Erman Ayday

ORCID: 0000-0003-3383-1081
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Ethics in Clinical Research
  • Privacy, Security, and Data Protection
  • Cancer Genomics and Diagnostics
  • Internet Traffic Analysis and Secure E-voting
  • Genomics and Rare Diseases
  • Epigenetics and DNA Methylation
  • Wireless Communication Security Techniques
  • Mobile Ad Hoc Networks
  • Genetic Associations and Epidemiology
  • Security in Wireless Sensor Networks
  • Advanced Graph Neural Networks
  • Spam and Phishing Detection
  • DNA and Biological Computing
  • Biomedical Ethics and Regulation
  • Opportunistic and Delay-Tolerant Networks
  • Advanced Steganography and Watermarking Techniques
  • Cooperative Communication and Network Coding
  • Access Control and Trust
  • Recommender Systems and Techniques
  • Human Mobility and Location-Based Analysis
  • Genetic Syndromes and Imprinting
  • Law, AI, and Intellectual Property
  • Data-Driven Disease Surveillance

Case Western Reserve University
2018-2025

Bilkent University
2013-2023

IBM Research - Ireland
2022

Rutgers Sexual and Reproductive Health and Rights
2022

École Polytechnique Fédérale de Lausanne
2012-2016

Georgia Institute of Technology
2006-2012

The rapid progress in human-genome sequencing is leading to a high availability of genomic data. This data notoriously very sensitive and stable time. It also highly correlated among relatives. A growing number genomes are becoming accessible online (e.g., because leakage, or after their posting on genome-sharing websites). What then the implications for kin privacy? We formalize problem detail an efficient reconstruction attack based graphical models belief propagation. With this approach,...

10.1145/2508859.2516707 article EN 2013-01-01

In this paper, we propose privacy-enhancing technologies for medical tests and personalized medicine methods that use patients' genomic data. Focusing on genetic disease-susceptibility tests, develop a new architecture (between the patient unit) "privacy-preserving disease susceptibility test" (PDS) by using homomorphic encryption proxy re-encryption. Assuming whole genome sequencing to be done certified institution, store data encrypted their public keys at "storage processing unit" (SPU)....

10.1145/2517840.2517843 article EN 2013-11-04

Delay/Disruption Tolerant Networks (DTNs) have been identified as one of the key areas in field wireless communication, wherein sparseness and delay are particularly high. They emerging a promising technology vehicular, planetary/interplanetary, military/tactical, disaster response, underwater satellite networks. DTNs characterized by large end-to-end communication latency lack path from source to its destination. These characteristics pose several challenges security DTNs. Especially,...

10.1109/tmc.2011.160 article EN IEEE Transactions on Mobile Computing 2011-08-15

Differential privacy (DP) has become widely accepted as a rigorous definition of data privacy, with stronger guarantees than traditional statistical methods. However, recent studies have shown that for reasonable budgets, differential significantly affects the expected utility. Many alternative notions which aim at relaxing DP since been proposed, hope providing better tradeoff between and

10.1145/2810103.2813610 article EN 2015-10-06

Secure storage of genomic data is great and increasing importance. The scientific community's improving ability to interpret individuals' genetic materials the growing size database populations have been aggravating potential consequences breaches. prevalent use passwords generate encryption keys thus poses an especially serious problem when applied data. Weak can jeopardize in short term, but given multi-decade lifespan data, even strong with conventional lead compromise. We present a tool,...

10.1109/sp.2015.34 article EN IEEE Symposium on Security and Privacy 2015-05-01

Genomic data-sharing beacons aim to provide a secure, easy implement and standardized interface for by only allowing yes/no queries on the presence of specific alleles in dataset. Previously deemed secure against re-identification attacks, were shown be vulnerable despite their stringent policy. Recent studies have demonstrated that it is possible determine whether victim dataset, repeatedly querying beacon his/her single-nucleotide polymorphisms (SNPs). Here, we propose novel attack show...

10.1093/bioinformatics/bty643 article EN Bioinformatics 2018-07-19

Motivated by privacy and usability requirements in various scenarios where existing cryptographic tools (like secure multi-party computation functional encryption) are not adequate, we introduce a new tool called Controlled Functional Encryption (C-FE). As encryption, C-FE allows user (client) to learn only certain functions of encrypted data, using keys obtained from an authority. However, allow (and require) the client send fresh key request authority every time it wants evaluate function...

10.1145/2660267.2660291 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2014-11-03

Abstract People increasingly have their genomes sequenced and some of them share genomic data online. They do so for various purposes, including to find relatives help advance research. An individual’s genome carries very sensitive, private information such as its owner’s susceptibility diseases, which could be used discrimination. Therefore, databases are often anonymized. However, an genotype is also linked visible phenotypic traits, eye or hair color, can re-identify users in anonymized...

10.1515/popets-2015-0020 article EN cc-by-nc-nd Proceedings on Privacy Enhancing Technologies 2015-06-01

In this paper, we introduce the first application of belief propagation algorithm in design and evaluation trust reputation management systems. We approach problem as an inference describe it computing marginal likelihood distributions from complicated global functions many variables. However, observe that probability is computationally prohibitive for large-scale Therefore, propose to utilize efficiently (in linear complexity) compute these distributions; resulting a fully iterative...

10.1109/tdsc.2011.64 article EN IEEE Transactions on Dependable and Secure Computing 2011-12-29

Whole genome sequencing will soon become affordable for many individuals, but thorny privacy and ethical issues could jeopardize its popularity thwart the large-scale adoption of genomics in healthcare slow potential medical advances. The Web extra at http://youtu.be/As3J9NYsbbY is an audio recording Alf Weaver interviewing Bradley Malin Jacques Fellay about possibilities challenges whole sequencing.

10.1109/mc.2013.333 article EN Computer 2013-01-01

PurposeThe implementation of genomic-based medicine is hindered by unresolved questions regarding data privacy and delivery interpreted results to health-care practitioners. We used DNA-based prediction HIV-related outcomes as a model explore critical issues in clinical genomics.MethodsWe genotyped 4,149 markers HIV-positive individuals. Variants allowed for 17 traits relevant HIV medical care, inference patient ancestry, imputation human leukocyte antigen (HLA) types. Genetic were processed...

10.1038/gim.2015.167 article EN cc-by Genetics in Medicine 2016-01-14

Thanks to the popularity of mobile devices numerous location-based services (LBS) have emerged. While several privacy-preserving solutions for LBS been proposed, most these do not consider fact that are typically cloud-based nowadays. Outsourcing data and computation cloud raises a number significant challenges related confidentiality, user identity query privacy, fine-grained access control, expressiveness. In this work, we propose framework outsourcing cloud. The supports multi-location...

10.1109/tdsc.2019.2892150 article EN IEEE Transactions on Dependable and Secure Computing 2019-01-10

Sharing genome data in a privacy-preserving way stands as major bottleneck front of the scientific progress promised by big era genomics. A community-driven protocol named genomic data-sharing beacon has been widely adopted for sharing data. The system aims to provide secure, easy implement, and standardized interface only allowing yes/no queries on presence specific alleles dataset. However, was recently shown be vulnerable against membership inference attacks. In this paper, we show that...

10.2478/popets-2021-0036 article EN cc-by-nc-nd Proceedings on Privacy Enhancing Technologies 2021-04-27

As genomic data becomes widely used, the problem of privacy a hot interdisciplinary research topic among geneticists, bioinformaticians and security experts. Practical attacks have been identified on data, thus break expectations individuals who contribute their to medical research, or simply share online. Frustrating as it is, could become even worse. Existing breaches rely low-order SNV (Single Nucleotide Variant) correlations. Our work shows that far more powerful can be designed if...

10.1109/spw.2015.21 article EN 2015-05-01

Whole genome sequencing will soon become affordable for many individuals, but thorny privacy and ethical issues could jeopardize its popularity thwart the large-scale adoption of genomics in healthcare slow potential medical advances. The Web extra at http://youtu.be/As3J9NYsbbY is an audio recording Alf Weaver interviewing Bradley Malin Jacques Fellay about possibilities challenges whole sequencing.

10.1109/mc.2015.59 article EN Computer 2015-02-01

Individuals (and their family members) share (partial) genomic data on public platforms. However, using special characteristics of data, background knowledge that can be obtained from the Web, and relationship between individuals, it is possible to infer hidden parts shared unshared) genomes. Existing work in this field considers simple correlations genome (as well as Mendel's law partial genomes a victim his members). In paper, we improve existing inference attacks privacy. We mainly...

10.1109/tcbb.2017.2709740 article EN IEEE/ACM Transactions on Computational Biology and Bioinformatics 2017-05-30

The rapid progress in human-genome sequencing is leading to a high availability of genomic data. These data notoriously very sensitive and stable time, highly correlated among relatives. In this article, we study the implications these familial correlations on kin privacy. We formalize problem detail efficient reconstruction attacks based graphical models belief propagation. With our approach, an attacker can infer genomes relatives individual whose genome or phenotype are observed by...

10.1145/3035538 article EN ACM Transactions on Privacy and Security 2017-02-06

In clinical genomics, the continuous evolution of bioinformatic algorithms and sequencing platforms makes it beneficial to store patients’ complete aligned genomic data in addition variant calls relative a reference sequence. Due large size human genome sequence files (varying from 30 GB 200 depending on coverage), two major challenges facing genomics laboratories are costs storage efficiency initial processing. addition, privacy is becoming an increasingly serious concern, yet no standard...

10.1101/gr.206870.116 article EN cc-by-nc Genome Research 2016-10-27

The rapid progress in genome sequencing has led to high availability of genomic data. Studying these data can greatly help answer the key questions about disease associations and our evolution. However, due growing privacy concerns sensitive information participants, accessing results studies (such as genome-wide association studies) is restricted only trusted individuals. On other hand, paving way biomedical breakthroughs discoveries requires granting open access datasets....

10.1093/bioinformatics/btz837 article EN Bioinformatics 2019-11-06
Coming Soon ...