{"id":1395,"date":"2007-12-13T23:35:15","date_gmt":"2007-12-13T21:35:15","guid":{"rendered":"http:\/\/www.wjst.de\/blog\/2007\/12\/13\/anonymizing-genetic-data\/"},"modified":"2007-12-13T23:36:01","modified_gmt":"2007-12-13T21:36:01","slug":"anonymizing-genetic-data","status":"publish","type":"post","link":"https:\/\/www.wjst.de\/blog\/sciencesurf\/2007\/12\/anonymizing-genetic-data\/","title":{"rendered":"Anonymizing genetic data"},"content":{"rendered":"<p>I have currently a paper under submission at the EJHG that covers ethical issues of genetic testing. One of the key messages is that genetic data are not anonymous if having simply stripped of names.<br \/>\nA story in a <a href=\"http:\/\/www.spiegel.de\/netzwelt\/web\/0,1518,523216,00.html\">completely different field<\/a> confirms my fears. According to a <a href=\"http:\/\/www.nytimes.com\/2007\/06\/04\/technology\/04netflix.html?_r=2&#038;oref=slogin&#038;oref=slogin\">NYT<\/a> article<\/p>\n<blockquote><p>\nLast October, Netflix, the online movie rental service, announced that it would award $1 million to the first person or team who can devise a system that is 10 percent more accurate than the company\u00e2\u20ac\u2122s current system for recommending movies that customers would like.\n<\/p><\/blockquote>\n<p>but things turned worse by an article of Narayanan und Shmatikov<!--more--> available at <a href=\"http:\/\/arxiv.org\/abs\/cs\/0610105\">arxiv.org<\/a><\/p>\n<blockquote><p>\nWe present a new class of statistical de-anonymization attacks against high-dimensional micro-data, such as individual preferences, recommendations, transaction records and so on. Our techniques are robust to perturbation in the data and tolerate some mistakes in the adversary&#8217;s background knowledge. We apply our de-anonymization methodology to the Netflix Prize dataset &#8230;\n<\/p><\/blockquote>\n<p>Basically, they use a scoring function to assign a numerical score to each record in the master dataset based on how well it matches the adversary\u00e2\u20ac\u2122s auxiliary information. The matching criterion is the algorithm that the adversary applies to the set of scores assigned by the scoring function to determine if there is a match. The ultimate record selection is done by a \u00e2\u20ac\u0153best-guess\u00e2\u20ac\u009d based on the record or a probability distribution, if needed. As far as I can see, <a href=\"http:\/\/www.wired.com\/politics\/security\/commentary\/securitymatters\/2007\/12\/securitymatters_1213\">this is a rather clever approach<\/a>, even better than what I am describing in my article.<br \/>\nThink of an individual (with &#8220;wet earwax&#8221; and even a few other strange characteristics) and I will be able to match his\/her online genetic dataset. Yea, yea.<\/p>\n\n<p>&nbsp;<\/p>\n<div class=\"bottom-note\">\n  <span class=\"mod1\">CC-BY-NC Science Surf , accessed 10.04.2026<\/span>\n <\/div>","protected":false},"excerpt":{"rendered":"<p>I have currently a paper under submission at the EJHG that covers ethical issues of genetic testing. One of the key messages is that genetic data are not anonymous if having simply stripped of names. A story in a completely different field confirms my fears. According to a NYT article Last October, Netflix, the online &hellip; <a href=\"https:\/\/www.wjst.de\/blog\/sciencesurf\/2007\/12\/anonymizing-genetic-data\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Anonymizing genetic data<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,9],"tags":[1435,1434,1432,67,1433,132],"class_list":["post-1395","post","type-post","status-publish","format-standard","hentry","category-genetics-biology","category-computer-software","tag-attack","tag-ethical_issues","tag-genetic_data","tag-genetic_testing","tag-nytimes","tag-privacy"],"_links":{"self":[{"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/posts\/1395","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/comments?post=1395"}],"version-history":[{"count":0,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/posts\/1395\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/media?parent=1395"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/categories?post=1395"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/tags?post=1395"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}