Identifying genetic relatives without compromising privacy

Dan He, Nicholas A. Furlotte, Farhad Hormozdiari, Jong Wha J. Joo, Akshay Wadia, Rafail Ostrovsky, Amit Sahai, Eleazar Eskin

Research output: Contribution to journalArticlepeer-review

28 Scopus citations

Abstract

The development of high-throughput genomic technologies has impacted many areas of genetic research. While many applications of these technologies focus on the discovery of genes involved in disease from population samples, applications of genomic technologies to an individual's genome or personal genomics have recently gained much interest. One such application is the identification of relatives from genetic data. In this application, genetic information from a set of individuals is collected in a database, and each pair of individuals is compared in order to identify genetic relatives. An inherent issue that arises in the identification of relatives is privacy. In this article, we propose a method for identifying genetic relatives without compromising privacy by taking advantage of novel cryptographic techniques customized for secure and private comparison of genetic information. We demonstrate the utility of these techniques by allowing a pair of individuals to discover whether or not they are related without compromising their genetic information or revealing it to a third party. The idea is that individuals only share enough special-purpose cryptographically protected information with each other to identify whether or not they are relatives, but not enough to expose any information about their genomes. We show in HapMap and 1000 Genomes data that our method can recover first- and second-order genetic relationships and, through simulations, show that our method can identify relationships as distant as third cousins while preserving privacy.

Original languageEnglish
Pages (from-to)664-672
Number of pages9
JournalGenome Research
Volume24
Issue number4
DOIs
StatePublished - Apr 2014

Fingerprint

Dive into the research topics of 'Identifying genetic relatives without compromising privacy'. Together they form a unique fingerprint.

Cite this