{"id":238703,"date":"2017-08-25T01:26:42","date_gmt":"2017-08-25T05:26:42","guid":{"rendered":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/to-protect-genetic-privacy-encrypt-your-dna-wired-2.php"},"modified":"2017-08-25T01:26:42","modified_gmt":"2017-08-25T05:26:42","slug":"to-protect-genetic-privacy-encrypt-your-dna-wired-2","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/human-genetics\/to-protect-genetic-privacy-encrypt-your-dna-wired-2.php","title":{"rendered":"To Protect Genetic Privacy, Encrypt Your DNA &#8211; WIRED"},"content":{"rendered":"<p><p>        In 2007, DNA      pioneer    James Watson became the first person to have his entire genome    sequencedmaking all of his 6 billion base pairs publicly    available for research. Well, almost all of them. He left one    spot blank, on the long arm of chromosome 19, where a gene    called     APOE      lives. Certain variations in         APOE      increase your chances of developing    Alzheimers, and Watson wanted to keep that information    private.   <\/p>\n<p>    Except it wasnt. Researchers quickly    pointed out you could predict Watsons         APOE      variant based on signatures in the    surrounding DNA. They didnt actually         do      it, but database managers wasted no    time in redacting another two million base pairs surrounding    the     APOE      gene.  <\/p>\n<p>    This is the dilemma at the heart of    precision medicine: It requires people to give up some of their    privacy in service of the greater scientific good. To    completely eliminate the risk of outing an individual based on    their DNA records, youd have to strip it of the same    identifying details that make it scientifically useful. But    now, computer scientists and mathematicians are working toward    an alternative solution. Instead of stripping genomic data,    theyre     encrypting it.  <\/p>\n<p>    Gill Bejerano leads a developmental    biology lab at Stanford that investigates the genetic roots of    human disease. In 2013, when he realized he needed more genomic    data, his lab joined Stanford Hospitals Pediatrics    Departmentan arduous process that required extensive vetting    and training of all his staff and equipment. This is how most    institutions solve the privacy perils of data sharing. They    limit who can access all the genomes in their possession to a    trusted few, and only share obfuscated summary statistics more    widely.   <\/p>\n<p>    So when Bejerano found himself sitting    in on a faculty talk given by Dan Boneh, head of the applied    cryptography group at Stanford, he was struck with an idea. He    scribbled down a mathematical formula for one of the genetic    computations he uses often in his work. Afterward, he    approached Boneh and showed it to him. Could you compute these    outputs without knowing the inputs? he asked. Sure, said    Boneh.   <\/p>\n<p>    Last week, Bejerano and Boneh published    a paper in     Science      that did just that. Using a    cryptographic genome cloaking method, the scientists were    able to do things like identify responsible mutations in groups    of patients with rare diseases and compare groups of patients    at two medical centers to find shared mutations associated with    shared symptoms, all while keeping 97 percent of each    participants unique genetic information completely hidden.    They accomplished this by converting variations in each genome    into a linear series of values. That allowed them to conduct    any analyses they needed while only revealing genes relevant to    that particular investigation.  <\/p>\n<p>    Just like programs have bugs, people    have bugs, says Bejerano. Finding disease-causing genetic    traits is a lot like spotting flaws in computer code. You have    to compare code that works to code that doesnt. But genetic    data is much more sensitive, and people     (rightly)      worry that it    might be used against them by insurers, or even stolen by    hackers. If a patient held the cryptographic key to their data,    they could get a valuable medical diagnosis while not exposing    the rest of their genome to outside threats. You can make    rules about not discriminating on the basis of genetics, or you    can provide technology where you cant discriminate against    people even if you wanted to, says Bejerano. Thats a much    stronger statement.   <\/p>\n<p>    The National Institutes of Health have    been working toward such a technology since reidentification    researchers first began connecting the dots in anonymous    genomics data. In 2010, the agency founded a         national center      for    Integrating Data for Analysis, Anonymization and Sharing housed    on the campus of UC San Diego. And since 2015, iDash has been    funding annual    competitions     to develop privacy-preserving genomics protocols. Another    promising approach iDash has supported is something called    fully homomorphic encryption, which allows users to run any    computation they want on totally encrypted data without losing    years of computing time.   <\/p>\n<p>            Megan Molteni          <\/p>\n<p>            The Go-To Gene Sequencing Machine With Very Strange            Results          <\/p>\n<p>            Sarah Zhang          <\/p>\n<p>            Cheap DNA Sequencing Is Here. Writing DNA Is Next          <\/p>\n<p>            Rachel Ehrenberg, Science            News          <\/p>\n<p>            Scrubbing IDs Out of Medical Records for Genetic            Studies          <\/p>\n<p>    Kristen Lauter, head of cryptography    research at Microsoft, focuses on this form of encryption, and    her team has taken home the iDash prize two years running.    Critically, the method encodes the data in such a way that    scientists dont lose the flexibility to perform medically    useful genetic tests. Unlike previous encryption schemes,    Lauters tool preserves the underlying mathematical structure    of the data. That allows computers to do the math that delivers    genetic diagnoses, for example, on totally encrypted data.    Scientists get a key to decode the final results, but they    never see the source.   <\/p>\n<p>    This is extra important as more and    more genetic data moves off local servers and into the cloud.    The NIH lets users download human genomic data from its    repositories, and in 2014, the agency started letting people    store and analyze that data in private or commercial cloud    environments. But under NIHs policy, its the scientists using    the datanot the cloud service providerresponsible with    ensuring its security. Cloud providers can get hacked, or    subpoenaed by law enforcement, something researchers have no    control over. That is, unless theres a viable encryption for    data stored in the cloud.   <\/p>\n<p>    If we dont think about it now, in    five to 10 years a lot peoples genomic information will be    used in ways they did not intend, says Lauter. But encryption    is a funny technology to work with, she says. One that requires    building trust between researchers and consumers. You can    propose any crazy encryption you want and say its secure. Why    should anyone believe you?  <\/p>\n<p>    Thats where federal review comes in.    In July, Lauters group, along with researchers from IBM and    academic institutions around the world         launched a process     to standardize    homomorphic encryption protocols. The National Institute for    Standards and Technology will now begin reviewing draft    standards and collecting public comments. If all goes well,    genomics researchers and privacy advocates might finally have    something they can agree on.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the rest here:<\/p>\n<p><a target=\"_blank\" href=\"https:\/\/www.wired.com\/story\/to-protect-genetic-privacy-encrypt-your-dna\/\" title=\"To Protect Genetic Privacy, Encrypt Your DNA - WIRED\">To Protect Genetic Privacy, Encrypt Your DNA - WIRED<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> In 2007, DNA pioneer James Watson became the first person to have his entire genome sequencedmaking all of his 6 billion base pairs publicly available for research.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/human-genetics\/to-protect-genetic-privacy-encrypt-your-dna-wired-2.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[4],"tags":[],"class_list":["post-238703","post","type-post","status-publish","format-standard","hentry","category-human-genetics"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/238703"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=238703"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/238703\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=238703"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=238703"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=238703"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}