论文标题
基因组重建攻击对基因组数据共享信标的攻击
Genome Reconstruction Attacks Against Genomic Data-Sharing Beacons
论文作者
论文摘要
以保护隐私的方式共享基因组数据是基因组学大数据时代所承诺的科学进步前面的主要瓶颈。一个名为基因组数据共享信标协议的社区驱动协议已被广泛用于共享基因组数据。该系统旨在通过仅允许对数据集中存在特定等位基因的质量进行查询,为数据共享提供安全,易于实现和标准化的界面。但是,最近证明,BEACON协议对成员推理攻击很容易受到攻击。在本文中,我们表明对基因组数据共享信标的隐私威胁不仅限于会员推论。我们识别并分析了基因组数据共享信标的新型脆弱性:基因组重建。我们表明,当攻击者知道受害者在最近的更新中已将受害者添加到信标时,有可能成功地重建受害者的基因组。我们还表明,即使在同一更新期间将多个人添加到灯塔中,也可以使用攻击者轻松获得的特征(例如,眼睛和头发颜色)以高信任地识别受害者的基因组。此外,我们展示了如何使用与敏感表型无关的信标重建的基因组,可用于对具有敏感表型(即HIV+)的信标的成员推理攻击。这项工作的结果将指导信标操作员何时以及如何更新信标的内容。因此,这项工作将是帮助信标操作员和参与者做出明智决定的重要尝试。
Sharing genome data in a privacy-preserving way stands as a major bottleneck in front of the scientific progress promised by the big data era in genomics. A community-driven protocol named genomic data-sharing beacon protocol has been widely adopted for sharing genomic data. The system aims to provide a secure, easy to implement, and standardized interface for data sharing by only allowing yes/no queries on the presence of specific alleles in the dataset. However, beacon protocol was recently shown to be vulnerable against membership inference attacks. In this paper, we show that privacy threats against genomic data sharing beacons are not limited to membership inference. We identify and analyze a novel vulnerability of genomic data-sharing beacons: genome reconstruction. We show that it is possible to successfully reconstruct a substantial part of the genome of a victim when the attacker knows the victim has been added to the beacon in a recent update. We also show that even if multiple individuals are added to the beacon during the same update, it is possible to identify the victim's genome with high confidence using traits that are easily accessible by the attacker (e.g., eye and hair color). Moreover, we show how the reconstructed genome using a beacon that is not associated with a sensitive phenotype can be used for membership inference attacks to beacons with sensitive phenotypes (i.e., HIV+). The outcome of this work will guide beacon operators on when and how to update the content of the beacon. Thus, this work will be an important attempt at helping beacon operators and participants make informed decisions.