2022
The evolving privacy and security concerns for genomic data analysis and sharing as observed from the iDASH competition
Kuo T, Jiang X, Tang H, Wang X, Harmanci A, Kim M, Post K, Bu D, Bath T, Kim J, Liu W, Chen H, Ohno-Machado L. The evolving privacy and security concerns for genomic data analysis and sharing as observed from the iDASH competition. Journal Of The American Medical Informatics Association 2022, 29: 2182-2190. PMID: 36164820, PMCID: PMC9667175, DOI: 10.1093/jamia/ocac165.Peer-Reviewed Original ResearchConceptsSensitive personal informationGenomic data analysisPotential future research directionsPersonal informationSecurity concernsGenomics data repositoryData repositoryReport lessonsProtection techniquesFuture research directionsPrivacyResearch directionsData usePractical challengesGenomic dataData analysisAnonymizationCommunity effortsRepositorySecurityBiomedical researchInformationDataChallenges
2018
Perfectly Secure and Efficient Two-Party Electronic-Health-Record Linkage
Chen F, Jiang X, Wang S, Schilling L, Meeker D, Ong T, Matheny M, Doctor J, Ohno-Machado L, Vaidya J. Perfectly Secure and Efficient Two-Party Electronic-Health-Record Linkage. IEEE Internet Computing 2018, 22: 32-41. PMID: 29867290, PMCID: PMC5983039, DOI: 10.1109/mic.2018.112102542.Peer-Reviewed Original ResearchPrivacy-preserving record linkagePrivacy/security concernsRecord linkage solutionsApproximate matching mechanismsPatient health dataSecurity concernsMatching mechanismLinkage solutionsHealth recordsHealth dataRecord linkageSecureSharingFirst stepPersonalized careEfficientPortable methodHealth record linkageAccessPrecision medicineData
2017
A community effort to protect genomic data sharing, collaboration and outsourcing
Wang S, Jiang X, Tang H, Wang X, Bu D, Carey K, Dyke S, Fox D, Jiang C, Lauter K, Malin B, Sofia H, Telenti A, Wang L, Wang W, Ohno-Machado L. A community effort to protect genomic data sharing, collaboration and outsourcing. Npj Genomic Medicine 2017, 2: 33. PMID: 29263842, PMCID: PMC5677972, DOI: 10.1038/s41525-017-0036-1.Peer-Reviewed Original ResearchGenomic data sharingData sharingSecure computation techniquesPrivacy-preserving techniquesPublic cloud servicesMagnitude performance improvementThird Critical AssessmentData outsourcingCloud servicesPrivacy challengesData privacyHuman genomic dataSecurity researchersPrivacy risksSensitive informationComputer privacyBeacon serviceBiomedical informaticistsSecurity concernsMemory requirementsCollaborative discoveryComputation techniquesComputational runtimePrivacyTrack 2