified patients grows rapidly with the number of published genotypes. Finally, we discuss prevention methods to disable the attack, thus providing a solution for enhancing patient privacy. Availability and implementation: Proofs of the theorems and additional experimental results are available in the support online documents. The attack algorithm codes are publicly available at https://sites.google.com/site/zhangzhenjie/GWAS-attack.zip. The genomic dataset used in the experiments is available at http://www.wtccc.org.uk/ on request.

AB - Motivation: Genome-wide association studies (GWASs) are commonly applied on human genomic data to understand the causal gene combinations statistically connected to certain diseases. Patients involved in these GWASs could be re-identified when the studies release statistical information on a large number of single-nucleotide polymorphisms. Subsequent work, however, found that such privacy attacks are theoretically possible but unsuccessful and unconvincing in real settings. Results: We derive the first practical privacy attack that can successfully identify specific individuals from limited published associations from the Wellcome Trust Case Control Consortium (WTCCC) dataset. For GWAS results computed over 25 randomly selected loci, our algorithm always pinpoints at least one patient from the WTCCC dataset. Moreover, the number of re-identified patients grows rapidly with the number of published genotypes. Finally, we discuss prevention methods to disable the attack, thus providing a solution for enhancing patient privacy. Availability and implementation: Proofs of the theorems and additional experimental results are available in the support online documents. The attack algorithm codes are publicly available at https://sites.google.com/site/zhangzhenjie/GWAS-attack.zip. The genomic dataset used in the experiments is available at http://www.wtccc.org.uk/ on request.

UR - http://www.scopus.com/inward/record.url?scp=84941628486&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84941628486&partnerID=8YFLogxK

U2 - 10.1093/bioinformatics/btv018

DO - 10.1093/bioinformatics/btv018

M3 - Article

VL - 31

SP - 1701

EP - 1707

JO - Bioinformatics

JF - Bioinformatics

SN - 1367-4803

IS - 11

ER -