SlideShare una empresa de Scribd logo
1 de 14
Descargar para leer sin conexión
Bioinformatics Literature Review
Protecting DNA Sequence Anonymity with Generalization Lattices
(Malin, 2005)
Literature Review by Kato Mivule
COSC891 – Bioinformatics, Spring 2014
Bowie State University
Reference: Bradley. A. Malin, "Protecting genomic sequence anonymity with generalization lattices.", Methods of
information in medicine, Vol. 44, No. 5. (2005), pp. 687-692
Bowie State University Department of Computer Science
Image Source: U.S. National Library of Medicine
Outline
• The Problem
• Methodology
• Conclusion and Future work
Bowie State University Department of Computer Science
Bioinformatics Literature Review
The Problem
• Transactions in DNA data poses serious privacy concerns.
• DNA uniquely identifies an individual.
• DNA data is prone to re-identification and inference attacks.
Bowie State University Department of Computer Science
Bioinformatics Literature Review
The Problem:
Bowie State University Department of Computer Science
Bioinformatics Literature Review
Source: Forbes.com - April 25th 2013
Methodology
• Apply k-Anonymity
• Apply Generalization
• Apply the concept of generalization lattice to determine the distance between
two residues in a single nucleotide region, which offers the most similar
generalized concept for two residues – for example adenine and guanine are
both purines.
• DNALA – using k-anonymity by granting that the DNA sequence of one
individual will be similar to the DNA sequence of another individual.
Bowie State University Department of Computer Science
Bioinformatics Literature Review
Methodology
• k-anonymity
• K-anonymity uses both generalization and suppression to enforce
confidentiality.
• K-anonymity requires that for a data set with quasi-identifier attributes in a
database to be published, values in the quasi-identifier attributes must be
repeated at least k times to ensure privacy, with the value of k > 1.
• Because of the generalization and suppression features, k-anonymity is
applicable for DNA data privacy.
Bowie State University Department of Computer Science
Bioinformatics Literature Review
Methodology
Generalization
• Generalization is a data privacy method in which values in attributes that
could cause identify disclosure are made less informative by being replaced
with general values.
• An example is replacing age values of people born between 1970 and 1979 to
just 1970.
• Generalization follows the Domain Generalization Hierarchy (DGH), which
is different levels of generalization. For example we could use L1 =1970-09
and generalize to the month, L2 = 1970, generalize to the year, L3 = 197*
generalize to the decade.
Bowie State University Department of Computer Science
Bioinformatics Literature Review
Methodology
DNALA – DNA Lattice Anonymization
• Employs k-anonymity for data privacy
• The technique safeguards privacy by ensuring that the DNA sequence of one
individual will be precisely the same as the sequence of one other individual
in the published data set.
• When an institution publishes DNA sequence data using DNALA technique,
the uniqueness of every DNA sequence is assured to be inseparable from at
least k – 1 other identities.
Bowie State University Department of Computer Science
Bioinformatics Literature Review
Methodology
DNA Domain Generalization Hierarchy
Bowie State University Department of Computer Science
Bioinformatics Literature Review
Image source: Malin, (2005)
Methodology
DNA Domain Generalization Hierarchy
Bowie State University Department of Computer Science
Bioinformatics Literature Review
Image source: Malin, (2005)
Methodology
DNA Domain Generalization Hierarchy
Bowie State University Department of Computer Science
Bioinformatics Literature Review
Image source: Malin, (2005)
Methodology
DNALA Algorithm
Bowie State University Department of Computer Science
Bioinformatics Literature Review
Image source: Malin, (2005)
Conclusion and Future works
•DNA data privacy using k-anonymity is still promising.
•Data utility remains a challenge as more DNA sequence info gets generalized.
•How do other algorithms such as noise addition, and differential privacy apply?
•Could we generate synthetic and or obfuscated DNA data with similar traits as the
original?
Bowie State University Department of Computer Science
Bioinformatics Literature Review
References
1. Bradley. A. Malin, "Protecting genomic sequence anonymity with generalization lattices.", Methods
of information in medicine, Vol. 44, No. 5. (2005), pp. 687-692
2. K. Mivule and C. Turner, “Applying Data Privacy Techniques on Published Data in Uganda,” in
International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-
Government (EEE), 2012, pp. 110–115.
3. Adam Tanner, Forbes.com "Harvard Professor Re-Identifies Anonymous Volunteers In DNA
Study", Forbes.com, 4/25/2013, Accessed: 02/10/2014, Available Online:
http://www.forbes.com/sites/adamtanner/2013/04/25/harvard-professor-re-identifies-anonymous-
volunteers-in-dna-study/
Bowie State University Department of Computer Science
Bioinformatics Literature Review

Más contenido relacionado

La actualidad más candente

Internet and Bioinformatics for Biologists
Internet and Bioinformatics for BiologistsInternet and Bioinformatics for Biologists
Internet and Bioinformatics for BiologistsDr Mehul Dave
 
Next-Gen Taxonomic Descriptions for Microbial Eukaryotes
Next-Gen Taxonomic Descriptions for Microbial EukaryotesNext-Gen Taxonomic Descriptions for Microbial Eukaryotes
Next-Gen Taxonomic Descriptions for Microbial EukaryotesAnne Thessen
 
Technology R&D Theme 2: From Descriptive to Predictive Networks
Technology R&D Theme 2: From Descriptive to Predictive NetworksTechnology R&D Theme 2: From Descriptive to Predictive Networks
Technology R&D Theme 2: From Descriptive to Predictive NetworksAlexander Pico
 
Gene association networks - Large-scale integration of data and text
Gene association networks - Large-scale integration of data and textGene association networks - Large-scale integration of data and text
Gene association networks - Large-scale integration of data and textLars Juhl Jensen
 
Human genome project the mitre corporation - jason program office
Human genome project   the mitre corporation - jason program officeHuman genome project   the mitre corporation - jason program office
Human genome project the mitre corporation - jason program officePublicLeaker
 
Systems biology: Large-scale biomedical data mining
Systems biology: Large-scale biomedical data miningSystems biology: Large-scale biomedical data mining
Systems biology: Large-scale biomedical data miningLars Juhl Jensen
 
20170128_Resume_Engineering
20170128_Resume_Engineering20170128_Resume_Engineering
20170128_Resume_EngineeringAaron Tan
 
Bioinformatics Meets Information Retrieval: State of the Art and a Case Study
Bioinformatics Meets Information Retrieval: State of the Art and a Case StudyBioinformatics Meets Information Retrieval: State of the Art and a Case Study
Bioinformatics Meets Information Retrieval: State of the Art and a Case StudyEloisa Vargiu
 
Ontology-based services for querying and mining plant genomic and phenomic data
Ontology-based services for querying and mining plant genomic and phenomic dataOntology-based services for querying and mining plant genomic and phenomic data
Ontology-based services for querying and mining plant genomic and phenomic dataNathan Dunn
 
Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...
Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...
Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...sanaullah noonari
 
Greene Bosc2008
Greene Bosc2008Greene Bosc2008
Greene Bosc2008bosc_2008
 
Role of Bioinformatics in Cancer Research
Role of Bioinformatics in Cancer Research Role of Bioinformatics in Cancer Research
Role of Bioinformatics in Cancer Research Akash Arora
 
CV-Smith-2015-Updated-2
CV-Smith-2015-Updated-2CV-Smith-2015-Updated-2
CV-Smith-2015-Updated-2Jeff Smith
 

La actualidad más candente (16)

Internet and Bioinformatics for Biologists
Internet and Bioinformatics for BiologistsInternet and Bioinformatics for Biologists
Internet and Bioinformatics for Biologists
 
Next-Gen Taxonomic Descriptions for Microbial Eukaryotes
Next-Gen Taxonomic Descriptions for Microbial EukaryotesNext-Gen Taxonomic Descriptions for Microbial Eukaryotes
Next-Gen Taxonomic Descriptions for Microbial Eukaryotes
 
Technology R&D Theme 2: From Descriptive to Predictive Networks
Technology R&D Theme 2: From Descriptive to Predictive NetworksTechnology R&D Theme 2: From Descriptive to Predictive Networks
Technology R&D Theme 2: From Descriptive to Predictive Networks
 
Gene association networks - Large-scale integration of data and text
Gene association networks - Large-scale integration of data and textGene association networks - Large-scale integration of data and text
Gene association networks - Large-scale integration of data and text
 
resume
resumeresume
resume
 
Human genome project the mitre corporation - jason program office
Human genome project   the mitre corporation - jason program officeHuman genome project   the mitre corporation - jason program office
Human genome project the mitre corporation - jason program office
 
DanVanattaCV
DanVanattaCVDanVanattaCV
DanVanattaCV
 
Systems biology: Large-scale biomedical data mining
Systems biology: Large-scale biomedical data miningSystems biology: Large-scale biomedical data mining
Systems biology: Large-scale biomedical data mining
 
20170128_Resume_Engineering
20170128_Resume_Engineering20170128_Resume_Engineering
20170128_Resume_Engineering
 
BTIS
BTISBTIS
BTIS
 
Bioinformatics Meets Information Retrieval: State of the Art and a Case Study
Bioinformatics Meets Information Retrieval: State of the Art and a Case StudyBioinformatics Meets Information Retrieval: State of the Art and a Case Study
Bioinformatics Meets Information Retrieval: State of the Art and a Case Study
 
Ontology-based services for querying and mining plant genomic and phenomic data
Ontology-based services for querying and mining plant genomic and phenomic dataOntology-based services for querying and mining plant genomic and phenomic data
Ontology-based services for querying and mining plant genomic and phenomic data
 
Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...
Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...
Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...
 
Greene Bosc2008
Greene Bosc2008Greene Bosc2008
Greene Bosc2008
 
Role of Bioinformatics in Cancer Research
Role of Bioinformatics in Cancer Research Role of Bioinformatics in Cancer Research
Role of Bioinformatics in Cancer Research
 
CV-Smith-2015-Updated-2
CV-Smith-2015-Updated-2CV-Smith-2015-Updated-2
CV-Smith-2015-Updated-2
 

Destacado

Earth Sciences 4490: Getting Started on your Literature Review
Earth Sciences 4490: Getting Started on your Literature ReviewEarth Sciences 4490: Getting Started on your Literature Review
Earth Sciences 4490: Getting Started on your Literature Reviewdansich
 
2012 the literature review_industrial_systemsengineering
2012 the literature review_industrial_systemsengineering2012 the literature review_industrial_systemsengineering
2012 the literature review_industrial_systemsengineeringpalfordtamu
 
A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization Kato Mivule
 
Literature_Review_Khan_Adnan
Literature_Review_Khan_AdnanLiterature_Review_Khan_Adnan
Literature_Review_Khan_AdnanAdnan Khan
 
Crafting the literature review
Crafting the literature reviewCrafting the literature review
Crafting the literature reviewAhmed Hamdy
 
A guide to writing the dissertation literature review
A guide to writing the dissertation literature reviewA guide to writing the dissertation literature review
A guide to writing the dissertation literature reviewEducation At The Edge
 
1 literature review workshop-khalid
1 literature review workshop-khalid1 literature review workshop-khalid
1 literature review workshop-khalidKhalid Mahmood
 
Literature Review Worksheet
Literature Review WorksheetLiterature Review Worksheet
Literature Review WorksheetSam Landfried
 
Introduction to Systematic Literature Review method
Introduction to Systematic Literature Review methodIntroduction to Systematic Literature Review method
Introduction to Systematic Literature Review methodNorsaremah Salleh
 
Literature Review: Managing Information Overflow: MindMapping, Citation Mappi...
Literature Review: Managing Information Overflow: MindMapping, Citation Mappi...Literature Review: Managing Information Overflow: MindMapping, Citation Mappi...
Literature Review: Managing Information Overflow: MindMapping, Citation Mappi...Umm Al-Qura University Faculty of Dentistry
 
Writing research paper khalid
Writing research paper khalidWriting research paper khalid
Writing research paper khalidKhalid Mahmood
 
Literature review for a dissertation: a step-by-step guide
Literature review for a dissertation: a step-by-step guideLiterature review for a dissertation: a step-by-step guide
Literature review for a dissertation: a step-by-step guideOlga Koz, DM, MLS
 
6 writing and presenting literature review-khalid
6 writing and presenting literature review-khalid6 writing and presenting literature review-khalid
6 writing and presenting literature review-khalidKhalid Mahmood
 
The literature review
The literature reviewThe literature review
The literature reviewBarryCRNA
 
Sample literature review
Sample literature reviewSample literature review
Sample literature reviewcocolatto
 
Literature review in research
Literature review in researchLiterature review in research
Literature review in researchNursing Path
 
Literature Review (Review of Related Literature - Research Methodology)
Literature Review (Review of Related Literature - Research Methodology)Literature Review (Review of Related Literature - Research Methodology)
Literature Review (Review of Related Literature - Research Methodology)Dilip Barad
 

Destacado (20)

Earth Sciences 4490: Getting Started on your Literature Review
Earth Sciences 4490: Getting Started on your Literature ReviewEarth Sciences 4490: Getting Started on your Literature Review
Earth Sciences 4490: Getting Started on your Literature Review
 
2012 the literature review_industrial_systemsengineering
2012 the literature review_industrial_systemsengineering2012 the literature review_industrial_systemsengineering
2012 the literature review_industrial_systemsengineering
 
A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization
 
Literature_Review_Khan_Adnan
Literature_Review_Khan_AdnanLiterature_Review_Khan_Adnan
Literature_Review_Khan_Adnan
 
Crafting the literature review
Crafting the literature reviewCrafting the literature review
Crafting the literature review
 
A guide to writing the dissertation literature review
A guide to writing the dissertation literature reviewA guide to writing the dissertation literature review
A guide to writing the dissertation literature review
 
Literature review and the PhD
Literature review and the PhDLiterature review and the PhD
Literature review and the PhD
 
1 literature review workshop-khalid
1 literature review workshop-khalid1 literature review workshop-khalid
1 literature review workshop-khalid
 
Literature Review Worksheet
Literature Review WorksheetLiterature Review Worksheet
Literature Review Worksheet
 
Introduction to Systematic Literature Review method
Introduction to Systematic Literature Review methodIntroduction to Systematic Literature Review method
Introduction to Systematic Literature Review method
 
Literature Review: Managing Information Overflow: MindMapping, Citation Mappi...
Literature Review: Managing Information Overflow: MindMapping, Citation Mappi...Literature Review: Managing Information Overflow: MindMapping, Citation Mappi...
Literature Review: Managing Information Overflow: MindMapping, Citation Mappi...
 
Literature Review SNS
Literature Review SNSLiterature Review SNS
Literature Review SNS
 
Writing research paper khalid
Writing research paper khalidWriting research paper khalid
Writing research paper khalid
 
Literature review for a dissertation: a step-by-step guide
Literature review for a dissertation: a step-by-step guideLiterature review for a dissertation: a step-by-step guide
Literature review for a dissertation: a step-by-step guide
 
6 writing and presenting literature review-khalid
6 writing and presenting literature review-khalid6 writing and presenting literature review-khalid
6 writing and presenting literature review-khalid
 
The literature review
The literature reviewThe literature review
The literature review
 
Sample literature review
Sample literature reviewSample literature review
Sample literature review
 
Doing a Literature Review
Doing a Literature ReviewDoing a Literature Review
Doing a Literature Review
 
Literature review in research
Literature review in researchLiterature review in research
Literature review in research
 
Literature Review (Review of Related Literature - Research Methodology)
Literature Review (Review of Related Literature - Research Methodology)Literature Review (Review of Related Literature - Research Methodology)
Literature Review (Review of Related Literature - Research Methodology)
 

Similar a Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Generalization Lattices (Malin, 2005)

An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...Kato Mivule
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeKato Mivule
 
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...Kato Mivule
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EITESANGO
 
Boosting probabilistic graphical model inference by incorporating prior knowl...
Boosting probabilistic graphical model inference by incorporating prior knowl...Boosting probabilistic graphical model inference by incorporating prior knowl...
Boosting probabilistic graphical model inference by incorporating prior knowl...Hakky St
 
Genome data management
Genome data managementGenome data management
Genome data managementShareb Ismaeel
 
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data PrivacyA Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data PrivacyKato Mivule
 
Introduction to Bioinformatics.
 Introduction to Bioinformatics. Introduction to Bioinformatics.
Introduction to Bioinformatics.Elena Sügis
 
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...Kato Mivule
 
Will Biomedical Research Fundamentally Change in the Era of Big Data?
Will Biomedical Research Fundamentally Change in the Era of Big Data?Will Biomedical Research Fundamentally Change in the Era of Big Data?
Will Biomedical Research Fundamentally Change in the Era of Big Data?Philip Bourne
 
NetBioSIG2014-Talk by Tijana Milenkovic
NetBioSIG2014-Talk by Tijana MilenkovicNetBioSIG2014-Talk by Tijana Milenkovic
NetBioSIG2014-Talk by Tijana MilenkovicAlexander Pico
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...Kato Mivule
 
Accomplishments And Challenges In Bioinformatics
Accomplishments And Challenges In BioinformaticsAccomplishments And Challenges In Bioinformatics
Accomplishments And Challenges In BioinformaticsDereck Downing
 
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Kato Mivule
 
Biomedical Clusters, Clouds and Commons - DePaul Colloquium Oct 24, 2014
Biomedical Clusters, Clouds and Commons - DePaul Colloquium Oct 24, 2014Biomedical Clusters, Clouds and Commons - DePaul Colloquium Oct 24, 2014
Biomedical Clusters, Clouds and Commons - DePaul Colloquium Oct 24, 2014Robert Grossman
 
DNA Query Language DNAQL: A Novel Approach
DNA Query Language DNAQL: A Novel ApproachDNA Query Language DNAQL: A Novel Approach
DNA Query Language DNAQL: A Novel ApproachEditor IJCATR
 
Highlights from NIH Data Science
Highlights from NIH Data ScienceHighlights from NIH Data Science
Highlights from NIH Data SciencePhilip Bourne
 
EBI Industry programme TCGA Warren KIbbe November 2013
EBI Industry programme TCGA Warren KIbbe November 2013EBI Industry programme TCGA Warren KIbbe November 2013
EBI Industry programme TCGA Warren KIbbe November 2013Warren Kibbe
 
There is No Intelligent Life Down Here
There is No Intelligent Life Down HereThere is No Intelligent Life Down Here
There is No Intelligent Life Down HerePhilip Bourne
 
Data Harmonization for a Molecularly Driven Health System
Data Harmonization for a Molecularly Driven Health SystemData Harmonization for a Molecularly Driven Health System
Data Harmonization for a Molecularly Driven Health SystemWarren Kibbe
 

Similar a Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Generalization Lattices (Malin, 2005) (20)

An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
 
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
 
Boosting probabilistic graphical model inference by incorporating prior knowl...
Boosting probabilistic graphical model inference by incorporating prior knowl...Boosting probabilistic graphical model inference by incorporating prior knowl...
Boosting probabilistic graphical model inference by incorporating prior knowl...
 
Genome data management
Genome data managementGenome data management
Genome data management
 
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data PrivacyA Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
 
Introduction to Bioinformatics.
 Introduction to Bioinformatics. Introduction to Bioinformatics.
Introduction to Bioinformatics.
 
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
 
Will Biomedical Research Fundamentally Change in the Era of Big Data?
Will Biomedical Research Fundamentally Change in the Era of Big Data?Will Biomedical Research Fundamentally Change in the Era of Big Data?
Will Biomedical Research Fundamentally Change in the Era of Big Data?
 
NetBioSIG2014-Talk by Tijana Milenkovic
NetBioSIG2014-Talk by Tijana MilenkovicNetBioSIG2014-Talk by Tijana Milenkovic
NetBioSIG2014-Talk by Tijana Milenkovic
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
 
Accomplishments And Challenges In Bioinformatics
Accomplishments And Challenges In BioinformaticsAccomplishments And Challenges In Bioinformatics
Accomplishments And Challenges In Bioinformatics
 
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
 
Biomedical Clusters, Clouds and Commons - DePaul Colloquium Oct 24, 2014
Biomedical Clusters, Clouds and Commons - DePaul Colloquium Oct 24, 2014Biomedical Clusters, Clouds and Commons - DePaul Colloquium Oct 24, 2014
Biomedical Clusters, Clouds and Commons - DePaul Colloquium Oct 24, 2014
 
DNA Query Language DNAQL: A Novel Approach
DNA Query Language DNAQL: A Novel ApproachDNA Query Language DNAQL: A Novel Approach
DNA Query Language DNAQL: A Novel Approach
 
Highlights from NIH Data Science
Highlights from NIH Data ScienceHighlights from NIH Data Science
Highlights from NIH Data Science
 
EBI Industry programme TCGA Warren KIbbe November 2013
EBI Industry programme TCGA Warren KIbbe November 2013EBI Industry programme TCGA Warren KIbbe November 2013
EBI Industry programme TCGA Warren KIbbe November 2013
 
There is No Intelligent Life Down Here
There is No Intelligent Life Down HereThere is No Intelligent Life Down Here
There is No Intelligent Life Down Here
 
Data Harmonization for a Molecularly Driven Health System
Data Harmonization for a Molecularly Driven Health SystemData Harmonization for a Molecularly Driven Health System
Data Harmonization for a Molecularly Driven Health System
 

Más de Kato Mivule

Cancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A TutorialCancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A TutorialKato Mivule
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...Kato Mivule
 
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...Kato Mivule
 
Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Kato Mivule
 
Applying Data Privacy Techniques on Published Data in Uganda
 Applying Data Privacy Techniques on Published Data in Uganda Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in UgandaKato Mivule
 
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an OverviewKato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an OverviewKato Mivule
 
Kato Mivule - Towards Agent-based Data Privacy Engineering
Kato Mivule - Towards Agent-based Data Privacy EngineeringKato Mivule - Towards Agent-based Data Privacy Engineering
Kato Mivule - Towards Agent-based Data Privacy EngineeringKato Mivule
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeKato Mivule
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeKato Mivule
 
Kato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance ComputingKato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance ComputingKato Mivule
 
Kato Mivule: An Overview of Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of  Adaptive Boosting – AdaBoostKato Mivule: An Overview of  Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of Adaptive Boosting – AdaBoostKato Mivule
 
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule
 
Towards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning ClassifierTowards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning ClassifierKato Mivule
 
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...Kato Mivule
 
Two Pseudo-random Number Generators, an Overview
Two Pseudo-random Number Generators, an Overview Two Pseudo-random Number Generators, an Overview
Two Pseudo-random Number Generators, an Overview Kato Mivule
 
Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in UgandaApplying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in UgandaKato Mivule
 
Utilizing Noise Addition For Data Privacy, an Overview
Utilizing Noise Addition For Data Privacy, an OverviewUtilizing Noise Addition For Data Privacy, an Overview
Utilizing Noise Addition For Data Privacy, an OverviewKato Mivule
 

Más de Kato Mivule (17)

Cancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A TutorialCancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A Tutorial
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
 
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
 
Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...
 
Applying Data Privacy Techniques on Published Data in Uganda
 Applying Data Privacy Techniques on Published Data in Uganda Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in Uganda
 
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an OverviewKato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
 
Kato Mivule - Towards Agent-based Data Privacy Engineering
Kato Mivule - Towards Agent-based Data Privacy EngineeringKato Mivule - Towards Agent-based Data Privacy Engineering
Kato Mivule - Towards Agent-based Data Privacy Engineering
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
 
Kato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance ComputingKato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance Computing
 
Kato Mivule: An Overview of Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of  Adaptive Boosting – AdaBoostKato Mivule: An Overview of  Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of Adaptive Boosting – AdaBoost
 
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
 
Towards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning ClassifierTowards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning Classifier
 
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...
 
Two Pseudo-random Number Generators, an Overview
Two Pseudo-random Number Generators, an Overview Two Pseudo-random Number Generators, an Overview
Two Pseudo-random Number Generators, an Overview
 
Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in UgandaApplying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in Uganda
 
Utilizing Noise Addition For Data Privacy, an Overview
Utilizing Noise Addition For Data Privacy, an OverviewUtilizing Noise Addition For Data Privacy, an Overview
Utilizing Noise Addition For Data Privacy, an Overview
 

Último

Machine learning classification ppt.ppt
Machine learning classification  ppt.pptMachine learning classification  ppt.ppt
Machine learning classification ppt.pptamreenkhanum0307
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfgstagge
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样vhwb25kk
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]📊 Markus Baersch
 
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...GQ Research
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdfHuman37
 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.natarajan8993
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFAAndrei Kaleshka
 
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDRafezzaman
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPTBoston Institute of Analytics
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degreeyuu sss
 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsVICTOR MAESTRE RAMIREZ
 
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSINGmarianagonzalez07
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Colleen Farrelly
 
While-For-loop in python used in college
While-For-loop in python used in collegeWhile-For-loop in python used in college
While-For-loop in python used in collegessuser7a7cd61
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一fhwihughh
 
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queensdataanalyticsqueen03
 
Multiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfMultiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfchwongval
 

Último (20)

Machine learning classification ppt.ppt
Machine learning classification  ppt.pptMachine learning classification  ppt.ppt
Machine learning classification ppt.ppt
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdf
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]
 
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf
 
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFA
 
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
 
Call Girls in Saket 99530🔝 56974 Escort Service
Call Girls in Saket 99530🔝 56974 Escort ServiceCall Girls in Saket 99530🔝 56974 Escort Service
Call Girls in Saket 99530🔝 56974 Escort Service
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business Professionals
 
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024
 
While-For-loop in python used in college
While-For-loop in python used in collegeWhile-For-loop in python used in college
While-For-loop in python used in college
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
 
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queens
 
Multiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfMultiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdf
 

Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Generalization Lattices (Malin, 2005)

  • 1. Bioinformatics Literature Review Protecting DNA Sequence Anonymity with Generalization Lattices (Malin, 2005) Literature Review by Kato Mivule COSC891 – Bioinformatics, Spring 2014 Bowie State University Reference: Bradley. A. Malin, "Protecting genomic sequence anonymity with generalization lattices.", Methods of information in medicine, Vol. 44, No. 5. (2005), pp. 687-692 Bowie State University Department of Computer Science Image Source: U.S. National Library of Medicine
  • 2. Outline • The Problem • Methodology • Conclusion and Future work Bowie State University Department of Computer Science Bioinformatics Literature Review
  • 3. The Problem • Transactions in DNA data poses serious privacy concerns. • DNA uniquely identifies an individual. • DNA data is prone to re-identification and inference attacks. Bowie State University Department of Computer Science Bioinformatics Literature Review
  • 4. The Problem: Bowie State University Department of Computer Science Bioinformatics Literature Review Source: Forbes.com - April 25th 2013
  • 5. Methodology • Apply k-Anonymity • Apply Generalization • Apply the concept of generalization lattice to determine the distance between two residues in a single nucleotide region, which offers the most similar generalized concept for two residues – for example adenine and guanine are both purines. • DNALA – using k-anonymity by granting that the DNA sequence of one individual will be similar to the DNA sequence of another individual. Bowie State University Department of Computer Science Bioinformatics Literature Review
  • 6. Methodology • k-anonymity • K-anonymity uses both generalization and suppression to enforce confidentiality. • K-anonymity requires that for a data set with quasi-identifier attributes in a database to be published, values in the quasi-identifier attributes must be repeated at least k times to ensure privacy, with the value of k > 1. • Because of the generalization and suppression features, k-anonymity is applicable for DNA data privacy. Bowie State University Department of Computer Science Bioinformatics Literature Review
  • 7. Methodology Generalization • Generalization is a data privacy method in which values in attributes that could cause identify disclosure are made less informative by being replaced with general values. • An example is replacing age values of people born between 1970 and 1979 to just 1970. • Generalization follows the Domain Generalization Hierarchy (DGH), which is different levels of generalization. For example we could use L1 =1970-09 and generalize to the month, L2 = 1970, generalize to the year, L3 = 197* generalize to the decade. Bowie State University Department of Computer Science Bioinformatics Literature Review
  • 8. Methodology DNALA – DNA Lattice Anonymization • Employs k-anonymity for data privacy • The technique safeguards privacy by ensuring that the DNA sequence of one individual will be precisely the same as the sequence of one other individual in the published data set. • When an institution publishes DNA sequence data using DNALA technique, the uniqueness of every DNA sequence is assured to be inseparable from at least k – 1 other identities. Bowie State University Department of Computer Science Bioinformatics Literature Review
  • 9. Methodology DNA Domain Generalization Hierarchy Bowie State University Department of Computer Science Bioinformatics Literature Review Image source: Malin, (2005)
  • 10. Methodology DNA Domain Generalization Hierarchy Bowie State University Department of Computer Science Bioinformatics Literature Review Image source: Malin, (2005)
  • 11. Methodology DNA Domain Generalization Hierarchy Bowie State University Department of Computer Science Bioinformatics Literature Review Image source: Malin, (2005)
  • 12. Methodology DNALA Algorithm Bowie State University Department of Computer Science Bioinformatics Literature Review Image source: Malin, (2005)
  • 13. Conclusion and Future works •DNA data privacy using k-anonymity is still promising. •Data utility remains a challenge as more DNA sequence info gets generalized. •How do other algorithms such as noise addition, and differential privacy apply? •Could we generate synthetic and or obfuscated DNA data with similar traits as the original? Bowie State University Department of Computer Science Bioinformatics Literature Review
  • 14. References 1. Bradley. A. Malin, "Protecting genomic sequence anonymity with generalization lattices.", Methods of information in medicine, Vol. 44, No. 5. (2005), pp. 687-692 2. K. Mivule and C. Turner, “Applying Data Privacy Techniques on Published Data in Uganda,” in International Conference on e-Learning, e-Business, Enterprise Information Systems, and e- Government (EEE), 2012, pp. 110–115. 3. Adam Tanner, Forbes.com "Harvard Professor Re-Identifies Anonymous Volunteers In DNA Study", Forbes.com, 4/25/2013, Accessed: 02/10/2014, Available Online: http://www.forbes.com/sites/adamtanner/2013/04/25/harvard-professor-re-identifies-anonymous- volunteers-in-dna-study/ Bowie State University Department of Computer Science Bioinformatics Literature Review