- Privacy-Preserving Technologies in Data
- Cryptography and Data Security
- Ethics in Clinical Research
- Privacy, Security, and Data Protection
- Cancer Genomics and Diagnostics
- Internet Traffic Analysis and Secure E-voting
- Genomics and Rare Diseases
- Epigenetics and DNA Methylation
- Wireless Communication Security Techniques
- Mobile Ad Hoc Networks
- Genetic Associations and Epidemiology
- Security in Wireless Sensor Networks
- Advanced Graph Neural Networks
- Spam and Phishing Detection
- DNA and Biological Computing
- Biomedical Ethics and Regulation
- Opportunistic and Delay-Tolerant Networks
- Advanced Steganography and Watermarking Techniques
- Cooperative Communication and Network Coding
- Access Control and Trust
- Recommender Systems and Techniques
- Human Mobility and Location-Based Analysis
- Genetic Syndromes and Imprinting
- Law, AI, and Intellectual Property
- Data-Driven Disease Surveillance
Case Western Reserve University
2018-2025
Bilkent University
2013-2023
IBM Research - Ireland
2022
Rutgers Sexual and Reproductive Health and Rights
2022
École Polytechnique Fédérale de Lausanne
2012-2016
Georgia Institute of Technology
2006-2012
The rapid progress in human-genome sequencing is leading to a high availability of genomic data. This data notoriously very sensitive and stable time. It also highly correlated among relatives. A growing number genomes are becoming accessible online (e.g., because leakage, or after their posting on genome-sharing websites). What then the implications for kin privacy? We formalize problem detail an efficient reconstruction attack based graphical models belief propagation. With this approach,...
In this paper, we propose privacy-enhancing technologies for medical tests and personalized medicine methods that use patients' genomic data. Focusing on genetic disease-susceptibility tests, develop a new architecture (between the patient unit) "privacy-preserving disease susceptibility test" (PDS) by using homomorphic encryption proxy re-encryption. Assuming whole genome sequencing to be done certified institution, store data encrypted their public keys at "storage processing unit" (SPU)....
Delay/Disruption Tolerant Networks (DTNs) have been identified as one of the key areas in field wireless communication, wherein sparseness and delay are particularly high. They emerging a promising technology vehicular, planetary/interplanetary, military/tactical, disaster response, underwater satellite networks. DTNs characterized by large end-to-end communication latency lack path from source to its destination. These characteristics pose several challenges security DTNs. Especially,...
Differential privacy (DP) has become widely accepted as a rigorous definition of data privacy, with stronger guarantees than traditional statistical methods. However, recent studies have shown that for reasonable budgets, differential significantly affects the expected utility. Many alternative notions which aim at relaxing DP since been proposed, hope providing better tradeoff between and
Secure storage of genomic data is great and increasing importance. The scientific community's improving ability to interpret individuals' genetic materials the growing size database populations have been aggravating potential consequences breaches. prevalent use passwords generate encryption keys thus poses an especially serious problem when applied data. Weak can jeopardize in short term, but given multi-decade lifespan data, even strong with conventional lead compromise. We present a tool,...
Genomic data-sharing beacons aim to provide a secure, easy implement and standardized interface for by only allowing yes/no queries on the presence of specific alleles in dataset. Previously deemed secure against re-identification attacks, were shown be vulnerable despite their stringent policy. Recent studies have demonstrated that it is possible determine whether victim dataset, repeatedly querying beacon his/her single-nucleotide polymorphisms (SNPs). Here, we propose novel attack show...
Motivated by privacy and usability requirements in various scenarios where existing cryptographic tools (like secure multi-party computation functional encryption) are not adequate, we introduce a new tool called Controlled Functional Encryption (C-FE). As encryption, C-FE allows user (client) to learn only certain functions of encrypted data, using keys obtained from an authority. However, allow (and require) the client send fresh key request authority every time it wants evaluate function...
Abstract People increasingly have their genomes sequenced and some of them share genomic data online. They do so for various purposes, including to find relatives help advance research. An individual’s genome carries very sensitive, private information such as its owner’s susceptibility diseases, which could be used discrimination. Therefore, databases are often anonymized. However, an genotype is also linked visible phenotypic traits, eye or hair color, can re-identify users in anonymized...
In this paper, we introduce the first application of belief propagation algorithm in design and evaluation trust reputation management systems. We approach problem as an inference describe it computing marginal likelihood distributions from complicated global functions many variables. However, observe that probability is computationally prohibitive for large-scale Therefore, propose to utilize efficiently (in linear complexity) compute these distributions; resulting a fully iterative...
Whole genome sequencing will soon become affordable for many individuals, but thorny privacy and ethical issues could jeopardize its popularity thwart the large-scale adoption of genomics in healthcare slow potential medical advances. The Web extra at http://youtu.be/As3J9NYsbbY is an audio recording Alf Weaver interviewing Bradley Malin Jacques Fellay about possibilities challenges whole sequencing.
PurposeThe implementation of genomic-based medicine is hindered by unresolved questions regarding data privacy and delivery interpreted results to health-care practitioners. We used DNA-based prediction HIV-related outcomes as a model explore critical issues in clinical genomics.MethodsWe genotyped 4,149 markers HIV-positive individuals. Variants allowed for 17 traits relevant HIV medical care, inference patient ancestry, imputation human leukocyte antigen (HLA) types. Genetic were processed...
Thanks to the popularity of mobile devices numerous location-based services (LBS) have emerged. While several privacy-preserving solutions for LBS been proposed, most these do not consider fact that are typically cloud-based nowadays. Outsourcing data and computation cloud raises a number significant challenges related confidentiality, user identity query privacy, fine-grained access control, expressiveness. In this work, we propose framework outsourcing cloud. The supports multi-location...
Sharing genome data in a privacy-preserving way stands as major bottleneck front of the scientific progress promised by big era genomics. A community-driven protocol named genomic data-sharing beacon has been widely adopted for sharing data. The system aims to provide secure, easy implement, and standardized interface only allowing yes/no queries on presence specific alleles dataset. However, was recently shown be vulnerable against membership inference attacks. In this paper, we show that...
As genomic data becomes widely used, the problem of privacy a hot interdisciplinary research topic among geneticists, bioinformaticians and security experts. Practical attacks have been identified on data, thus break expectations individuals who contribute their to medical research, or simply share online. Frustrating as it is, could become even worse. Existing breaches rely low-order SNV (Single Nucleotide Variant) correlations. Our work shows that far more powerful can be designed if...
Whole genome sequencing will soon become affordable for many individuals, but thorny privacy and ethical issues could jeopardize its popularity thwart the large-scale adoption of genomics in healthcare slow potential medical advances. The Web extra at http://youtu.be/As3J9NYsbbY is an audio recording Alf Weaver interviewing Bradley Malin Jacques Fellay about possibilities challenges whole sequencing.
Individuals (and their family members) share (partial) genomic data on public platforms. However, using special characteristics of data, background knowledge that can be obtained from the Web, and relationship between individuals, it is possible to infer hidden parts shared unshared) genomes. Existing work in this field considers simple correlations genome (as well as Mendel's law partial genomes a victim his members). In paper, we improve existing inference attacks privacy. We mainly...
The rapid progress in human-genome sequencing is leading to a high availability of genomic data. These data notoriously very sensitive and stable time, highly correlated among relatives. In this article, we study the implications these familial correlations on kin privacy. We formalize problem detail efficient reconstruction attacks based graphical models belief propagation. With our approach, an attacker can infer genomes relatives individual whose genome or phenotype are observed by...
In clinical genomics, the continuous evolution of bioinformatic algorithms and sequencing platforms makes it beneficial to store patients’ complete aligned genomic data in addition variant calls relative a reference sequence. Due large size human genome sequence files (varying from 30 GB 200 depending on coverage), two major challenges facing genomics laboratories are costs storage efficiency initial processing. addition, privacy is becoming an increasingly serious concern, yet no standard...
The rapid progress in genome sequencing has led to high availability of genomic data. Studying these data can greatly help answer the key questions about disease associations and our evolution. However, due growing privacy concerns sensitive information participants, accessing results studies (such as genome-wide association studies) is restricted only trusted individuals. On other hand, paving way biomedical breakthroughs discoveries requires granting open access datasets....