Privacy preserving protocol for detecting genetic relatives using rare variants

10Citations
Citations of this article
41Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Motivation: High-throughput sequencing technologies have impacted many areas of genetic research. One such area is the identification of relatives from genetic data. The standard approach for the identification of genetic relatives collects the genomic data of all individuals and stores it in a database. Then, each pair of individuals is compared to detect the set of genetic relatives, and the matched individuals are informed. The main drawback of this approach is the requirement of sharing your genetic data with a trusted third party to perform the relatedness test. Results: In this work, we propose a secure protocol to detect the genetic relatives from sequencing data while not exposing any information about their genomes. We assume that individuals have access to their genome sequences but do not want to share their genomes with anyone else. Unlike previous approaches, our approach uses both common and rare variants which provide the ability to detect much more distant relationships securely. We use a simulated data generated from the 1000 genomes data and illustrate that we can easily detect up to fifth degree cousins which was not possible using the existing methods. We also show in the 1000 genomes data with cryptic relationships that our method can detect these individuals. © 2014 The Author. Published by Oxford University Press. All rights reserved.

Figures

  • Fig. 1. In traditional encryption and decryption protocol, each individual generates two codes using the key generation process. The public key (Pk) is accessible by every one, and the private key (Sk) should be kept secret. In order to send a secure message to a sender we will use the public key available by the sender to encode the message. Then, the receiver will use the secret key (private), which was generated for the sender with the public key in the key generation process, to decrypt the message as shown in panel (A). The Fuzzy extractor is similar to traditional encryption and decryption protocol with one major difference, that the private key to decrypt the encrypted message has to be close to the original private key, which was generated in key generation process, and not necessary the same key as shown in panel (B)
  • Fig. 2. There exists a clear separation between the related and unrelated individuals. We use the LWK population from the 1000 genomes data as the founder and we use the cut-off of 25 390 segments to distinguish the related and unrelated individuals
  • Fig. 3. The histogram of the number of matched segments between different individuals in the simulated data. We used the set of unrelated individuals in the LWK population from the 1000 genomes data as the founder. Panel (A) indicates our method which uses the rare variants to detect the relativeness between the different individuals and panel (B) indicates the result of the method proposed by He et al. (2013). Thus, utilizing the rare variants, we can detect up to fifth-degree cousin as opposed to the third-degree cousin
  • Fig. 4. The histogram of the number of matched segments between different individuals in the 1000 genomes data. We used the ASW and LWK populations. For each pair of individuals we count the number of segments that are exactly match. We can use a cut-off of 25390 segments to distinguish between the related and unrelated individuals in this dataset

References Powered by Scopus

This article is free to access.

This article is free to access.

This article is free to access.

Cited by Powered by Scopus

Privacy in the genomic era

187Citations
235Readers
Get full text

An efficient toolkit for computing private set operations

52Citations
23Readers
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Hormozdiari, F., Joo, J. W. J., Wadia, A., Guan, F., Ostrosky, R., Sahai, A., & Eskin, E. (2014). Privacy preserving protocol for detecting genetic relatives using rare variants. Bioinformatics, 30(12). https://doi.org/10.1093/bioinformatics/btu294

Readers over time

‘14‘15‘16‘17‘18‘19‘20‘21‘22‘23036912

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 15

52%

Researcher 8

28%

Professor / Associate Prof. 5

17%

Lecturer / Post doc 1

3%

Readers' Discipline

Tooltip

Computer Science 13

46%

Agricultural and Biological Sciences 9

32%

Biochemistry, Genetics and Molecular Bi... 5

18%

Arts and Humanities 1

4%

Save time finding and organizing research with Mendeley

Sign up for free
0