SlideShare a Scribd company logo
1 of 14
Download to read offline
Bioinformatics Literature Review
Protecting DNA Sequence Anonymity with Generalization Lattices
(Malin, 2005)
Literature Review by Kato Mivule
COSC891 – Bioinformatics, Spring 2014
Bowie State University
Reference: Bradley. A. Malin, "Protecting genomic sequence anonymity with generalization lattices.", Methods of
information in medicine, Vol. 44, No. 5. (2005), pp. 687-692
Bowie State University Department of Computer Science
Image Source: U.S. National Library of Medicine
Outline
• The Problem
• Methodology
• Conclusion and Future work
Bowie State University Department of Computer Science
Bioinformatics Literature Review
The Problem
• Transactions in DNA data poses serious privacy concerns.
• DNA uniquely identifies an individual.
• DNA data is prone to re-identification and inference attacks.
Bowie State University Department of Computer Science
Bioinformatics Literature Review
The Problem:
Bowie State University Department of Computer Science
Bioinformatics Literature Review
Source: Forbes.com - April 25th 2013
Methodology
• Apply k-Anonymity
• Apply Generalization
• Apply the concept of generalization lattice to determine the distance between
two residues in a single nucleotide region, which offers the most similar
generalized concept for two residues – for example adenine and guanine are
both purines.
• DNALA – using k-anonymity by granting that the DNA sequence of one
individual will be similar to the DNA sequence of another individual.
Bowie State University Department of Computer Science
Bioinformatics Literature Review
Methodology
• k-anonymity
• K-anonymity uses both generalization and suppression to enforce
confidentiality.
• K-anonymity requires that for a data set with quasi-identifier attributes in a
database to be published, values in the quasi-identifier attributes must be
repeated at least k times to ensure privacy, with the value of k > 1.
• Because of the generalization and suppression features, k-anonymity is
applicable for DNA data privacy.
Bowie State University Department of Computer Science
Bioinformatics Literature Review
Methodology
Generalization
• Generalization is a data privacy method in which values in attributes that
could cause identify disclosure are made less informative by being replaced
with general values.
• An example is replacing age values of people born between 1970 and 1979 to
just 1970.
• Generalization follows the Domain Generalization Hierarchy (DGH), which
is different levels of generalization. For example we could use L1 =1970-09
and generalize to the month, L2 = 1970, generalize to the year, L3 = 197*
generalize to the decade.
Bowie State University Department of Computer Science
Bioinformatics Literature Review
Methodology
DNALA – DNA Lattice Anonymization
• Employs k-anonymity for data privacy
• The technique safeguards privacy by ensuring that the DNA sequence of one
individual will be precisely the same as the sequence of one other individual
in the published data set.
• When an institution publishes DNA sequence data using DNALA technique,
the uniqueness of every DNA sequence is assured to be inseparable from at
least k – 1 other identities.
Bowie State University Department of Computer Science
Bioinformatics Literature Review
Methodology
DNA Domain Generalization Hierarchy
Bowie State University Department of Computer Science
Bioinformatics Literature Review
Image source: Malin, (2005)
Methodology
DNA Domain Generalization Hierarchy
Bowie State University Department of Computer Science
Bioinformatics Literature Review
Image source: Malin, (2005)
Methodology
DNA Domain Generalization Hierarchy
Bowie State University Department of Computer Science
Bioinformatics Literature Review
Image source: Malin, (2005)
Methodology
DNALA Algorithm
Bowie State University Department of Computer Science
Bioinformatics Literature Review
Image source: Malin, (2005)
Conclusion and Future works
•DNA data privacy using k-anonymity is still promising.
•Data utility remains a challenge as more DNA sequence info gets generalized.
•How do other algorithms such as noise addition, and differential privacy apply?
•Could we generate synthetic and or obfuscated DNA data with similar traits as the
original?
Bowie State University Department of Computer Science
Bioinformatics Literature Review
References
1. Bradley. A. Malin, "Protecting genomic sequence anonymity with generalization lattices.", Methods
of information in medicine, Vol. 44, No. 5. (2005), pp. 687-692
2. K. Mivule and C. Turner, “Applying Data Privacy Techniques on Published Data in Uganda,” in
International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-
Government (EEE), 2012, pp. 110–115.
3. Adam Tanner, Forbes.com "Harvard Professor Re-Identifies Anonymous Volunteers In DNA
Study", Forbes.com, 4/25/2013, Accessed: 02/10/2014, Available Online:
http://www.forbes.com/sites/adamtanner/2013/04/25/harvard-professor-re-identifies-anonymous-
volunteers-in-dna-study/
Bowie State University Department of Computer Science
Bioinformatics Literature Review

More Related Content

What's hot

Internet and Bioinformatics for Biologists
Internet and Bioinformatics for BiologistsInternet and Bioinformatics for Biologists
Internet and Bioinformatics for BiologistsDr Mehul Dave
 
Next-Gen Taxonomic Descriptions for Microbial Eukaryotes
Next-Gen Taxonomic Descriptions for Microbial EukaryotesNext-Gen Taxonomic Descriptions for Microbial Eukaryotes
Next-Gen Taxonomic Descriptions for Microbial EukaryotesAnne Thessen
 
Technology R&D Theme 2: From Descriptive to Predictive Networks
Technology R&D Theme 2: From Descriptive to Predictive NetworksTechnology R&D Theme 2: From Descriptive to Predictive Networks
Technology R&D Theme 2: From Descriptive to Predictive NetworksAlexander Pico
 
Gene association networks - Large-scale integration of data and text
Gene association networks - Large-scale integration of data and textGene association networks - Large-scale integration of data and text
Gene association networks - Large-scale integration of data and textLars Juhl Jensen
 
Human genome project the mitre corporation - jason program office
Human genome project   the mitre corporation - jason program officeHuman genome project   the mitre corporation - jason program office
Human genome project the mitre corporation - jason program officePublicLeaker
 
Systems biology: Large-scale biomedical data mining
Systems biology: Large-scale biomedical data miningSystems biology: Large-scale biomedical data mining
Systems biology: Large-scale biomedical data miningLars Juhl Jensen
 
20170128_Resume_Engineering
20170128_Resume_Engineering20170128_Resume_Engineering
20170128_Resume_EngineeringAaron Tan
 
Bioinformatics Meets Information Retrieval: State of the Art and a Case Study
Bioinformatics Meets Information Retrieval: State of the Art and a Case StudyBioinformatics Meets Information Retrieval: State of the Art and a Case Study
Bioinformatics Meets Information Retrieval: State of the Art and a Case StudyEloisa Vargiu
 
Ontology-based services for querying and mining plant genomic and phenomic data
Ontology-based services for querying and mining plant genomic and phenomic dataOntology-based services for querying and mining plant genomic and phenomic data
Ontology-based services for querying and mining plant genomic and phenomic dataNathan Dunn
 
Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...
Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...
Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...sanaullah noonari
 
Greene Bosc2008
Greene Bosc2008Greene Bosc2008
Greene Bosc2008bosc_2008
 
Role of Bioinformatics in Cancer Research
Role of Bioinformatics in Cancer Research Role of Bioinformatics in Cancer Research
Role of Bioinformatics in Cancer Research Akash Arora
 
CV-Smith-2015-Updated-2
CV-Smith-2015-Updated-2CV-Smith-2015-Updated-2
CV-Smith-2015-Updated-2Jeff Smith
 

What's hot (16)

Internet and Bioinformatics for Biologists
Internet and Bioinformatics for BiologistsInternet and Bioinformatics for Biologists
Internet and Bioinformatics for Biologists
 
Next-Gen Taxonomic Descriptions for Microbial Eukaryotes
Next-Gen Taxonomic Descriptions for Microbial EukaryotesNext-Gen Taxonomic Descriptions for Microbial Eukaryotes
Next-Gen Taxonomic Descriptions for Microbial Eukaryotes
 
Technology R&D Theme 2: From Descriptive to Predictive Networks
Technology R&D Theme 2: From Descriptive to Predictive NetworksTechnology R&D Theme 2: From Descriptive to Predictive Networks
Technology R&D Theme 2: From Descriptive to Predictive Networks
 
Gene association networks - Large-scale integration of data and text
Gene association networks - Large-scale integration of data and textGene association networks - Large-scale integration of data and text
Gene association networks - Large-scale integration of data and text
 
resume
resumeresume
resume
 
Human genome project the mitre corporation - jason program office
Human genome project   the mitre corporation - jason program officeHuman genome project   the mitre corporation - jason program office
Human genome project the mitre corporation - jason program office
 
DanVanattaCV
DanVanattaCVDanVanattaCV
DanVanattaCV
 
Systems biology: Large-scale biomedical data mining
Systems biology: Large-scale biomedical data miningSystems biology: Large-scale biomedical data mining
Systems biology: Large-scale biomedical data mining
 
20170128_Resume_Engineering
20170128_Resume_Engineering20170128_Resume_Engineering
20170128_Resume_Engineering
 
BTIS
BTISBTIS
BTIS
 
Bioinformatics Meets Information Retrieval: State of the Art and a Case Study
Bioinformatics Meets Information Retrieval: State of the Art and a Case StudyBioinformatics Meets Information Retrieval: State of the Art and a Case Study
Bioinformatics Meets Information Retrieval: State of the Art and a Case Study
 
Ontology-based services for querying and mining plant genomic and phenomic data
Ontology-based services for querying and mining plant genomic and phenomic dataOntology-based services for querying and mining plant genomic and phenomic data
Ontology-based services for querying and mining plant genomic and phenomic data
 
Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...
Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...
Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...
 
Greene Bosc2008
Greene Bosc2008Greene Bosc2008
Greene Bosc2008
 
Role of Bioinformatics in Cancer Research
Role of Bioinformatics in Cancer Research Role of Bioinformatics in Cancer Research
Role of Bioinformatics in Cancer Research
 
CV-Smith-2015-Updated-2
CV-Smith-2015-Updated-2CV-Smith-2015-Updated-2
CV-Smith-2015-Updated-2
 

Viewers also liked

Earth Sciences 4490: Getting Started on your Literature Review
Earth Sciences 4490: Getting Started on your Literature ReviewEarth Sciences 4490: Getting Started on your Literature Review
Earth Sciences 4490: Getting Started on your Literature Reviewdansich
 
2012 the literature review_industrial_systemsengineering
2012 the literature review_industrial_systemsengineering2012 the literature review_industrial_systemsengineering
2012 the literature review_industrial_systemsengineeringpalfordtamu
 
A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization Kato Mivule
 
Literature_Review_Khan_Adnan
Literature_Review_Khan_AdnanLiterature_Review_Khan_Adnan
Literature_Review_Khan_AdnanAdnan Khan
 
Crafting the literature review
Crafting the literature reviewCrafting the literature review
Crafting the literature reviewAhmed Hamdy
 
A guide to writing the dissertation literature review
A guide to writing the dissertation literature reviewA guide to writing the dissertation literature review
A guide to writing the dissertation literature reviewEducation At The Edge
 
1 literature review workshop-khalid
1 literature review workshop-khalid1 literature review workshop-khalid
1 literature review workshop-khalidKhalid Mahmood
 
Literature Review Worksheet
Literature Review WorksheetLiterature Review Worksheet
Literature Review WorksheetSam Landfried
 
Introduction to Systematic Literature Review method
Introduction to Systematic Literature Review methodIntroduction to Systematic Literature Review method
Introduction to Systematic Literature Review methodNorsaremah Salleh
 
Literature Review: Managing Information Overflow: MindMapping, Citation Mappi...
Literature Review: Managing Information Overflow: MindMapping, Citation Mappi...Literature Review: Managing Information Overflow: MindMapping, Citation Mappi...
Literature Review: Managing Information Overflow: MindMapping, Citation Mappi...Umm Al-Qura University Faculty of Dentistry
 
Writing research paper khalid
Writing research paper khalidWriting research paper khalid
Writing research paper khalidKhalid Mahmood
 
Literature review for a dissertation: a step-by-step guide
Literature review for a dissertation: a step-by-step guideLiterature review for a dissertation: a step-by-step guide
Literature review for a dissertation: a step-by-step guideOlga Koz, DM, MLS
 
6 writing and presenting literature review-khalid
6 writing and presenting literature review-khalid6 writing and presenting literature review-khalid
6 writing and presenting literature review-khalidKhalid Mahmood
 
The literature review
The literature reviewThe literature review
The literature reviewBarryCRNA
 
Sample literature review
Sample literature reviewSample literature review
Sample literature reviewcocolatto
 
Literature review in research
Literature review in researchLiterature review in research
Literature review in researchNursing Path
 
Literature Review (Review of Related Literature - Research Methodology)
Literature Review (Review of Related Literature - Research Methodology)Literature Review (Review of Related Literature - Research Methodology)
Literature Review (Review of Related Literature - Research Methodology)Dilip Barad
 

Viewers also liked (20)

Earth Sciences 4490: Getting Started on your Literature Review
Earth Sciences 4490: Getting Started on your Literature ReviewEarth Sciences 4490: Getting Started on your Literature Review
Earth Sciences 4490: Getting Started on your Literature Review
 
2012 the literature review_industrial_systemsengineering
2012 the literature review_industrial_systemsengineering2012 the literature review_industrial_systemsengineering
2012 the literature review_industrial_systemsengineering
 
A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization
 
Literature_Review_Khan_Adnan
Literature_Review_Khan_AdnanLiterature_Review_Khan_Adnan
Literature_Review_Khan_Adnan
 
Crafting the literature review
Crafting the literature reviewCrafting the literature review
Crafting the literature review
 
A guide to writing the dissertation literature review
A guide to writing the dissertation literature reviewA guide to writing the dissertation literature review
A guide to writing the dissertation literature review
 
Literature review and the PhD
Literature review and the PhDLiterature review and the PhD
Literature review and the PhD
 
1 literature review workshop-khalid
1 literature review workshop-khalid1 literature review workshop-khalid
1 literature review workshop-khalid
 
Literature Review Worksheet
Literature Review WorksheetLiterature Review Worksheet
Literature Review Worksheet
 
Introduction to Systematic Literature Review method
Introduction to Systematic Literature Review methodIntroduction to Systematic Literature Review method
Introduction to Systematic Literature Review method
 
Literature Review: Managing Information Overflow: MindMapping, Citation Mappi...
Literature Review: Managing Information Overflow: MindMapping, Citation Mappi...Literature Review: Managing Information Overflow: MindMapping, Citation Mappi...
Literature Review: Managing Information Overflow: MindMapping, Citation Mappi...
 
Literature Review SNS
Literature Review SNSLiterature Review SNS
Literature Review SNS
 
Writing research paper khalid
Writing research paper khalidWriting research paper khalid
Writing research paper khalid
 
Literature review for a dissertation: a step-by-step guide
Literature review for a dissertation: a step-by-step guideLiterature review for a dissertation: a step-by-step guide
Literature review for a dissertation: a step-by-step guide
 
6 writing and presenting literature review-khalid
6 writing and presenting literature review-khalid6 writing and presenting literature review-khalid
6 writing and presenting literature review-khalid
 
The literature review
The literature reviewThe literature review
The literature review
 
Sample literature review
Sample literature reviewSample literature review
Sample literature review
 
Doing a Literature Review
Doing a Literature ReviewDoing a Literature Review
Doing a Literature Review
 
Literature review in research
Literature review in researchLiterature review in research
Literature review in research
 
Literature Review (Review of Related Literature - Research Methodology)
Literature Review (Review of Related Literature - Research Methodology)Literature Review (Review of Related Literature - Research Methodology)
Literature Review (Review of Related Literature - Research Methodology)
 

Similar to Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Generalization Lattices (Malin, 2005)

An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...Kato Mivule
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeKato Mivule
 
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...Kato Mivule
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EITESANGO
 
Boosting probabilistic graphical model inference by incorporating prior knowl...
Boosting probabilistic graphical model inference by incorporating prior knowl...Boosting probabilistic graphical model inference by incorporating prior knowl...
Boosting probabilistic graphical model inference by incorporating prior knowl...Hakky St
 
Genome data management
Genome data managementGenome data management
Genome data managementShareb Ismaeel
 
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data PrivacyA Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data PrivacyKato Mivule
 
Introduction to Bioinformatics.
 Introduction to Bioinformatics. Introduction to Bioinformatics.
Introduction to Bioinformatics.Elena Sügis
 
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...Kato Mivule
 
Will Biomedical Research Fundamentally Change in the Era of Big Data?
Will Biomedical Research Fundamentally Change in the Era of Big Data?Will Biomedical Research Fundamentally Change in the Era of Big Data?
Will Biomedical Research Fundamentally Change in the Era of Big Data?Philip Bourne
 
NetBioSIG2014-Talk by Tijana Milenkovic
NetBioSIG2014-Talk by Tijana MilenkovicNetBioSIG2014-Talk by Tijana Milenkovic
NetBioSIG2014-Talk by Tijana MilenkovicAlexander Pico
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...Kato Mivule
 
Accomplishments And Challenges In Bioinformatics
Accomplishments And Challenges In BioinformaticsAccomplishments And Challenges In Bioinformatics
Accomplishments And Challenges In BioinformaticsDereck Downing
 
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Kato Mivule
 
Biomedical Clusters, Clouds and Commons - DePaul Colloquium Oct 24, 2014
Biomedical Clusters, Clouds and Commons - DePaul Colloquium Oct 24, 2014Biomedical Clusters, Clouds and Commons - DePaul Colloquium Oct 24, 2014
Biomedical Clusters, Clouds and Commons - DePaul Colloquium Oct 24, 2014Robert Grossman
 
DNA Query Language DNAQL: A Novel Approach
DNA Query Language DNAQL: A Novel ApproachDNA Query Language DNAQL: A Novel Approach
DNA Query Language DNAQL: A Novel ApproachEditor IJCATR
 
Highlights from NIH Data Science
Highlights from NIH Data ScienceHighlights from NIH Data Science
Highlights from NIH Data SciencePhilip Bourne
 
EBI Industry programme TCGA Warren KIbbe November 2013
EBI Industry programme TCGA Warren KIbbe November 2013EBI Industry programme TCGA Warren KIbbe November 2013
EBI Industry programme TCGA Warren KIbbe November 2013Warren Kibbe
 
There is No Intelligent Life Down Here
There is No Intelligent Life Down HereThere is No Intelligent Life Down Here
There is No Intelligent Life Down HerePhilip Bourne
 
Data Harmonization for a Molecularly Driven Health System
Data Harmonization for a Molecularly Driven Health SystemData Harmonization for a Molecularly Driven Health System
Data Harmonization for a Molecularly Driven Health SystemWarren Kibbe
 

Similar to Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Generalization Lattices (Malin, 2005) (20)

An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
 
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
 
Boosting probabilistic graphical model inference by incorporating prior knowl...
Boosting probabilistic graphical model inference by incorporating prior knowl...Boosting probabilistic graphical model inference by incorporating prior knowl...
Boosting probabilistic graphical model inference by incorporating prior knowl...
 
Genome data management
Genome data managementGenome data management
Genome data management
 
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data PrivacyA Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
 
Introduction to Bioinformatics.
 Introduction to Bioinformatics. Introduction to Bioinformatics.
Introduction to Bioinformatics.
 
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
 
Will Biomedical Research Fundamentally Change in the Era of Big Data?
Will Biomedical Research Fundamentally Change in the Era of Big Data?Will Biomedical Research Fundamentally Change in the Era of Big Data?
Will Biomedical Research Fundamentally Change in the Era of Big Data?
 
NetBioSIG2014-Talk by Tijana Milenkovic
NetBioSIG2014-Talk by Tijana MilenkovicNetBioSIG2014-Talk by Tijana Milenkovic
NetBioSIG2014-Talk by Tijana Milenkovic
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
 
Accomplishments And Challenges In Bioinformatics
Accomplishments And Challenges In BioinformaticsAccomplishments And Challenges In Bioinformatics
Accomplishments And Challenges In Bioinformatics
 
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
 
Biomedical Clusters, Clouds and Commons - DePaul Colloquium Oct 24, 2014
Biomedical Clusters, Clouds and Commons - DePaul Colloquium Oct 24, 2014Biomedical Clusters, Clouds and Commons - DePaul Colloquium Oct 24, 2014
Biomedical Clusters, Clouds and Commons - DePaul Colloquium Oct 24, 2014
 
DNA Query Language DNAQL: A Novel Approach
DNA Query Language DNAQL: A Novel ApproachDNA Query Language DNAQL: A Novel Approach
DNA Query Language DNAQL: A Novel Approach
 
Highlights from NIH Data Science
Highlights from NIH Data ScienceHighlights from NIH Data Science
Highlights from NIH Data Science
 
EBI Industry programme TCGA Warren KIbbe November 2013
EBI Industry programme TCGA Warren KIbbe November 2013EBI Industry programme TCGA Warren KIbbe November 2013
EBI Industry programme TCGA Warren KIbbe November 2013
 
There is No Intelligent Life Down Here
There is No Intelligent Life Down HereThere is No Intelligent Life Down Here
There is No Intelligent Life Down Here
 
Data Harmonization for a Molecularly Driven Health System
Data Harmonization for a Molecularly Driven Health SystemData Harmonization for a Molecularly Driven Health System
Data Harmonization for a Molecularly Driven Health System
 

More from Kato Mivule

Cancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A TutorialCancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A TutorialKato Mivule
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...Kato Mivule
 
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...Kato Mivule
 
Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Kato Mivule
 
Applying Data Privacy Techniques on Published Data in Uganda
 Applying Data Privacy Techniques on Published Data in Uganda Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in UgandaKato Mivule
 
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an OverviewKato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an OverviewKato Mivule
 
Kato Mivule - Towards Agent-based Data Privacy Engineering
Kato Mivule - Towards Agent-based Data Privacy EngineeringKato Mivule - Towards Agent-based Data Privacy Engineering
Kato Mivule - Towards Agent-based Data Privacy EngineeringKato Mivule
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeKato Mivule
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeKato Mivule
 
Kato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance ComputingKato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance ComputingKato Mivule
 
Kato Mivule: An Overview of Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of  Adaptive Boosting – AdaBoostKato Mivule: An Overview of  Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of Adaptive Boosting – AdaBoostKato Mivule
 
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule
 
Towards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning ClassifierTowards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning ClassifierKato Mivule
 
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...Kato Mivule
 
Two Pseudo-random Number Generators, an Overview
Two Pseudo-random Number Generators, an Overview Two Pseudo-random Number Generators, an Overview
Two Pseudo-random Number Generators, an Overview Kato Mivule
 
Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in UgandaApplying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in UgandaKato Mivule
 
Utilizing Noise Addition For Data Privacy, an Overview
Utilizing Noise Addition For Data Privacy, an OverviewUtilizing Noise Addition For Data Privacy, an Overview
Utilizing Noise Addition For Data Privacy, an OverviewKato Mivule
 

More from Kato Mivule (17)

Cancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A TutorialCancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A Tutorial
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
 
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
 
Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...
 
Applying Data Privacy Techniques on Published Data in Uganda
 Applying Data Privacy Techniques on Published Data in Uganda Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in Uganda
 
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an OverviewKato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
 
Kato Mivule - Towards Agent-based Data Privacy Engineering
Kato Mivule - Towards Agent-based Data Privacy EngineeringKato Mivule - Towards Agent-based Data Privacy Engineering
Kato Mivule - Towards Agent-based Data Privacy Engineering
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
 
Kato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance ComputingKato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance Computing
 
Kato Mivule: An Overview of Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of  Adaptive Boosting – AdaBoostKato Mivule: An Overview of  Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of Adaptive Boosting – AdaBoost
 
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
 
Towards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning ClassifierTowards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning Classifier
 
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...
 
Two Pseudo-random Number Generators, an Overview
Two Pseudo-random Number Generators, an Overview Two Pseudo-random Number Generators, an Overview
Two Pseudo-random Number Generators, an Overview
 
Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in UgandaApplying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in Uganda
 
Utilizing Noise Addition For Data Privacy, an Overview
Utilizing Noise Addition For Data Privacy, an OverviewUtilizing Noise Addition For Data Privacy, an Overview
Utilizing Noise Addition For Data Privacy, an Overview
 

Recently uploaded

VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysismanisha194592
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxolyaivanovalion
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxfirstjob4
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusTimothy Spann
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 

Recently uploaded (20)

VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptx
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 

Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Generalization Lattices (Malin, 2005)

  • 1. Bioinformatics Literature Review Protecting DNA Sequence Anonymity with Generalization Lattices (Malin, 2005) Literature Review by Kato Mivule COSC891 – Bioinformatics, Spring 2014 Bowie State University Reference: Bradley. A. Malin, "Protecting genomic sequence anonymity with generalization lattices.", Methods of information in medicine, Vol. 44, No. 5. (2005), pp. 687-692 Bowie State University Department of Computer Science Image Source: U.S. National Library of Medicine
  • 2. Outline • The Problem • Methodology • Conclusion and Future work Bowie State University Department of Computer Science Bioinformatics Literature Review
  • 3. The Problem • Transactions in DNA data poses serious privacy concerns. • DNA uniquely identifies an individual. • DNA data is prone to re-identification and inference attacks. Bowie State University Department of Computer Science Bioinformatics Literature Review
  • 4. The Problem: Bowie State University Department of Computer Science Bioinformatics Literature Review Source: Forbes.com - April 25th 2013
  • 5. Methodology • Apply k-Anonymity • Apply Generalization • Apply the concept of generalization lattice to determine the distance between two residues in a single nucleotide region, which offers the most similar generalized concept for two residues – for example adenine and guanine are both purines. • DNALA – using k-anonymity by granting that the DNA sequence of one individual will be similar to the DNA sequence of another individual. Bowie State University Department of Computer Science Bioinformatics Literature Review
  • 6. Methodology • k-anonymity • K-anonymity uses both generalization and suppression to enforce confidentiality. • K-anonymity requires that for a data set with quasi-identifier attributes in a database to be published, values in the quasi-identifier attributes must be repeated at least k times to ensure privacy, with the value of k > 1. • Because of the generalization and suppression features, k-anonymity is applicable for DNA data privacy. Bowie State University Department of Computer Science Bioinformatics Literature Review
  • 7. Methodology Generalization • Generalization is a data privacy method in which values in attributes that could cause identify disclosure are made less informative by being replaced with general values. • An example is replacing age values of people born between 1970 and 1979 to just 1970. • Generalization follows the Domain Generalization Hierarchy (DGH), which is different levels of generalization. For example we could use L1 =1970-09 and generalize to the month, L2 = 1970, generalize to the year, L3 = 197* generalize to the decade. Bowie State University Department of Computer Science Bioinformatics Literature Review
  • 8. Methodology DNALA – DNA Lattice Anonymization • Employs k-anonymity for data privacy • The technique safeguards privacy by ensuring that the DNA sequence of one individual will be precisely the same as the sequence of one other individual in the published data set. • When an institution publishes DNA sequence data using DNALA technique, the uniqueness of every DNA sequence is assured to be inseparable from at least k – 1 other identities. Bowie State University Department of Computer Science Bioinformatics Literature Review
  • 9. Methodology DNA Domain Generalization Hierarchy Bowie State University Department of Computer Science Bioinformatics Literature Review Image source: Malin, (2005)
  • 10. Methodology DNA Domain Generalization Hierarchy Bowie State University Department of Computer Science Bioinformatics Literature Review Image source: Malin, (2005)
  • 11. Methodology DNA Domain Generalization Hierarchy Bowie State University Department of Computer Science Bioinformatics Literature Review Image source: Malin, (2005)
  • 12. Methodology DNALA Algorithm Bowie State University Department of Computer Science Bioinformatics Literature Review Image source: Malin, (2005)
  • 13. Conclusion and Future works •DNA data privacy using k-anonymity is still promising. •Data utility remains a challenge as more DNA sequence info gets generalized. •How do other algorithms such as noise addition, and differential privacy apply? •Could we generate synthetic and or obfuscated DNA data with similar traits as the original? Bowie State University Department of Computer Science Bioinformatics Literature Review
  • 14. References 1. Bradley. A. Malin, "Protecting genomic sequence anonymity with generalization lattices.", Methods of information in medicine, Vol. 44, No. 5. (2005), pp. 687-692 2. K. Mivule and C. Turner, “Applying Data Privacy Techniques on Published Data in Uganda,” in International Conference on e-Learning, e-Business, Enterprise Information Systems, and e- Government (EEE), 2012, pp. 110–115. 3. Adam Tanner, Forbes.com "Harvard Professor Re-Identifies Anonymous Volunteers In DNA Study", Forbes.com, 4/25/2013, Accessed: 02/10/2014, Available Online: http://www.forbes.com/sites/adamtanner/2013/04/25/harvard-professor-re-identifies-anonymous- volunteers-in-dna-study/ Bowie State University Department of Computer Science Bioinformatics Literature Review