Robust Fingerprinting of Genomic Databases

04/04/2022
by   Tianxi Ji, et al.
0

Database fingerprinting has been widely used to discourage unauthorized redistribution of data by providing means to identify the source of data leakages. However, there is no fingerprinting scheme aiming at achieving liability guarantees when sharing genomic databases. Thus, we are motivated to fill in this gap by devising a vanilla fingerprinting scheme specifically for genomic databases. Moreover, since malicious genomic database recipients may compromise the embedded fingerprint by launching effective correlation attacks which leverage the intrinsic correlations among genomic data (e.g., Mendel's law and linkage disequilibrium), we also augment the vanilla scheme by developing mitigation techniques to achieve robust fingerprinting of genomic databases against correlation attacks. We first show that correlation attacks against fingerprinting schemes for genomic databases are very powerful. In particular, the correlation attacks can distort more than half of the fingerprint bits by causing a small utility loss (e.g.,database accuracy and consistency of SNP-phenotype associations measured via p-values). Next, we experimentally show that the correlation attacks can be effectively mitigated by our proposed mitigation techniques. We validate that the attacker can hardly compromise a large portion of the fingerprint bits even if it pays a higher cost in terms of degradation of the database utility. For example, with around 24 SNP-phenotype associations, the attacker can only distort about 30 bits, which is insufficient for it to avoid being accused. We also show that the proposed mitigation techniques also preserve the utility of the shared genomic databases.

READ FULL TEXT

page 2

page 5

page 6

page 7

page 8

page 10

page 11

page 12

research
03/11/2021

The Curse of Correlations for Robust Fingerprinting of Relational Databases

Database fingerprinting schemes have been widely adopted to prevent unau...
research
09/06/2021

Differentially-Private Fingerprinting of Relational Databases

When sharing sensitive databases with other parties, a database owner ai...
research
08/19/2013

Distance Correlation Methods for Discovering Associations in Large Astrophysical Databases

High-dimensional, large-sample astrophysical databases of galaxy cluster...
research
01/27/2020

Collusion-Resilient Probabilistic Fingerprinting Scheme for Correlated Data

In order to receive personalized services, individuals share their perso...
research
01/05/2022

An Investigation of "Benford's" Law Divergence and Machine Learning Techniques for "Intra-Class" Separability of Fingerprint Images

Protecting a fingerprint database against attackers is very vital in ord...
research
04/03/2023

A Latent Fingerprint in the Wild Database

Latent fingerprints are among the most important and widely used evidenc...
research
04/16/2020

Learning the Associations of MITRE ATT CK Adversarial Techniques

The MITRE ATT CK Framework provides a rich and actionable repository o...

Please sign up or login with your details

Forgot password? Click here to reset