SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
Bioinformatics Literature Review
Protecting DNA Sequence Anonymity with Generalization Lattices
(Malin, 2005)
Literature Review by Kato Mivule
COSC891 – Bioinformatics, Spring 2014
Bowie State University
Reference: Bradley. A. Malin, "Protecting genomic sequence anonymity with generalization lattices.", Methods of
information in medicine, Vol. 44, No. 5. (2005), pp. 687-692
Bowie State University Department of Computer Science
Image Source: U.S. National Library of Medicine
Outline
• The Problem
• Methodology
• Conclusion and Future work
Bowie State University Department of Computer Science
Bioinformatics Literature Review
The Problem
• Transactions in DNA data poses serious privacy concerns.
• DNA uniquely identifies an individual.
• DNA data is prone to re-identification and inference attacks.
Bowie State University Department of Computer Science
Bioinformatics Literature Review
The Problem:
Bowie State University Department of Computer Science
Bioinformatics Literature Review
Source: Forbes.com - April 25th 2013
Methodology
• Apply k-Anonymity
• Apply Generalization
• Apply the concept of generalization lattice to determine the distance between
two residues in a single nucleotide region, which offers the most similar
generalized concept for two residues – for example adenine and guanine are
both purines.
• DNALA – using k-anonymity by granting that the DNA sequence of one
individual will be similar to the DNA sequence of another individual.
Bowie State University Department of Computer Science
Bioinformatics Literature Review
Methodology
• k-anonymity
• K-anonymity uses both generalization and suppression to enforce
confidentiality.
• K-anonymity requires that for a data set with quasi-identifier attributes in a
database to be published, values in the quasi-identifier attributes must be
repeated at least k times to ensure privacy, with the value of k > 1.
• Because of the generalization and suppression features, k-anonymity is
applicable for DNA data privacy.
Bowie State University Department of Computer Science
Bioinformatics Literature Review
Methodology
Generalization
• Generalization is a data privacy method in which values in attributes that
could cause identify disclosure are made less informative by being replaced
with general values.
• An example is replacing age values of people born between 1970 and 1979 to
just 1970.
• Generalization follows the Domain Generalization Hierarchy (DGH), which
is different levels of generalization. For example we could use L1 =1970-09
and generalize to the month, L2 = 1970, generalize to the year, L3 = 197*
generalize to the decade.
Bowie State University Department of Computer Science
Bioinformatics Literature Review
Methodology
DNALA – DNA Lattice Anonymization
• Employs k-anonymity for data privacy
• The technique safeguards privacy by ensuring that the DNA sequence of one
individual will be precisely the same as the sequence of one other individual
in the published data set.
• When an institution publishes DNA sequence data using DNALA technique,
the uniqueness of every DNA sequence is assured to be inseparable from at
least k – 1 other identities.
Bowie State University Department of Computer Science
Bioinformatics Literature Review
Methodology
DNA Domain Generalization Hierarchy
Bowie State University Department of Computer Science
Bioinformatics Literature Review
Image source: Malin, (2005)
Methodology
DNA Domain Generalization Hierarchy
Bowie State University Department of Computer Science
Bioinformatics Literature Review
Image source: Malin, (2005)
Methodology
DNA Domain Generalization Hierarchy
Bowie State University Department of Computer Science
Bioinformatics Literature Review
Image source: Malin, (2005)
Methodology
DNALA Algorithm
Bowie State University Department of Computer Science
Bioinformatics Literature Review
Image source: Malin, (2005)
Conclusion and Future works
•DNA data privacy using k-anonymity is still promising.
•Data utility remains a challenge as more DNA sequence info gets generalized.
•How do other algorithms such as noise addition, and differential privacy apply?
•Could we generate synthetic and or obfuscated DNA data with similar traits as the
original?
Bowie State University Department of Computer Science
Bioinformatics Literature Review
References
1. Bradley. A. Malin, "Protecting genomic sequence anonymity with generalization lattices.", Methods
of information in medicine, Vol. 44, No. 5. (2005), pp. 687-692
2. K. Mivule and C. Turner, “Applying Data Privacy Techniques on Published Data in Uganda,” in
International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-
Government (EEE), 2012, pp. 110–115.
3. Adam Tanner, Forbes.com "Harvard Professor Re-Identifies Anonymous Volunteers In DNA
Study", Forbes.com, 4/25/2013, Accessed: 02/10/2014, Available Online:
http://www.forbes.com/sites/adamtanner/2013/04/25/harvard-professor-re-identifies-anonymous-
volunteers-in-dna-study/
Bowie State University Department of Computer Science
Bioinformatics Literature Review

Contenu connexe

Tendances

Internet and Bioinformatics for Biologists
Internet and Bioinformatics for BiologistsInternet and Bioinformatics for Biologists
Internet and Bioinformatics for BiologistsDr Mehul Dave
 
Next-Gen Taxonomic Descriptions for Microbial Eukaryotes
Next-Gen Taxonomic Descriptions for Microbial EukaryotesNext-Gen Taxonomic Descriptions for Microbial Eukaryotes
Next-Gen Taxonomic Descriptions for Microbial EukaryotesAnne Thessen
 
Technology R&D Theme 2: From Descriptive to Predictive Networks
Technology R&D Theme 2: From Descriptive to Predictive NetworksTechnology R&D Theme 2: From Descriptive to Predictive Networks
Technology R&D Theme 2: From Descriptive to Predictive NetworksAlexander Pico
 
Gene association networks - Large-scale integration of data and text
Gene association networks - Large-scale integration of data and textGene association networks - Large-scale integration of data and text
Gene association networks - Large-scale integration of data and textLars Juhl Jensen
 
Human genome project the mitre corporation - jason program office
Human genome project   the mitre corporation - jason program officeHuman genome project   the mitre corporation - jason program office
Human genome project the mitre corporation - jason program officePublicLeaker
 
Systems biology: Large-scale biomedical data mining
Systems biology: Large-scale biomedical data miningSystems biology: Large-scale biomedical data mining
Systems biology: Large-scale biomedical data miningLars Juhl Jensen
 
20170128_Resume_Engineering
20170128_Resume_Engineering20170128_Resume_Engineering
20170128_Resume_EngineeringAaron Tan
 
Bioinformatics Meets Information Retrieval: State of the Art and a Case Study
Bioinformatics Meets Information Retrieval: State of the Art and a Case StudyBioinformatics Meets Information Retrieval: State of the Art and a Case Study
Bioinformatics Meets Information Retrieval: State of the Art and a Case StudyEloisa Vargiu
 
Ontology-based services for querying and mining plant genomic and phenomic data
Ontology-based services for querying and mining plant genomic and phenomic dataOntology-based services for querying and mining plant genomic and phenomic data
Ontology-based services for querying and mining plant genomic and phenomic dataNathan Dunn
 
Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...
Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...
Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...sanaullah noonari
 
Greene Bosc2008
Greene Bosc2008Greene Bosc2008
Greene Bosc2008bosc_2008
 
Role of Bioinformatics in Cancer Research
Role of Bioinformatics in Cancer Research Role of Bioinformatics in Cancer Research
Role of Bioinformatics in Cancer Research Akash Arora
 
CV-Smith-2015-Updated-2
CV-Smith-2015-Updated-2CV-Smith-2015-Updated-2
CV-Smith-2015-Updated-2Jeff Smith
 

Tendances (16)

Internet and Bioinformatics for Biologists
Internet and Bioinformatics for BiologistsInternet and Bioinformatics for Biologists
Internet and Bioinformatics for Biologists
 
Next-Gen Taxonomic Descriptions for Microbial Eukaryotes
Next-Gen Taxonomic Descriptions for Microbial EukaryotesNext-Gen Taxonomic Descriptions for Microbial Eukaryotes
Next-Gen Taxonomic Descriptions for Microbial Eukaryotes
 
Technology R&D Theme 2: From Descriptive to Predictive Networks
Technology R&D Theme 2: From Descriptive to Predictive NetworksTechnology R&D Theme 2: From Descriptive to Predictive Networks
Technology R&D Theme 2: From Descriptive to Predictive Networks
 
Gene association networks - Large-scale integration of data and text
Gene association networks - Large-scale integration of data and textGene association networks - Large-scale integration of data and text
Gene association networks - Large-scale integration of data and text
 
resume
resumeresume
resume
 
Human genome project the mitre corporation - jason program office
Human genome project   the mitre corporation - jason program officeHuman genome project   the mitre corporation - jason program office
Human genome project the mitre corporation - jason program office
 
DanVanattaCV
DanVanattaCVDanVanattaCV
DanVanattaCV
 
Systems biology: Large-scale biomedical data mining
Systems biology: Large-scale biomedical data miningSystems biology: Large-scale biomedical data mining
Systems biology: Large-scale biomedical data mining
 
20170128_Resume_Engineering
20170128_Resume_Engineering20170128_Resume_Engineering
20170128_Resume_Engineering
 
BTIS
BTISBTIS
BTIS
 
Bioinformatics Meets Information Retrieval: State of the Art and a Case Study
Bioinformatics Meets Information Retrieval: State of the Art and a Case StudyBioinformatics Meets Information Retrieval: State of the Art and a Case Study
Bioinformatics Meets Information Retrieval: State of the Art and a Case Study
 
Ontology-based services for querying and mining plant genomic and phenomic data
Ontology-based services for querying and mining plant genomic and phenomic dataOntology-based services for querying and mining plant genomic and phenomic data
Ontology-based services for querying and mining plant genomic and phenomic data
 
Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...
Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...
Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...
 
Greene Bosc2008
Greene Bosc2008Greene Bosc2008
Greene Bosc2008
 
Role of Bioinformatics in Cancer Research
Role of Bioinformatics in Cancer Research Role of Bioinformatics in Cancer Research
Role of Bioinformatics in Cancer Research
 
CV-Smith-2015-Updated-2
CV-Smith-2015-Updated-2CV-Smith-2015-Updated-2
CV-Smith-2015-Updated-2
 

En vedette

Earth Sciences 4490: Getting Started on your Literature Review
Earth Sciences 4490: Getting Started on your Literature ReviewEarth Sciences 4490: Getting Started on your Literature Review
Earth Sciences 4490: Getting Started on your Literature Reviewdansich
 
2012 the literature review_industrial_systemsengineering
2012 the literature review_industrial_systemsengineering2012 the literature review_industrial_systemsengineering
2012 the literature review_industrial_systemsengineeringpalfordtamu
 
A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization Kato Mivule
 
Literature_Review_Khan_Adnan
Literature_Review_Khan_AdnanLiterature_Review_Khan_Adnan
Literature_Review_Khan_AdnanAdnan Khan
 
Crafting the literature review
Crafting the literature reviewCrafting the literature review
Crafting the literature reviewAhmed Hamdy
 
A guide to writing the dissertation literature review
A guide to writing the dissertation literature reviewA guide to writing the dissertation literature review
A guide to writing the dissertation literature reviewEducation At The Edge
 
1 literature review workshop-khalid
1 literature review workshop-khalid1 literature review workshop-khalid
1 literature review workshop-khalidKhalid Mahmood
 
Literature Review Worksheet
Literature Review WorksheetLiterature Review Worksheet
Literature Review WorksheetSam Landfried
 
Introduction to Systematic Literature Review method
Introduction to Systematic Literature Review methodIntroduction to Systematic Literature Review method
Introduction to Systematic Literature Review methodNorsaremah Salleh
 
Literature Review: Managing Information Overflow: MindMapping, Citation Mappi...
Literature Review: Managing Information Overflow: MindMapping, Citation Mappi...Literature Review: Managing Information Overflow: MindMapping, Citation Mappi...
Literature Review: Managing Information Overflow: MindMapping, Citation Mappi...Umm Al-Qura University Faculty of Dentistry
 
Writing research paper khalid
Writing research paper khalidWriting research paper khalid
Writing research paper khalidKhalid Mahmood
 
Literature review for a dissertation: a step-by-step guide
Literature review for a dissertation: a step-by-step guideLiterature review for a dissertation: a step-by-step guide
Literature review for a dissertation: a step-by-step guideOlga Koz, DM, MLS
 
6 writing and presenting literature review-khalid
6 writing and presenting literature review-khalid6 writing and presenting literature review-khalid
6 writing and presenting literature review-khalidKhalid Mahmood
 
The literature review
The literature reviewThe literature review
The literature reviewBarryCRNA
 
Sample literature review
Sample literature reviewSample literature review
Sample literature reviewcocolatto
 
Literature review in research
Literature review in researchLiterature review in research
Literature review in researchNursing Path
 
Literature Review (Review of Related Literature - Research Methodology)
Literature Review (Review of Related Literature - Research Methodology)Literature Review (Review of Related Literature - Research Methodology)
Literature Review (Review of Related Literature - Research Methodology)Dilip Barad
 

En vedette (20)

Earth Sciences 4490: Getting Started on your Literature Review
Earth Sciences 4490: Getting Started on your Literature ReviewEarth Sciences 4490: Getting Started on your Literature Review
Earth Sciences 4490: Getting Started on your Literature Review
 
2012 the literature review_industrial_systemsengineering
2012 the literature review_industrial_systemsengineering2012 the literature review_industrial_systemsengineering
2012 the literature review_industrial_systemsengineering
 
A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization
 
Literature_Review_Khan_Adnan
Literature_Review_Khan_AdnanLiterature_Review_Khan_Adnan
Literature_Review_Khan_Adnan
 
Crafting the literature review
Crafting the literature reviewCrafting the literature review
Crafting the literature review
 
A guide to writing the dissertation literature review
A guide to writing the dissertation literature reviewA guide to writing the dissertation literature review
A guide to writing the dissertation literature review
 
Literature review and the PhD
Literature review and the PhDLiterature review and the PhD
Literature review and the PhD
 
1 literature review workshop-khalid
1 literature review workshop-khalid1 literature review workshop-khalid
1 literature review workshop-khalid
 
Literature Review Worksheet
Literature Review WorksheetLiterature Review Worksheet
Literature Review Worksheet
 
Introduction to Systematic Literature Review method
Introduction to Systematic Literature Review methodIntroduction to Systematic Literature Review method
Introduction to Systematic Literature Review method
 
Literature Review: Managing Information Overflow: MindMapping, Citation Mappi...
Literature Review: Managing Information Overflow: MindMapping, Citation Mappi...Literature Review: Managing Information Overflow: MindMapping, Citation Mappi...
Literature Review: Managing Information Overflow: MindMapping, Citation Mappi...
 
Literature Review SNS
Literature Review SNSLiterature Review SNS
Literature Review SNS
 
Writing research paper khalid
Writing research paper khalidWriting research paper khalid
Writing research paper khalid
 
Literature review for a dissertation: a step-by-step guide
Literature review for a dissertation: a step-by-step guideLiterature review for a dissertation: a step-by-step guide
Literature review for a dissertation: a step-by-step guide
 
6 writing and presenting literature review-khalid
6 writing and presenting literature review-khalid6 writing and presenting literature review-khalid
6 writing and presenting literature review-khalid
 
The literature review
The literature reviewThe literature review
The literature review
 
Sample literature review
Sample literature reviewSample literature review
Sample literature review
 
Doing a Literature Review
Doing a Literature ReviewDoing a Literature Review
Doing a Literature Review
 
Literature review in research
Literature review in researchLiterature review in research
Literature review in research
 
Literature Review (Review of Related Literature - Research Methodology)
Literature Review (Review of Related Literature - Research Methodology)Literature Review (Review of Related Literature - Research Methodology)
Literature Review (Review of Related Literature - Research Methodology)
 

Similaire à Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Generalization Lattices (Malin, 2005)

An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...Kato Mivule
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeKato Mivule
 
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...Kato Mivule
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EITESANGO
 
Boosting probabilistic graphical model inference by incorporating prior knowl...
Boosting probabilistic graphical model inference by incorporating prior knowl...Boosting probabilistic graphical model inference by incorporating prior knowl...
Boosting probabilistic graphical model inference by incorporating prior knowl...Hakky St
 
Genome data management
Genome data managementGenome data management
Genome data managementShareb Ismaeel
 
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data PrivacyA Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data PrivacyKato Mivule
 
Introduction to Bioinformatics.
 Introduction to Bioinformatics. Introduction to Bioinformatics.
Introduction to Bioinformatics.Elena Sügis
 
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...Kato Mivule
 
Will Biomedical Research Fundamentally Change in the Era of Big Data?
Will Biomedical Research Fundamentally Change in the Era of Big Data?Will Biomedical Research Fundamentally Change in the Era of Big Data?
Will Biomedical Research Fundamentally Change in the Era of Big Data?Philip Bourne
 
NetBioSIG2014-Talk by Tijana Milenkovic
NetBioSIG2014-Talk by Tijana MilenkovicNetBioSIG2014-Talk by Tijana Milenkovic
NetBioSIG2014-Talk by Tijana MilenkovicAlexander Pico
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...Kato Mivule
 
Accomplishments And Challenges In Bioinformatics
Accomplishments And Challenges In BioinformaticsAccomplishments And Challenges In Bioinformatics
Accomplishments And Challenges In BioinformaticsDereck Downing
 
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Kato Mivule
 
Biomedical Clusters, Clouds and Commons - DePaul Colloquium Oct 24, 2014
Biomedical Clusters, Clouds and Commons - DePaul Colloquium Oct 24, 2014Biomedical Clusters, Clouds and Commons - DePaul Colloquium Oct 24, 2014
Biomedical Clusters, Clouds and Commons - DePaul Colloquium Oct 24, 2014Robert Grossman
 
DNA Query Language DNAQL: A Novel Approach
DNA Query Language DNAQL: A Novel ApproachDNA Query Language DNAQL: A Novel Approach
DNA Query Language DNAQL: A Novel ApproachEditor IJCATR
 
Highlights from NIH Data Science
Highlights from NIH Data ScienceHighlights from NIH Data Science
Highlights from NIH Data SciencePhilip Bourne
 
EBI Industry programme TCGA Warren KIbbe November 2013
EBI Industry programme TCGA Warren KIbbe November 2013EBI Industry programme TCGA Warren KIbbe November 2013
EBI Industry programme TCGA Warren KIbbe November 2013Warren Kibbe
 
There is No Intelligent Life Down Here
There is No Intelligent Life Down HereThere is No Intelligent Life Down Here
There is No Intelligent Life Down HerePhilip Bourne
 
Data Harmonization for a Molecularly Driven Health System
Data Harmonization for a Molecularly Driven Health SystemData Harmonization for a Molecularly Driven Health System
Data Harmonization for a Molecularly Driven Health SystemWarren Kibbe
 

Similaire à Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Generalization Lattices (Malin, 2005) (20)

An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
 
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
 
Boosting probabilistic graphical model inference by incorporating prior knowl...
Boosting probabilistic graphical model inference by incorporating prior knowl...Boosting probabilistic graphical model inference by incorporating prior knowl...
Boosting probabilistic graphical model inference by incorporating prior knowl...
 
Genome data management
Genome data managementGenome data management
Genome data management
 
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data PrivacyA Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
 
Introduction to Bioinformatics.
 Introduction to Bioinformatics. Introduction to Bioinformatics.
Introduction to Bioinformatics.
 
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
 
Will Biomedical Research Fundamentally Change in the Era of Big Data?
Will Biomedical Research Fundamentally Change in the Era of Big Data?Will Biomedical Research Fundamentally Change in the Era of Big Data?
Will Biomedical Research Fundamentally Change in the Era of Big Data?
 
NetBioSIG2014-Talk by Tijana Milenkovic
NetBioSIG2014-Talk by Tijana MilenkovicNetBioSIG2014-Talk by Tijana Milenkovic
NetBioSIG2014-Talk by Tijana Milenkovic
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
 
Accomplishments And Challenges In Bioinformatics
Accomplishments And Challenges In BioinformaticsAccomplishments And Challenges In Bioinformatics
Accomplishments And Challenges In Bioinformatics
 
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
 
Biomedical Clusters, Clouds and Commons - DePaul Colloquium Oct 24, 2014
Biomedical Clusters, Clouds and Commons - DePaul Colloquium Oct 24, 2014Biomedical Clusters, Clouds and Commons - DePaul Colloquium Oct 24, 2014
Biomedical Clusters, Clouds and Commons - DePaul Colloquium Oct 24, 2014
 
DNA Query Language DNAQL: A Novel Approach
DNA Query Language DNAQL: A Novel ApproachDNA Query Language DNAQL: A Novel Approach
DNA Query Language DNAQL: A Novel Approach
 
Highlights from NIH Data Science
Highlights from NIH Data ScienceHighlights from NIH Data Science
Highlights from NIH Data Science
 
EBI Industry programme TCGA Warren KIbbe November 2013
EBI Industry programme TCGA Warren KIbbe November 2013EBI Industry programme TCGA Warren KIbbe November 2013
EBI Industry programme TCGA Warren KIbbe November 2013
 
There is No Intelligent Life Down Here
There is No Intelligent Life Down HereThere is No Intelligent Life Down Here
There is No Intelligent Life Down Here
 
Data Harmonization for a Molecularly Driven Health System
Data Harmonization for a Molecularly Driven Health SystemData Harmonization for a Molecularly Driven Health System
Data Harmonization for a Molecularly Driven Health System
 

Plus de Kato Mivule

Cancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A TutorialCancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A TutorialKato Mivule
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...Kato Mivule
 
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...Kato Mivule
 
Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Kato Mivule
 
Applying Data Privacy Techniques on Published Data in Uganda
 Applying Data Privacy Techniques on Published Data in Uganda Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in UgandaKato Mivule
 
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an OverviewKato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an OverviewKato Mivule
 
Kato Mivule - Towards Agent-based Data Privacy Engineering
Kato Mivule - Towards Agent-based Data Privacy EngineeringKato Mivule - Towards Agent-based Data Privacy Engineering
Kato Mivule - Towards Agent-based Data Privacy EngineeringKato Mivule
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeKato Mivule
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeKato Mivule
 
Kato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance ComputingKato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance ComputingKato Mivule
 
Kato Mivule: An Overview of Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of  Adaptive Boosting – AdaBoostKato Mivule: An Overview of  Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of Adaptive Boosting – AdaBoostKato Mivule
 
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule
 
Towards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning ClassifierTowards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning ClassifierKato Mivule
 
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...Kato Mivule
 
Two Pseudo-random Number Generators, an Overview
Two Pseudo-random Number Generators, an Overview Two Pseudo-random Number Generators, an Overview
Two Pseudo-random Number Generators, an Overview Kato Mivule
 
Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in UgandaApplying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in UgandaKato Mivule
 
Utilizing Noise Addition For Data Privacy, an Overview
Utilizing Noise Addition For Data Privacy, an OverviewUtilizing Noise Addition For Data Privacy, an Overview
Utilizing Noise Addition For Data Privacy, an OverviewKato Mivule
 

Plus de Kato Mivule (17)

Cancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A TutorialCancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A Tutorial
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
 
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
 
Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...
 
Applying Data Privacy Techniques on Published Data in Uganda
 Applying Data Privacy Techniques on Published Data in Uganda Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in Uganda
 
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an OverviewKato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
 
Kato Mivule - Towards Agent-based Data Privacy Engineering
Kato Mivule - Towards Agent-based Data Privacy EngineeringKato Mivule - Towards Agent-based Data Privacy Engineering
Kato Mivule - Towards Agent-based Data Privacy Engineering
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
 
Kato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance ComputingKato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance Computing
 
Kato Mivule: An Overview of Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of  Adaptive Boosting – AdaBoostKato Mivule: An Overview of  Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of Adaptive Boosting – AdaBoost
 
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
 
Towards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning ClassifierTowards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning Classifier
 
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...
 
Two Pseudo-random Number Generators, an Overview
Two Pseudo-random Number Generators, an Overview Two Pseudo-random Number Generators, an Overview
Two Pseudo-random Number Generators, an Overview
 
Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in UgandaApplying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in Uganda
 
Utilizing Noise Addition For Data Privacy, an Overview
Utilizing Noise Addition For Data Privacy, an OverviewUtilizing Noise Addition For Data Privacy, an Overview
Utilizing Noise Addition For Data Privacy, an Overview
 

Dernier

6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...Dr Arash Najmaei ( Phd., MBA, BSc)
 
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...Jack Cole
 
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBoston Institute of Analytics
 
Statistics For Management by Richard I. Levin 8ed.pdf
Statistics For Management by Richard I. Levin 8ed.pdfStatistics For Management by Richard I. Levin 8ed.pdf
Statistics For Management by Richard I. Levin 8ed.pdfnikeshsingh56
 
Digital Indonesia Report 2024 by We Are Social .pdf
Digital Indonesia Report 2024 by We Are Social .pdfDigital Indonesia Report 2024 by We Are Social .pdf
Digital Indonesia Report 2024 by We Are Social .pdfNicoChristianSunaryo
 
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis model
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis modelDecoding Movie Sentiments: Analyzing Reviews with Data Analysis model
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis modelBoston Institute of Analytics
 
DATA ANALYSIS using various data sets like shoping data set etc
DATA ANALYSIS using various data sets like shoping data set etcDATA ANALYSIS using various data sets like shoping data set etc
DATA ANALYSIS using various data sets like shoping data set etclalithasri22
 
IBEF report on the Insurance market in India
IBEF report on the Insurance market in IndiaIBEF report on the Insurance market in India
IBEF report on the Insurance market in IndiaManalVerma4
 
Presentation of project of business person who are success
Presentation of project of business person who are successPresentation of project of business person who are success
Presentation of project of business person who are successPratikSingh115843
 
Predictive Analysis - Using Insight-informed Data to Plan Inventory in Next 6...
Predictive Analysis - Using Insight-informed Data to Plan Inventory in Next 6...Predictive Analysis - Using Insight-informed Data to Plan Inventory in Next 6...
Predictive Analysis - Using Insight-informed Data to Plan Inventory in Next 6...ThinkInnovation
 
Role of Consumer Insights in business transformation
Role of Consumer Insights in business transformationRole of Consumer Insights in business transformation
Role of Consumer Insights in business transformationAnnie Melnic
 
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Boston Institute of Analytics
 
Decision Making Under Uncertainty - Is It Better Off Joining a Partnership or...
Decision Making Under Uncertainty - Is It Better Off Joining a Partnership or...Decision Making Under Uncertainty - Is It Better Off Joining a Partnership or...
Decision Making Under Uncertainty - Is It Better Off Joining a Partnership or...ThinkInnovation
 

Dernier (16)

Insurance Churn Prediction Data Analysis Project
Insurance Churn Prediction Data Analysis ProjectInsurance Churn Prediction Data Analysis Project
Insurance Churn Prediction Data Analysis Project
 
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
 
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
 
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
 
2023 Survey Shows Dip in High School E-Cigarette Use
2023 Survey Shows Dip in High School E-Cigarette Use2023 Survey Shows Dip in High School E-Cigarette Use
2023 Survey Shows Dip in High School E-Cigarette Use
 
Statistics For Management by Richard I. Levin 8ed.pdf
Statistics For Management by Richard I. Levin 8ed.pdfStatistics For Management by Richard I. Levin 8ed.pdf
Statistics For Management by Richard I. Levin 8ed.pdf
 
Digital Indonesia Report 2024 by We Are Social .pdf
Digital Indonesia Report 2024 by We Are Social .pdfDigital Indonesia Report 2024 by We Are Social .pdf
Digital Indonesia Report 2024 by We Are Social .pdf
 
Data Analysis Project: Stroke Prediction
Data Analysis Project: Stroke PredictionData Analysis Project: Stroke Prediction
Data Analysis Project: Stroke Prediction
 
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis model
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis modelDecoding Movie Sentiments: Analyzing Reviews with Data Analysis model
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis model
 
DATA ANALYSIS using various data sets like shoping data set etc
DATA ANALYSIS using various data sets like shoping data set etcDATA ANALYSIS using various data sets like shoping data set etc
DATA ANALYSIS using various data sets like shoping data set etc
 
IBEF report on the Insurance market in India
IBEF report on the Insurance market in IndiaIBEF report on the Insurance market in India
IBEF report on the Insurance market in India
 
Presentation of project of business person who are success
Presentation of project of business person who are successPresentation of project of business person who are success
Presentation of project of business person who are success
 
Predictive Analysis - Using Insight-informed Data to Plan Inventory in Next 6...
Predictive Analysis - Using Insight-informed Data to Plan Inventory in Next 6...Predictive Analysis - Using Insight-informed Data to Plan Inventory in Next 6...
Predictive Analysis - Using Insight-informed Data to Plan Inventory in Next 6...
 
Role of Consumer Insights in business transformation
Role of Consumer Insights in business transformationRole of Consumer Insights in business transformation
Role of Consumer Insights in business transformation
 
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
 
Decision Making Under Uncertainty - Is It Better Off Joining a Partnership or...
Decision Making Under Uncertainty - Is It Better Off Joining a Partnership or...Decision Making Under Uncertainty - Is It Better Off Joining a Partnership or...
Decision Making Under Uncertainty - Is It Better Off Joining a Partnership or...
 

Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Generalization Lattices (Malin, 2005)

  • 1. Bioinformatics Literature Review Protecting DNA Sequence Anonymity with Generalization Lattices (Malin, 2005) Literature Review by Kato Mivule COSC891 – Bioinformatics, Spring 2014 Bowie State University Reference: Bradley. A. Malin, "Protecting genomic sequence anonymity with generalization lattices.", Methods of information in medicine, Vol. 44, No. 5. (2005), pp. 687-692 Bowie State University Department of Computer Science Image Source: U.S. National Library of Medicine
  • 2. Outline • The Problem • Methodology • Conclusion and Future work Bowie State University Department of Computer Science Bioinformatics Literature Review
  • 3. The Problem • Transactions in DNA data poses serious privacy concerns. • DNA uniquely identifies an individual. • DNA data is prone to re-identification and inference attacks. Bowie State University Department of Computer Science Bioinformatics Literature Review
  • 4. The Problem: Bowie State University Department of Computer Science Bioinformatics Literature Review Source: Forbes.com - April 25th 2013
  • 5. Methodology • Apply k-Anonymity • Apply Generalization • Apply the concept of generalization lattice to determine the distance between two residues in a single nucleotide region, which offers the most similar generalized concept for two residues – for example adenine and guanine are both purines. • DNALA – using k-anonymity by granting that the DNA sequence of one individual will be similar to the DNA sequence of another individual. Bowie State University Department of Computer Science Bioinformatics Literature Review
  • 6. Methodology • k-anonymity • K-anonymity uses both generalization and suppression to enforce confidentiality. • K-anonymity requires that for a data set with quasi-identifier attributes in a database to be published, values in the quasi-identifier attributes must be repeated at least k times to ensure privacy, with the value of k > 1. • Because of the generalization and suppression features, k-anonymity is applicable for DNA data privacy. Bowie State University Department of Computer Science Bioinformatics Literature Review
  • 7. Methodology Generalization • Generalization is a data privacy method in which values in attributes that could cause identify disclosure are made less informative by being replaced with general values. • An example is replacing age values of people born between 1970 and 1979 to just 1970. • Generalization follows the Domain Generalization Hierarchy (DGH), which is different levels of generalization. For example we could use L1 =1970-09 and generalize to the month, L2 = 1970, generalize to the year, L3 = 197* generalize to the decade. Bowie State University Department of Computer Science Bioinformatics Literature Review
  • 8. Methodology DNALA – DNA Lattice Anonymization • Employs k-anonymity for data privacy • The technique safeguards privacy by ensuring that the DNA sequence of one individual will be precisely the same as the sequence of one other individual in the published data set. • When an institution publishes DNA sequence data using DNALA technique, the uniqueness of every DNA sequence is assured to be inseparable from at least k – 1 other identities. Bowie State University Department of Computer Science Bioinformatics Literature Review
  • 9. Methodology DNA Domain Generalization Hierarchy Bowie State University Department of Computer Science Bioinformatics Literature Review Image source: Malin, (2005)
  • 10. Methodology DNA Domain Generalization Hierarchy Bowie State University Department of Computer Science Bioinformatics Literature Review Image source: Malin, (2005)
  • 11. Methodology DNA Domain Generalization Hierarchy Bowie State University Department of Computer Science Bioinformatics Literature Review Image source: Malin, (2005)
  • 12. Methodology DNALA Algorithm Bowie State University Department of Computer Science Bioinformatics Literature Review Image source: Malin, (2005)
  • 13. Conclusion and Future works •DNA data privacy using k-anonymity is still promising. •Data utility remains a challenge as more DNA sequence info gets generalized. •How do other algorithms such as noise addition, and differential privacy apply? •Could we generate synthetic and or obfuscated DNA data with similar traits as the original? Bowie State University Department of Computer Science Bioinformatics Literature Review
  • 14. References 1. Bradley. A. Malin, "Protecting genomic sequence anonymity with generalization lattices.", Methods of information in medicine, Vol. 44, No. 5. (2005), pp. 687-692 2. K. Mivule and C. Turner, “Applying Data Privacy Techniques on Published Data in Uganda,” in International Conference on e-Learning, e-Business, Enterprise Information Systems, and e- Government (EEE), 2012, pp. 110–115. 3. Adam Tanner, Forbes.com "Harvard Professor Re-Identifies Anonymous Volunteers In DNA Study", Forbes.com, 4/25/2013, Accessed: 02/10/2014, Available Online: http://www.forbes.com/sites/adamtanner/2013/04/25/harvard-professor-re-identifies-anonymous- volunteers-in-dna-study/ Bowie State University Department of Computer Science Bioinformatics Literature Review