WO2017062599A1 - Techniques for determining whether an individual is included in ensemble genomic data - Google Patents
Techniques for determining whether an individual is included in ensemble genomic data Download PDFInfo
- Publication number
- WO2017062599A1 WO2017062599A1 PCT/US2016/055717 US2016055717W WO2017062599A1 WO 2017062599 A1 WO2017062599 A1 WO 2017062599A1 US 2016055717 W US2016055717 W US 2016055717W WO 2017062599 A1 WO2017062599 A1 WO 2017062599A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- ensemble
- individual
- genomic data
- queries
- data
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16B—BIOINFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR GENETIC OR PROTEIN-RELATED DATA PROCESSING IN COMPUTATIONAL MOLECULAR BIOLOGY
- G16B50/00—ICT programming tools or database systems specially adapted for bioinformatics
- G16B50/30—Data warehousing; Computing architectures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/903—Querying
- G06F16/90335—Query processing
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16B—BIOINFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR GENETIC OR PROTEIN-RELATED DATA PROCESSING IN COMPUTATIONAL MOLECULAR BIOLOGY
- G16B20/00—ICT specially adapted for functional genomics or proteomics, e.g. genotype-phenotype associations
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16B—BIOINFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR GENETIC OR PROTEIN-RELATED DATA PROCESSING IN COMPUTATIONAL MOLECULAR BIOLOGY
- G16B20/00—ICT specially adapted for functional genomics or proteomics, e.g. genotype-phenotype associations
- G16B20/10—Ploidy or copy number detection
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16B—BIOINFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR GENETIC OR PROTEIN-RELATED DATA PROCESSING IN COMPUTATIONAL MOLECULAR BIOLOGY
- G16B20/00—ICT specially adapted for functional genomics or proteomics, e.g. genotype-phenotype associations
- G16B20/20—Allele or variant detection, e.g. single nucleotide polymorphism [SNP] detection
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16B—BIOINFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR GENETIC OR PROTEIN-RELATED DATA PROCESSING IN COMPUTATIONAL MOLECULAR BIOLOGY
- G16B20/00—ICT specially adapted for functional genomics or proteomics, e.g. genotype-phenotype associations
- G16B20/40—Population genetics; Linkage disequilibrium
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16B—BIOINFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR GENETIC OR PROTEIN-RELATED DATA PROCESSING IN COMPUTATIONAL MOLECULAR BIOLOGY
- G16B50/00—ICT programming tools or database systems specially adapted for bioinformatics
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H10/00—ICT specially adapted for the handling or processing of patient-related medical or healthcare data
- G16H10/60—ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
Definitions
- genotype The genetic composition of an organism.
- Genomic data A list of alleles in the genotype of one or more individual organisms haplotype 1 - A combination of alleles (DNA sequences) at adjacent locations
- loci on the chromosome that are transmitted together.
- 2 - A set of single-nucleotide polymorphisms (SNPs) on a single chromosome of a chromosome pair that are statistically associated.
- a diploid organism is heterozygous at a gene locus when its cells
- Heterozygous genotypes are represented by a capital letter (representing the dominant allele) and a lowercase letter (representing the recessive allele), such as "Rr” or "Ss". The capital letter is usually written first.
- chromosome that can be used to determine the chromosome location of an arbitrary sequenced portion of DNA.
- nucleic acid A molecule comprising a sequence of one or more repeating chemical units known as “nucleotides” or “bases” or “base pairs” (bp). There are four bases in deoxyribonucleic acid (DNA): adenine, thymine, cytosine, and guanine, represented by the letters A, T, C and G, respectively.
- DNA deoxyribonucleic acid
- adenine adenine
- thymine cytosine
- guanine represented by the letters A, T, C and G, respectively.
- RNA Ribonucleic acid
- U base uracil
- T base thymine
- reference panel A full set of haplotypes represented in a population, each haplotype represented by a set of SNPs at known positions relative to a set of markers along each chromosome.
- sample includes any biological specimen obtained from a subject
- Site frequency the number of different alleles relative to a reference genome in an spectrum ensemble of N individuals, which occur a given multiple of times for several different multiples from 1 to N-l.
- Site frequency the number of minor alleles in an ensemble of N individuals without a spectrum, folded reference genome, which occur a given multiple of times for several different multiples from 1 to N/2.
- SNP Single-nucleotide polymorphism a DNA sequence variation occurring when a single nucleotide in the genome (or other shared sequence) differs between members of a biological species or paired
- chromosomes in an individual.
- the vast majority of polymorphic sites are bi-allelic, meaning that no more than two possible distinct alleles can be observed at these sites.
- a 0 indicates one nucleotide at the position of the SNP and a 1 indicates a different nucleotide.
- mammals e.g., humans, dogs, cows, horses, kangaroos, pigs, sheep, goats, cats, mice, rabbits, rats, and transgenic non-human animals as well as plants and protists. Synonyms used herein include “patient” and "animal”.
- Treating Taking steps to obtain beneficial or desired results, including clinical results, such as alleviating or ameliorating one or more symptoms of a disease; diminishing the extent of disease; delaying or slowing disease progression; ameliorating and palliating or stabilizing a metric (statistic) of disease.
- Treatment refers to the steps taken. [0003] Most humans carry two copies of every chromosome in their genome— one inherited from the mother, the other from the father. Current genotyping and sequencing technologies have enabled the ability to rapidly and inexpensively discover the genotypes of an individual at a large number of sites in the genome (based on the SNPs in the vicinity of various markers).
- Genotype information in the form of genomic data gives the occurrence of the alleles, e.g., the existence of multiple values for each of one or more of the SNPs.
- the human genetics community has provided for secure sharing of genomic data from patient participants in genetic research. Beacons are web servers that answer allele presence queries such as "Do you have a genome that has a specific nucleotide (e.g., A) at a specific genomic position (e.g., position 11272 on chromosome 1)?" with "Yes'V'No" responses.
- beacons for which the occurrence of different alleles in populations of a certain phenotype, e.g., Eastern Europeans or cancer patients, is available.
- forensic data collected at a crime scene may have samples with DNA from many contributors, such as victims, bystanders and perpetrators, resulting in another mix of alleles.
- Inventors have recognized that these ensembles can be penetrated to determine the likelihood that an individual, with at least some known alleles, is a member of the ensemble, even if allele frequency in the ensemble is not known.
- these new techniques use a known or inferred site frequency spectrum to determine whether genomic data of an individual is included in ensemble genomic data, and thus whether the individual is a member of the ensemble.
- a method in a first set of embodiments, includes obtaining first site frequency spectrum data that indicates a site frequency spectrum for alleles in first genomic data aggregated for an ensemble of unknown individuals. The method also includes determining a number N that indicates a number of individuals whose individual genomic data are aggregated in the first genomic data. The method further includes determining automatically on a processor, based on the first site frequency spectrum data and the number N, both a number NQ and a number NY, wherein the number NQ is a number of queries to employ, wherein each query requests whether a particular allele from an individual is present in the first genomic data, and the number NY is a number of yes responses that indicate a particular likelihood that the individual is a member of the ensemble. The method still further includes providing output based on at least one of NQ or NY.
- responses to one source of queries are provided only for fewer than NQ queries in a predetermined time interval, e.g., to protect individual identities in a beacon.
- the method further includes determining whether an individual subject is a member of the ensemble based on responses to the NQ queries and the value of NY.
- NQ queries are submitted to a system that manages the first genomic data.
- at least NQ alleles are selected at random from second genomic data determined for a sample collected from a particular individual subject.
- submitting the queries includes submitting a query for each of the at least NQ alleles selected at random from the second genomic data.
- the method includes accumulating a number of affirmative responses to the at least NQ queries and determining the likelihood that the particular individual subject is a member of the ensemble based on the number of affirmative responses and the threshold number NY.
- the method includes presenting on a display device output data that indicates the likelihood that the particular individual is a member of the ensemble.
- a computer-readable medium or a system is configured to perform one or more of the steps of one or more of the above methods.
- FIG. 1 is a block diagram that illustrates example markers and SNPs along a chromosome, according to an embodiment
- FIG. 2A is a block diagram that illustrates highly simplified example genomic data for an ensemble compared to genomic data of individuals in the ensemble, according to an embodiment
- FIG. 2B is a block diagram that illustrates highly simplified example genomic data for an individual not part of the ensemble that might give a false positive for membership in the ensemble, according to an embodiment
- FIG. 3 is a block diagram that illustrates highly simplified example site frequency spectrum for an ensemble that is used to determine likelihood of membership, according to an embodiment
- FIG. 4 is a flow diagram that illustrates an example method for determining likelihood that an individual is a member of an ensemble, according to an embodiment
- FIG. 5 is a block diagram that illustrates a computer system upon which an embodiment of the invention may be implemented
- FIG. 6 illustrates a chip set upon which an embodiment of the invention may be implemented
- FIG. 7 is a graph that depicts the dependence of the beta function, used to describe a site frequency spectrum (SFS), on two shape parameters, according to an embodiment
- FIG. 8A is a graph that illustrates example power of the method for simulated data for an individual, according to an embodiment
- FIG. 8B is a graph that illustrates example power of the method for simulated data for relatives of an individual, according to an embodiment
- FIG. 8C is a graph that illustrates example power versus false positive rate in simulated data for relatives of an individual when the number of queries (NQ) is 16,000, according to an embodiment
- FIG. 8D is a graph that illustrates example power versus false positive rate in simulated data for different error rates when the number of queries (NQ) is 16,000, according to an embodiment
- FIG. 9A is a graph that illustrates example power of the method for real data for an individual, according to an embodiment
- FIG. 9B is a graph that illustrates example power of the method for real data for an individual using censored or SNP beacon responses, according to an embodiment
- FIG. 1 OA is a block diagram that illustrates example beacons constructed from multiple datasets, according to an embodiment
- Figure 10B is a graph that illustrates example power of tests for beacons containing multiple populations, according to various embodiments.
- a method and apparatus are described for determining likelihood that an individual is a member of an ensemble based on ensemble genomic data.
- numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to avoid unnecessarily obscuring the present invention.
- membership is determined for a forensic sample collected at the scene of an incident being investigated, where the individual is one of a prospective or suspected victim, a prospective or suspected bystander or witness, or a prospective or suspected perpetrator.
- FIG. 1 is a block diagram that illustrates example markers 241, 242, 243, 244, 245 and SNPs 231, 232, 233, 234, 235, 236, 237 as alleles along a chromosome indicated by chromosomal position 240, according to an embodiment.
- the genomic data is a list of 0s and Is, each representing the presence (1) or absence (0) of an allele in the individual.
- EHRs Electronic Health Records
- the Beacon Project by the Global Alliance for Genomics and Health aims to simplify data sharing through a web service (“beacon") that provides only allele presence information. Users can query institutional beacons for information about genomic data available at the institution.
- beacon server can answer "Yes” or "No".
- Beacons are intended to be easy to setup and to allow data sharing while protecting participant privacy. By providing only allele presence information, beacons are safe from re-identification attacks that require allele frequencies.
- beacons often summarize data having a particular disease of interest. For instance, identifying that a given genome is part of the SFARI beacon, which contains genomic data from families with a child having autism spectrum disorder, means that the individual belongs to a family where some family member has autism spectrum disorder. Thus, if beacons leak membership information, then they also leak phenotype information. While genetic privacy is protected to some extent by the Genetic Information Nondiscrimination Act (GIN A), the offered protections are limited, and GINA does not apply for long term care insurance, life insurance, disability insurance and other special cases (Rothstein 2008). Therefore, data-sharing mechanisms such as beacons must protect participant privacy.
- GIN A Genetic Information Nondiscrimination Act
- FIG. 2A is a block diagram that illustrates highly simplified example genomic data for an ensemble compared to genomic data of individuals in the ensemble, according to an embodiment. For simplicity each individual is represented by the state of six alleles, represented by boxes lettered A through F going left to right in the diagram. The presence of an allele is indicted by a shaded box to represent a 1 and a white box to represent a zero. The genomic data of three individuals are depicted.
- the first individual has alleles A, D and F; the second (middle) has alleles A and B, and the third individual (bottom) has alleles A and D.
- No individual has alleles C or E.
- any allele that is found in any individual is marked with a one (shaded), but no information is given on how many times each allele occurs in the ensemble.
- the beacon is not presented to users of the beacon in its entirety, but instead a user is required to indicate a single allele (by chromosome and position) and in response the beacon returns an affirmative (e.g., 1) if shaded, or negative (e.g., 0) if unshaded.
- the human genome includes many millions of alleles and any individual can have anywhere from about 3 million to about 5 million alleles present, it is tedious and time consuming to query a beacon for every allele. If the individual is a member of the ensemble, then every query of the individual's alleles should return a yes. If the genomic data of the individual and the beacon were without noise, a singe negative response would rule out membership of that individual in the ensemble. Because the genomic data can have noise, it is considered that one cannot be sure if an individual is a member of the ensemble that formed the beacon just because a few responses are negative.
- FIG. 2B is a block diagram that illustrates highly simplified example genomic data for an individual not part of the ensemble that might give a false positive for membership in the ensemble, according to an embodiment.
- This individual has alleles B and D. Queries on both these alleles would return a positive response from the beacon.
- the individual is not a member of the ensemble, i.e., is not one of the three individuals whose genomic data is depicted in FIG. 3A. Because the beacons can give such false positives, it is further considered that one cannot be sure if an individual is a member of the beacon.
- genomic data can be obtained for the ensemble of persons, as in a beacon.
- an ensemble refers to a collection of one or more individuals whose genomic data is combined in a beacon or simulation or by sequencing a forensic sample or experimental sample or other sample.
- Ensemble beacons or ensemble genomic data refers to genomic data based on the genomic data of the individuals in the ensemble even if combined as in beacons or forensic samples.
- beacon data if a site frequency spectrum (SFS, also called an allele frequency spectrum) is known or can be inferred, and if a number (N) of members of the ensemble is known or can be bracketed, and if a mismatch rate (S) for genomic data can be estimated or bracketed based on noise in obtaining genomic data for the individual and the ensemble, then a likelihood that an individual is a member of the ensemble can be determined based on the number of positive response received from a given number of queries. Furthermore, because relatives have similar alleles to an individual, the likelihood that a relative of the individual is included in the ensemble can also be determined based only on the genomic data for the individual.
- S site frequency spectrum
- FIG. 3 is a block diagram that illustrates highly simplified example site frequency spectrum for an ensemble that is used to determine likelihood of membership, according to an embodiment. Looking at the data in FIG. 2A, it is clear that allele A is a tripleton, allele B is a singleton, allele D is a doubleton and allele F is a singleton in the individual genomes. Thus there are two singletons, one doubleton and one tripleton. This is shown in FIG. 3, by the values (2, 1, 1) in the site frequency spectrum. Note that no specific allele information is provided. Thus a query is also needed for any specific allele.
- SSS site frequency spectrum
- the inventors have discovered how the site frequency spectrum provides information on the likelihood that enough queries have been advanced to determine whether an individual or family member of the individual is a member of the ensemble. Thus the likelihood of membership can be determined even without knowing frequency of individual alleles in the ensemble. This is an advantage in some embodiments, because while allele frequencies can vary greatly among ensembles, site frequency spectra have a tendency to be similar in ensembles from one species (e.g., all human ensembles). So even if a specific SFS is not known, one can be estimated from a similar population or for humans in general.
- all members of the example ensemble have allele A. This is possible because alleles are defined relative to a reference sequence (e.g., the consensus human genome) independent of the ensemble, and not by differences that occur only within the ensemble. Otherwise, all members of the ensemble would have the same sequence at position A and that positon would not be considered an allele position. This also makes clear that, in an ensemble of N individuals, it is possible to have one or more alleles with a frequency of N. In some embodiments, alleles are defined within the ensemble and an allele can have no more than N-l occurrences. If the most common version of the allele is considered normal (allele absent) then no allele can have more than N/2-1 occurrences.
- beacon data by advancing enough queries almost any degree of certainty can be achieved in a statement about whether an individual belongs to an ensemble. For any degree of certainty desired, a number of queries and number of positive responses can be determined that will indicate membership with that degree of certainty. [0042]
- Such a result has a disadvantage of exposing the individual as a member of the ensemble, e.g., an ensemble of persons with a particular phenotype, e.g., a disease or condition associated with the beacon, thus infringing on that individual's privacy.
- procedures for querying the beacon should be changed to compensate, e.g., by limiting the number of queries from any source, e.g., in a predetermined time period, such as one month, one year or all time.
- a predetermined time period such as one month, one year or all time.
- this same result has an advantage of determining whether an individual (e.g., suspect or victim) contributed to a sample mixing DNA from multiple persons, as in a forensic sample. As a result, a suspect can be placed at the scene where the sample was collected with a specified degree of likelihood.
- FIG. 4 is a flow diagram that illustrates an example method for determining likelihood that an individual is a member of an ensemble, according to an embodiment.
- steps are depicted in FIG. 4 as integral steps in a particular order for purposes of illustration, in other embodiments, one or more steps, or portions thereof, are performed in a different order, or overlapping in time, in series or in parallel, or are omitted, or one or more additional steps are added, or the method is changed in some combination of ways.
- a source of genomic data for an ensemble is identified.
- a particular beacon is identified (such as the AMPlab, ICGC and NCBI beacons, among others, see tables below), or DNA sequencing of a forensic sample is obtained from a service or by use of an SNP micro array, or any other method known in the art at the time the method is implemented.
- a site frequency spectrum is determined for the ensemble. If one is published for the beacon, then that SFS is used. If not, then in some embodiments, the published SFS for a similar population, e.g., same ethnic composition, or similar medical condition, is used. In some embodiments, a SFS for the consensus human genome is used. Thus the approach is generalizable to many populations. In some embodiments, the SFS is parameterized by the values of two shape parameters a' and V of a Beta distribution, as described in more detail below.
- a number of individuals in the ensemble is determined. In some embodiments, that number is given. In other embodiments, when the number N is not known, a conservative estimate of the number is made. The larger is the number of individuals in the ensemble, the more uncertain is the result. Thus a conservative estimate is a number reasonably expected to be greater than or equal to an unknown number of individuals in the ensemble.
- a mismatch rate is determined for the ensemble genomic data. This is the probability that a query that should return an affirmative response instead returns a negative response.
- the mismatch rate is published or estimated using any method known in the art at the time the method is implemented. The example embodiments below demonstrate some example ways to determine the mismatch rate. In some embodiments, the mismatch rate is assumed to be zero and step 407 is omitted.
- step 411 the number of different alleles to query (NQ) and the number of affirmative responses (NY) to achieve a certain degree of certainty (also called likelihood) in the membership result is determined based on the values for the SFS, N and S.
- NQ the number of different alleles to query
- NY the number of affirmative responses
- ⁇ the degree of certainty in the membership result is determined based on the values for the SFS, N and S.
- test statistic ⁇ is computed as a difference or ratio of likelihoods for a null hypothesis that the individual is not a member of the ensemble and an alternate hypothesis that an individual is a member of the ensemble.
- the likelihood of the beacon responses to n allele presence queries is calculated under the null hypothesis Ho (e.g., that a given individual or relative is not in the beacon) and again under an alternative hypothesis Hi (e.g., that the given individual or a relative is in the beacon).
- the test statistic ⁇ is calculated as the ratio of the two likelihoods as given by Equation 4 below. In other embodiments another statistic is based on the two likelihoods.
- the log likelihood is determined for the null hypothesis and the alternative hypothesis, and the two log likelihoods are compared. A determination is made of whether the alternative hypothesis is true is based on a comparison of the two likelihoods, e.g., by a difference or ratio.
- a relationship between the number of queries (required to achieve a desired power and false positive rate) and the number of individuals in the beacon is given by Equation 6 below for an individual.
- N represents the number of individuals in ensemble;
- n represents the number of queries.
- the relationship is given by Equation 9 below for a relative with degree of similarity given by the parameter ⁇ .
- a result of step 411 is a number of queries (NQ) that should be advanced to the beacon (equivalent to a number of alleles to identity in the forensic sample) to determine membership at a particular level of certainty (a certain statistical power).
- the statistical power is a function of the false positive rate or that can be tolerated.
- genomic data is determined for an individual test subject, e.g., from a record on file or from a DNA sequencing service from a sample drawn from the individual test subject, including results from a SNP micro array.
- the number of alleles identified in the individual should be at least the number of queries (NQ) to determine membership at the desired level of certainty and preferably many times that number.
- step 415 a number NQ of alleles are selected at random. There is no need to require that the selected alleles be singletons or have any other particular frequency. In some embodiments, however, only the most rare SNPs in a population that are also present in the individual are selected.
- step 417 it is determined how many of the selected alleles from the individual are present in the ensemble (e.g., how many positive responses are received from the beacon or how many of the selected alleles are listed in the genomic data for the forensic sample).
- step 421 the likelihood that the test subject is a member of the ensemble is determined. For example, if the number of yes responses from the beacon (or alleles found in the forensic sample) are at or greater than the threshold number NY determined in step 411, then it is determined that the test subject is a member of the ensemble at the level of certainly associated with the threshold.
- output data is presented based on NQ or NY.
- output indicating the likelihood is presented on a display device, such as display 514 described below with reference to FIG. 5.
- treatment of the test subject is based at least in part on the output. For example, if the test subject is a member of an ensemble that has a certain disease or responds to a certain treatment, then the test subject is diagnosed with that disease or given that certain treatment.
- the method 400 is executed on the beacon side, e.g., at a server that provides the beacon service, and steps 413 through 421 are omitted.
- step 423 includes limiting the number of queries from any one source or user identifier to a number less than NQ associated with a certainty of about 50%, or selected in a range from about 20% to about 50%.
- the limit on number of queries accepted from a single source is enforced for a predetermined time interval or period, e.g., for one week or one month or one year or for all time.
- the responses are censored and a query for an SNP associated with a rare allele is indicated to be absent in the response, even if it is present in the ensemble.
- these techniques allow robust identification of individuals from DNA mixtures (e.g., using SNP micro-array data) for many populations in a way that is independent of the actual frequency of each individual allele, or prevent or inhibit unintentional identification of an individual as a member of an ensemble, such as a beacon. .
- beacons can disclose membership and phenotypic information about participants and may not adequately protect privacy. Risk mitigation is proposed for some embodiments through policies and standards such as not allowing anonymous pings of genetic beacons, limiting a number of queries from a single source in a predetermined time period, or requiring minimum beacon sizes, among others, or some combination.
- Bi-allelic SNPs in beacon comprised of unrelated individuals from a single population.
- the Beta distribution is a continuous probability distribution, and has been applied to model the behavior of random variables limited to intervals of finite length in a wide variety of disciplines. For example, it has been used as a statistical description of allele frequencies in population genetics. Thus, it is assumed that alternate allele frequencies /for all SNPs observed in the population are distributed as ⁇ Beta(a ?').This is justified, for example, by Sankararaman 2009 or Clayton 2010.
- PDF probability density function
- FIG. 7 is a graph that depicts the dependence of the Beta function used to describe a site frequency spectrum (SFS) on two shape parameters, according to an embodiment.
- the horizontal axis indicates the value of a normalized independent variable, such as copy number for an allele normalized by the number of copies in an ensemble, and the vertical axis indicates the probability of that value.
- the distribution can be shaped to fit suitable empirical data, such as an SFS that indicates the distribution of allele copies in an ensemble of subjects, based on the two shape parameters ', b
- suitable empirical data such as an SFS that indicates the distribution of allele copies in an ensemble of subjects.
- LRT likelihood ratio test
- the method can differentiate query genome of individuals who are in the beacon from the query genome of individuals who are not in the beacon.
- This approach for re- identifying individuals within a beacon is based on a likelihood ratio test that uses the response information. For each query genome, the likelihood of the beacon responses to n allele presence queries is calculated under the null hypothesis Ho that a given individual is not in the beacon and again under the alternative hypothesis Hi that the given individual is in the beacon.
- a test statistic ⁇ is calculated as the ratio of the two likelihoods.
- results from a test that depends on the shape of the SFS but is independent of the actual frequencies of individual alleles can be generalized to many populations, e.g., using shape parameters of a' about 0.1 and V about 1.0 for human genome datasets of unknown allele frequencies and unknown SFS.
- shape parameters of a' about 0.1 and V about 1.0 for human genome datasets of unknown allele frequencies and unknown SFS The shape of such a distribution would be expected to be something like a trace 713 of FIG. 7 for which the magnitude of V is several times the magnitude of ' .
- a determination is made of whether the alternative hypothesis is true based on a comparison of the two likelihoods, e.g., by a difference or ratio. In this illustrated embodiment, a ratio of the two likelihoods is determined.
- the null hypothesis is that the test subject (query genome) is not in the ensemble and the alternative hypothesis is that the test subject is in the ensemble.
- the log likelihood is computed as given by equation (7)
- DN-I is the probability that none of N-l genomes in the ensemble has an alternative allele at a given position, which can be determined from the SFS.
- the example embodiment uses Equation 7 and the derivation of Equation 7 is not needed to practice the embodiment; therefore the derivation of Equation 7 is not repeated here.
- the derivation is incorporated by reference to the provisional application, as cited above.
- Equation 8 Equation 8 is not repeated here.
- the derivation is incorporated by reference to the provisional application, as cited above.
- DN and DN-I are determined as follows. DN is defined as the probability that none of N individuals have an alternative allele.
- Equation 9a is evaluated using the Gamma function, ⁇ .
- G(i) / 0 °° x t ⁇ 1 e ⁇ x dx.
- Equation 9b rco - jfe)' ⁇ 9b
- Equation 9d This example embodiment uses Equation 9d, and the derivation of Equation 9d is not needed to practice the embodiment; therefore the derivation of Equation 9d is not repeated here.
- the derivation is incorporated by reference to the provisional application, as cited above.
- DN-I is defined as the probability that none of N-l individuals have an alternative allele.
- Equation 9d This can be approximated with Equation 9d by replacing N in Equation 9d with (N-l).
- the test statistic ⁇ in this embodiment is based on a log of the ratio of the likelihoods of the two hypotheses, and therefore is based on the difference of the log likelihoods, as given by Equation 11a.
- Equation 8 L m (R) - L H1 (R) (11a) which, after substituting Equation 8 for the first term and Equation 7 for the second term, yields
- Equation l ib through l id uses Equation l ib through l id, and the derivation of Equations l ib through l id is not needed to practice the embodiment; therefore the derivation of Equations l ib through l id is not repeated here.
- the derivation is incorporated by reference to the provisional application, as cited above.
- the x,- (whether an allele is present in the ensemble) can only take two values: 1 (present) or 0 (absent). So each x,- is a Bernoulli random variable by definition.
- the x,- are assumed to be independent and identically distributed (i.i.d.).
- the likelihood ratio test, l ib is the most powerful test for a given test size.
- the size of a test in hypothesis testing literature is defined as the probability of falsely rejecting the null hypothesis (e.g., falsely claiming an allele is present in the beacon when it is in fact absent). So the test size can be considered to be the (expected) false positive rate when the null hypothesis is true, given by a false positive rate, .
- the null hypothesis is rejected if the likelihood is much less than the likelihood of the alternative. This is expressed in terms of ⁇ ⁇ t for some threshold t.
- the threshold is selected to meet some arbitrary false positive rate, , e.g., a false positive rate of 1% or 5%.
- a threshold ⁇ associated with a given false positive rate or is one such that the test statistic ⁇ will be less than that threshold, t a , with a probability of Qr,as given by Equation 12.
- Equations 13a and 13b is not needed to practice the embodiment; therefore the derivation of Equations 13a and 13b is not repeated here.
- the derivation is incorporated by reference to the provisional application, as cited above.
- the normalized threshold t' a serves as the number NY that is a number of yes responses that indicate a particular likelihood (particular false positive rate, a) that the individual is a member of the ensemble.
- the likelihood that the conclusion is correct, ⁇ - ⁇ , is called the power of the test, where ?is the probability that the conclusion is erroneous.
- the power can be estimated as follows. Because the x,- are Bernoulli random variables with known estimates of probabilities # under the various hypotheses, the binomial distribution properties can be used to compare the distributions and estimate the power of the test of Equations 13a andl3b.
- the x,- are independent and identically distributed under each hypothesis, therefore the number of yeses xi) expected under each hypothesis is given by the Binomial distribution. For example, in this illustrated embodiment the number of yesses expected is given by Binomial(n, 1-DN) for the null hypothesis and Binomial(n, for the alternate hypothesis. Therefore the power of the test is given by Equation 13c.
- n the number of queries, n, may have to be increased to get a useful result.
- NQ a suitable number of queries
- the likelihood ratio test (LRT) statistic ⁇ has a Gaussian distribution.
- the parameters of the Gaussian distribution can be used to obtain a relationship between the number, n, of queries (required to achieve a desired power, ⁇ - ⁇ , and false positive rate, ) and the number, N, of individuals in the beacon.
- n ⁇ ⁇ - ⁇ _ ⁇ ⁇ ⁇ ( ⁇ ' + 1)2"' + 1
- Equation 15 is independent of both n and N and depends on both the false positive rate or and the power ⁇ - ⁇ .
- NQ is proportional to the denominator of the left side of Equation 15, which is N a'+1 .
- equations 15 and 13b provide the values for NQ and NY, respectively, in step 411.
- the relatedness of two individuals can be parameterized using a single parameter ⁇ which is the probability that the two individuals share an allele at a single SNP.
- ⁇ is the probability that the two individuals share an allele at a single SNP.
- the genotype probabilities for a relative with relatedness ⁇ can be determined given the genotype of the individual.
- Equations 16a through 16c This example embodiment uses Equations 16a through 16c, and the derivation of Equations 16a through 16c is not needed to practice the embodiment; therefore the derivation of Equations 16a through 16c is not repeated here.
- the derivation is incorporated by reference to the provisional application, as cited above.
- Equation 16d The LRT statistic is calculated using the expressions of Equations 16a through 16c.
- the distribution of the null hypothesis is the same as before, the distribution of the alternate hypothesis Hi is given by Equation 16d
- the beacon is modified based on the NQ or NY that are useful to re-identify an individual in the beacon. Because the rare alleles with low frequency in the SFS provide the most information about an individual, in a censoring approach, a YES response is not returned for queries for the rare SNPs. That is, one solution to the re-identification problem is to return accurate responses only for common variants. Thus, a setting is considered in which the beacon chooses a threshold frequency/* and returns "No" responses to queries for alleles that have frequency less than or equal to/* in the population (not necessarily in the beacon samples). For alleles at frequency larger than/*, the beacon will return an accurate response.
- Equation 17a through 17a through 17c The probability of a false result given the alternate hypothesis is given by Equation 17a through 17a through 17c.
- I y (a,b) is the cumulative distribution function for a Beta distribution with shape parameters a and b at value y.
- This example embodiment uses Equations 17a through 17c, and the derivation of Equations 17a through 17c is not needed to practice the embodiment; therefore the derivation of Equations 17a through 17c is not repeated here.
- the derivation is incorporated by reference to the provisional application, as cited above
- Equation 17a through 19a through 19c The probability of a false result given the alternate hypothesis is given by Equation 17a through 19a through 19c.
- Equations 19a through 19c uses Equations 19a through 19c, and the derivation of Equations 19a through 19c is not needed to practice the embodiment; therefore the derivation of Equations 19a through 19c is not repeated here.
- the derivation is incorporated by reference to the provisional application, as cited above.
- the Gaussian approximation can be used to obtain an estimate of the optimal censoring frequency/*.
- the Gaussian distribution of the sums for the two hypotheses are given by Equations 21 to 24.
- ⁇ 1 ⁇ + nC(l - E N _ t ) (21)
- Equation 25 the power is given by Equation 25.
- Equation 14 ⁇ (1- ⁇ ) ⁇ ( ⁇ - ⁇ ).
- Equation 25 uses Equations 21 through 25, and the derivation of Equations 21 through 25 is not needed to practice the embodiment; therefore the derivation of Equations 21 through 25 is not repeated here.
- the derivation is incorporated by reference to the provisional application, as cited above. All terms in Equation 25 depend on/*, n, N, a, b, or and ⁇ .
- All terms in Equation 25 depend on/*, n, N, a, b, or and ⁇ .
- a beacon with N individuals from a population with SFS parametrized by Beta(a- ⁇ , b-Y) while allowing n queries given a desired false positive rate or and maximum allowable power ⁇ - ⁇ one can find the censoring threshold/*.
- An analytical solution cannot be obtained for/* due to the form of the cumulative distribution function.
- a grid search over/* can be used to be find the optimal value for censoring threshold.
- the mismatch rate ⁇ between the beacon and the 200 query copies of the same genomes was set to one part per million to simulate near ideal data quality.
- FIG. 8A is a graph that illustrates example power of the method for simulated data for an individual, according to an embodiment.
- the horizontal axis indicates the number of queries, NQ, each query asking whether a single SNP is present in the simulated beacon.
- the vertical axis indicates the power of test.
- the dashed line indicates the theoretical power given by Equation 13c, and the solid line gives the empirical power observed in the simulation. It can be seen that the LRT has more than 95% power for detecting whether an individual is in the beacon with just 5,000 SNP queries. It can also be seen that the theoretical analysis matches the empirical results very well.
- FIG. 8B is a graph that illustrates example power of the method for simulated data for relatives of an individual, according to an embodiment.
- the horizontal axis indicates the number of queries, NQ, each query asking whether a single SNP is present in the simulated beacon.
- the vertical axis indicates the power of test.
- the logarithmic horizontal axis indicates false positive rate (a) and the vertical axis indicates power ( ⁇ - ⁇ ).
- Empirical power and false alarm rates were determined when mismatch rates S
- a beacon was generated using the CEU (Western European) population from Phase 1 of the 1000 Genomes Project [8]. Of the 85 CEU samples present in Phase 1, 65 are used in the beacon. 20 samples from the beacon and the remaining 20 samples are used as query genomes. Whole genomes were then used to query the beacon, as before. To test if sharing SNP array data was more secure than sharing whole genomes, we repeated the setup with Affymetrix array data for the CEU samples. SNP array data was then used to query the beacon.
- the response from a beacon is based on the values of NQ and NY, as described above for step 423.
- censoring is invoked to change the beacon response to queries for SNPs of low frequency in the beacon in order to protect the identity of individuals in the beacon.
- a beacon was constructed using the same data as above, except that the beacon always responded "No" to each query for a SNP that is a singleton in the beacon.
- FIG. 9A is a graph that illustrates example power of the method for real data for an individual, according to an embodiment.
- the horizontal axis indicates the number of queries, NQ.
- the vertical axis indicates the power of test.
- the dashed line indicates the theoretical power given by Equation 13c for a 5% false positive rate, and the solid line gives the empirical power observed in the data. Using just 250 SNPs, beacon membership can be detected with 95% power and 5% false positive rate.
- FIG. 9B is a graph that illustrates example power of the method for real data for an individual using censored or SNP beacon responses, according to an embodiment.
- the horizontal axis indicates the number of queries, NQ.
- the vertical axis indicates the power of test.
- a trace is shone for responses based on the microarray subset of SNPs, on the whole genome sequencing (WGS) data set (as plotted in FIG. 9A) and on the censored WGS data set for which a query for a SNP that is a singleton in the data set receives a "No" response from the beacon.
- WGS whole genome sequencing
- a beacon constructed using the same individuals but with SNP array data shows a reduction in power, as does a beacon which uses sequence data but censors responses by always replying 'No' to queries for singletons. Even in these scenarios, the LRT has greater than 90% power if 10,000 or more queries are permitted.
- FIG. 10A is a block diagram that illustrates example beacons constructed from multiple datasets, according to an embodiment.
- CEU indicates an SNP reference panel based on central European, Ukraine genomes
- JPT indicates an SNP reference panel based on Japan, Tokyo genomes
- YRI indicates an SNP reference panel based on Yoruba of Ibadan, Nigeria genomes.
- multiple beacons were constructed that contained either a single population (65 CEU individuals) or multiple populations (a CEU+YRI beacon with 32 CEU and 33 YRI individuals and a CEU+JPT beacon with 32 CEU and 33 JPT individuals). 40 CEU individuals were used as query individuals, with 20 belonging to all beacons and 20 belonging to none of the beacons.
- Figure 10B is a graph that illustrates example power of tests for beacons containing multiple populations, according to various embodiments.
- the horizontal axis indicates the number of queries, NQ.
- the vertical axis indicates the power of test.
- a trace is plotted for each of the three beacon populations. The results show that for a fixed number of SNPs to query, the power for the multi-population beacons is higher than that for the CEU-only beacon.
- a single-population beacon is therefore more secure than a multi-population beacon of the same size. Since the protective effect of extra samples in the beacon against re- identification depends on their allele sharing with the query genome, including other populations in a beacon is less effective than including the same number of individuals from the population of the query genome.
- beacon metadata was used to infer the number of individuals present in the beacon. Where this was not possible (the AMPlab, ICGC and NCBI beacons), conservative estimates were used based on the size of the underlying datasets. For SFS parameters, the estimates for the simulation data, described above, were used.
- the Known Variants beacon contained 63,500 exomes and 8,400 whole genomes. Since exomes are only 1% of entire genomes in length, this beacon can be assumed to consist of two beacons: an exome beacon with 72,000 exomes; and a genome beacon with 8,400 whole genomes. Re-identification is possible in the genome beacon by avoiding queries for SNPs in the coding regions. The results of the computation for multiple existing beacons are summarized in Table 4.
- the proposed LRT provides a demonstration that individual privacy can be compromised through beacons.
- the illustrated embodiment was presented to show that beacon membership can be identified using only the query genome, even if allele frequencies are not known.
- the bounds obtained for the number of queries required for re-identification (Table 4) are conservative and need not be used directly to guide the construction of beacons.
- a re-identification test that uses only rare SNPs and/or incorporates the allele frequencies at SNPs is expected to be more powerful than the illustrated embodiment and will require fewer queries than the estimates of Table 4.
- a computational performance limitation is that establishing high confidence may need millions of queries, which can take many months to perform.
- 1000 queries to the beacon server (for all beacons) was made in 3 hours 53 minutes, with a 5 second delay between queries accounting for 1.4 hours of the total time.
- beacon samples and the query genome belong to the same population. This is a reasonable assumption since beacons often publish the ethnicity of the datasets included while the ethnicity of the query genome can be identified by comparing it to reference panels like 1000 Genomes. Genotypes are assumed to be distributed according to Hardy- Weinberg equilibrium. It is also assumed that allele queries are independent, which can lead to overly confident predictions for common SNPs. It is expected that this assumption will not affect these results significantly, since most SNPs are rare ( ⁇ 5% frequency) in human populations.
- beacons listed in Table 4 which index genomic data that is not publicly available, four are associated with a single phenotype (Cafe CardioKit, ICGC, IBD, SFARI beacons), three are associated with multiple phenotypes (Broad Institute, NCBI, UKlOK beacons) and one is not associated with any phenotype (Native American+Egyptian beacon).
- Table 5 lists the phenotypes associated with various beacons.
- a dataset is denoted as "public” if individual-level genotype data can be downloaded with requesting access. Beacons which index non-public data are shown in bold. For beacons indexing public data, the phenotype is listed as “N.A.” (not applicable).
- genomic risk prediction has high success rates for mendelian diseases with highly penetrant alleles and in some cancers, the success of such approaches for predicting common disease risk is modest (Shrodi 2014).
- An upper bound on the performance of genomic risk prediction using an individual's genome can be obtained by considering the (broad-sense) heritability of the disease being studied. Polderman et al. (2015) examined the heritability of 17,804 human traits. From their analysis, one can see that 26 out of 43 ICD 10-ICF sub-chapter level disease categories have heritability less than 50%, suggesting that the performance of genomic risk prediction for many disease categories will be limited.
- beacons are designed to help researchers find datasets relevant to their research interests (e.g., containing an allele that the researchers may have previously found associated in a genome-wide association study, GWAS).
- beacons Individual level genotype data is usually access-controlled (Zerhouni 2008) and a researcher may spend considerable time and effort applying for access, only to find that the dataset is not relevant to the researcher's study.
- An advantage of a beacon is that any researcher can use it to query access-controlled data without applying for access. This will allow researchers to establish if an access-controlled dataset might be of interest; and, then apply for access only for relevant datasets.
- Two desirable features in beacons might therefore be that they contain a single dataset (so researchers who find a relevant dataset by querying a beacon can get data access through a single request) and that they return accurate information about presence of rare alleles. Solutions to protect privacy in beacons advantageously also maintain the utility of beacons by supporting these features.
- beacons containing multiple populations are less secure than single-population beacons of the same size.
- An alternative way of improving beacon security is to address the leakage of phenotype information, instead of or in addition to, reducing the possibility of re- identification.
- the probability that a re-identified sample has the disease associated with the beacon dataset depends on the proportion of cases in the beacon dataset. Therefore, by adding a suitable number of controls or aggregating responses from multiple beacons, the probability that a re-identified sample has the disease may be reduced to an acceptable level.
- Heritability estimates can be used to determine an acceptable probability level for a particular disease.
- beacons will always be open to re-identification attempts.
- Requiring users to authenticate to access beacons will allow the research community to discourage re-identification attacks through policies outlining acceptable uses of beacons (Erlich 2014), which can be enforced against authorized users.
- FIG. 5 is a block diagram that illustrates a computer system 500 upon which an embodiment of the invention may be implemented.
- Computer system 500 includes a communication mechanism such as a bus 510 for passing information between other internal and external components of the computer system 500.
- Information is represented as physical signals of a measurable phenomenon, typically electric voltages, but including, in other embodiments, such phenomena as magnetic, electromagnetic, pressure, chemical, molecular atomic and quantum interactions. For example, north and south magnetic fields, or a zero and non-zero electric voltage, represent two states (0, 1) of a binary digit (bit). Other phenomena can represent digits of a higher base.
- a superposition of multiple simultaneous quantum states before measurement represents a quantum bit (qubit).
- a sequence of one or more digits constitutes digital data that is used to represent a number or code for a character.
- information called analog data is represented by a near continuum of measurable values within a particular range.
- Computer system 500, or a portion thereof, constitutes a means for performing one or more steps of one or more methods described herein.
- a sequence of binary digits constitutes digital data that is used to represent a number or code for a character.
- a bus 510 includes many parallel conductors of information so that information is transferred quickly among devices coupled to the bus 510.
- One or more processors 502 for processing information are coupled with the bus 510.
- a processor 502 performs a set of operations on information.
- the set of operations include bringing information in from the bus 510 and placing information on the bus 510.
- the set of operations also typically include comparing two or more units of information, shifting positions of units of information, and combining two or more units of information, such as by addition or multiplication.
- a sequence of operations to be executed by the processor 502 constitutes computer instructions.
- Computer system 500 also includes a memory 504 coupled to bus 510.
- the memory 504 such as a random access memory (RAM) or other dynamic storage device, stores information including computer instructions. Dynamic memory allows information stored therein to be changed by the computer system 500. RAM allows a unit of information stored at a location called a memory address to be stored and retrieved independently of information at neighboring addresses.
- the memory 504 is also used by the processor 502 to store temporary values during execution of computer instructions.
- the computer system 500 also includes a read only memory (ROM) 506 or other static storage device coupled to the bus 510 for storing static information, including instructions, that is not changed by the computer system 500.
- ROM read only memory
- Also coupled to bus 510 is a non- volatile (persistent) storage device 508, such as a magnetic disk or optical disk, for storing information, including instructions, that persists even when the computer system 500 is turned off or otherwise loses power.
- Information is provided to the bus 510 for use by the processor from an external input device 512, such as a keyboard containing alphanumeric keys operated by a human user, or a sensor.
- an external input device 512 such as a keyboard containing alphanumeric keys operated by a human user, or a sensor.
- a sensor detects conditions in its vicinity and transforms those detections into signals compatible with the signals used to represent information in computer system 500.
- a display device 514 such as a cathode ray tube (CRT) or a liquid crystal display (LCD), for presenting images
- a pointing device 516 such as a mouse or a trackball or cursor direction keys, for controlling a position of a small cursor image presented on the display 514 and issuing commands associated with graphical elements presented on the display 514.
- special purpose hardware such as an application specific integrated circuit (IC) 520
- IC application specific integrated circuit
- the special purpose hardware is configured to perform operations not performed by processor 502 quickly enough for special purposes.
- application specific ICs include graphics accelerator cards for generating images for display 514, cryptographic boards for encrypting and decrypting messages sent over a network, speech recognition, and interfaces to special external devices, such as robotic arms and medical scanning equipment that repeatedly perform some complex sequence of operations that are more efficiently implemented in hardware.
- Computer system 500 also includes one or more instances of a communications interface 570 coupled to bus 510.
- Communication interface 570 provides a two-way communication coupling to a variety of external devices that operate with their own processors, such as printers, scanners and external disks. In general the coupling is with a network link 578 that is connected to a local network 580 to which a variety of external devices with their own processors are connected.
- communication interface 570 may be a parallel port or a serial port or a universal serial bus (USB) port on a personal computer.
- USB universal serial bus
- communications interface 570 is an integrated services digital network (ISDN) card or a digital subscriber line (DSL) card or a telephone modem that provides an information communication connection to a corresponding type of telephone line.
- ISDN integrated services digital network
- DSL digital subscriber line
- a communication interface 570 is a cable modem that converts signals on bus 510 into signals for a communication connection over a coaxial cable or into optical signals for a communication connection over a fiber optic cable.
- communications interface 570 may be a local area network (LAN) card to provide a data communication connection to a compatible LAN, such as Ethernet.
- LAN local area network
- Wireless links may also be implemented.
- Carrier waves, such as acoustic waves and electromagnetic waves, including radio, optical and infrared waves travel through space without wires or cables.
- Signals include man-made variations in amplitude, frequency, phase, polarization or other physical properties of carrier waves.
- the communications interface 570 sends and receives electrical, acoustic or electromagnetic signals, including infrared and optical signals that carry information streams, such as digital data.
- Non-volatile media include, for example, optical or magnetic disks, such as storage device 508.
- Volatile media include, for example, dynamic memory 504.
- Transmission media include, for example, coaxial cables, copper wire, fiber optic cables, and waves that travel through space without wires or cables, such as acoustic waves and electromagnetic waves, including radio, optical and infrared waves.
- the term computer-readable storage medium is used herein to refer to any medium that participates in providing information to processor 502, except for transmission media.
- Computer-readable media include, for example, a floppy disk, a flexible disk, a hard disk, a magnetic tape, or any other magnetic medium, a compact disk ROM (CD-ROM), a digital video disk (DVD) or any other optical medium, punch cards, paper tape, or any other physical medium with patterns of holes, a RAM, a programmable ROM (PROM), an erasable PROM (EPROM), a FLASH-EPROM, or any other memory chip or cartridge, a carrier wave, or any other medium from which a computer can read.
- the term non-transitory computer-readable storage medium is used herein to refer to any medium that participates in providing information to processor 502, except for carrier waves and other signals.
- Network link 578 typically provides information communication through one or more networks to other devices that use or process the information.
- network link 578 may provide a connection through local network 580 to a host computer 582 or to equipment 584 operated by an Internet Service Provider (ISP).
- ISP equipment 584 in turn provides data communication services through the public, world-wide packet-switching communication network of networks now commonly referred to as the Internet 590.
- a computer called a server 592 connected to the Internet provides a service in response to information received over the Internet.
- server 592 provides information representing video data for presentation at display 514.
- the invention is related to the use of computer system 500 for implementing the techniques described herein. According to one embodiment of the invention, those techniques are performed by computer system 500 in response to processor 502 executing one or more sequences of one or more instructions contained in memory 504. Such instructions, also called software and program code, may be read into memory 504 from another computer-readable medium such as storage device 508. Execution of the sequences of instructions contained in memory 504 causes processor 502 to perform the method steps described herein.
- hardware such as application specific integrated circuit 520, may be used in place of or in combination with software to implement the invention. Thus, embodiments of the invention are not limited to any specific combination of hardware and software.
- Computer system 500 can send and receive information, including program code, through the networks 580, 590 among others, through network link 578 and communications interface 570.
- a server 592 transmits program code for a particular application, requested by a message sent from computer 500, through Internet 590, ISP equipment 584, local network 580 and communications interface 570.
- the received code may be executed by processor 502 as it is received, or may be stored in storage device 508 or other non-volatile storage for later execution, or both.
- computer system 500 may obtain application program code in the form of a signal on a carrier wave.
- Various forms of computer readable media may be involved in carrying one or more sequence of instructions or data or both to processor 502 for execution.
- instructions and data may initially be carried on a magnetic disk of a remote computer such as host 582.
- the remote computer loads the instructions and data into its dynamic memory and sends the instructions and data over a telephone line using a modem.
- a modem local to the computer system 500 receives the instructions and data on a telephone line and uses an infrared transmitter to convert the instructions and data to a signal on an infra-red a carrier wave serving as the network link 578.
- An infrared detector serving as communications interface 570 receives the instructions and data carried in the infrared signal and places information representing the instructions and data onto bus 510.
- Bus 510 carries the information to memory 504 from which processor 502 retrieves and executes the instructions using some of the data sent with the instructions.
- the instructions and data received in memory 504 may optionally be stored on storage device 508, either before or after execution by the processor 502.
- FIG. 6 illustrates a chip set 600 upon which an embodiment of the invention may be implemented.
- Chip set 600 is programmed to perform one or more steps of a method described herein and includes, for instance, the processor and memory components described with respect to FIG. 5 incorporated in one or more physical packages (e.g., chips).
- a physical package includes an arrangement of one or more materials, components, and/or wires on a structural assembly (e.g., a baseboard) to provide one or more
- Chip set 600 or a portion thereof, constitutes a means for performing one or more steps of a method described herein.
- the chip set 600 includes a communication mechanism such as a bus 601 for passing information among the components of the chip set 600.
- a processor 603 has connectivity to the bus 601 to execute instructions and process information stored in, for example, a memory 605.
- the processor 603 may include one or more processing cores with each core configured to perform independently.
- a multi-core processor enables
- the processor 603 may include one or more microprocessors configured in tandem via the bus 601 to enable independent execution of instructions, pipelining, and multithreading.
- the processor 603 may also be accompanied with one or more specialized components to perform certain processing functions and tasks such as one or more digital signal processors (DSP) 607, or one or more application-specific integrated circuits (ASIC) 609.
- DSP digital signal processors
- ASIC application-specific integrated circuits
- a DSP 607 typically is configured to process real-world signals (e.g., sound) in real time independently of the processor 603.
- an ASIC 609 can be configured to performed specialized functions not easily performed by a general purposed processor.
- Other specialized components to aid in performing the inventive functions described herein include one or more field
- FPGA programmable gate arrays
- the processor 603 and accompanying components have connectivity to the memory 605 via the bus 601.
- the memory 605 includes both dynamic memory (e.g., RAM, magnetic disk, writable optical disk, etc.) and static memory (e.g., ROM, CD-ROM, etc.) for storing executable instructions that when executed perform one or more steps of a method described herein.
- the memory 605 also stores the data associated with or generated by the execution of one or more steps of the methods described herein.
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- Life Sciences & Earth Sciences (AREA)
- Theoretical Computer Science (AREA)
- Bioinformatics & Cheminformatics (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Spectroscopy & Molecular Physics (AREA)
- Biophysics (AREA)
- Bioinformatics & Computational Biology (AREA)
- Biotechnology (AREA)
- Evolutionary Biology (AREA)
- Genetics & Genomics (AREA)
- Molecular Biology (AREA)
- Analytical Chemistry (AREA)
- Proteomics, Peptides & Aminoacids (AREA)
- Chemical & Material Sciences (AREA)
- Bioethics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Physiology (AREA)
- Ecology (AREA)
- Computational Linguistics (AREA)
- Primary Health Care (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Public Health (AREA)
- Epidemiology (AREA)
- Measuring Or Testing Involving Enzymes Or Micro-Organisms (AREA)
Abstract
Techniques to determine if an individual is a member of an ensemble contributing to combined genomic data include determining a site frequency spectrum (SFS) for alleles in the combined genomic data, and a number N of individuals contributing to the combined genomic data. Based on the SFS and N, both a number of queries NQ and a number of yeses NY are determined. NY is a number of yes responses to NQ queries, which indicates a particular likelihood that the individual is a member of the ensemble. Output is based on at least one of NQ and NY. For example, fewer than NQ queries from a single source are answered from a beacon. Alternatively, the likelihood that an individual is a member of the ensemble is determined based on responses to NQ queries about NQ different alleles present in the individual and NY.
Description
TECHNIQUES FOR DETERMINING WHETHER AN INDIVIDUAL IS INCLUDED
IN ENSEMBLE GENOMIC DATA
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application claims benefit of Provisional Appln. 62/238,386, filed October 7, 2015, and Provisional Appln. 62/242,081, filed October 15, 2015, the entire contents of each of which are hereby incorporated by reference as if fully set forth herein, under 35 U.S.C. § 119(e).
STATEMENT OF GOVERNMENTAL INTEREST
[0002] This invention was made with government support under Grant No. HG007436 awarded by the National Institutes of Health. The government has certain rights in the invention.
BACKGROUND OF THE INVENTION
DEFINITIONS
genotype The genetic composition of an organism.
Genomic data A list of alleles in the genotype of one or more individual organisms haplotype 1 - A combination of alleles (DNA sequences) at adjacent locations
(loci) on the chromosome that are transmitted together. 2 - A set of single-nucleotide polymorphisms (SNPs) on a single chromosome of a chromosome pair that are statistically associated.
heterozygous A diploid organism is heterozygous at a gene locus when its cells
contain two different alleles of a gene. Heterozygous genotypes are represented by a capital letter (representing the dominant allele) and a lowercase letter (representing the recessive allele), such as "Rr" or "Ss". The capital letter is usually written first.
LD Linkage disequilibrium, the non-random association of alleles at two or more loci, not necessarily on the same chromosome.
marker A gene or unique DNA sequence with a known location on a
chromosome that can be used to determine the chromosome location of an arbitrary sequenced portion of DNA.
nucleic acid A molecule comprising a sequence of one or more repeating chemical units known as "nucleotides" or "bases" or "base pairs" (bp). There are four bases in deoxyribonucleic acid (DNA): adenine, thymine, cytosine, and guanine, represented by the letters A, T, C and G, respectively. In Ribonucleic acid (RNA) the base uracil (U) replaces the base thymine (T).
reference panel A full set of haplotypes represented in a population, each haplotype represented by a set of SNPs at known positions relative to a set of markers along each chromosome.
phasing Determining which alleles (indicated by the variant SNPs) exist
together on the same chromosome, i.e., belong to the same haplotype.
protein A generic term referring to native protein, fragments, peptides, or analogs of a polypeptide sequence. Synonyms used herein include "polypeptide." Hence, native protein, fragments, and analogs are species of a polypeptide genus.
sample includes any biological specimen obtained from a subject
Site frequency the number of different alleles relative to a reference genome in an spectrum ensemble of N individuals, which occur a given multiple of times for several different multiples from 1 to N-l.
Site frequency the number of minor alleles in an ensemble of N individuals without a spectrum, folded reference genome, which occur a given multiple of times for several different multiples from 1 to N/2.
SNP Single-nucleotide polymorphism, a DNA sequence variation occurring when a single nucleotide in the genome (or other shared sequence) differs between members of a biological species or paired
chromosomes in an individual. The vast majority of polymorphic sites are bi-allelic, meaning that no more than two possible distinct alleles can be observed at these sites. As used herein, a 0 indicates one nucleotide at the position of the SNP and a 1 indicates a different nucleotide.
Subject An organism that is an object of a method or material, including
mammals, e.g., humans, dogs, cows, horses, kangaroos, pigs, sheep, goats, cats, mice, rabbits, rats, and transgenic non-human animals as well as plants and protists. Synonyms used herein include "patient" and "animal".
Treating Taking steps to obtain beneficial or desired results, including clinical results, such as alleviating or ameliorating one or more symptoms of a disease; diminishing the extent of disease; delaying or slowing disease progression; ameliorating and palliating or stabilizing a metric (statistic) of disease. "Treatment" refers to the steps taken.
[0003] Most humans carry two copies of every chromosome in their genome— one inherited from the mother, the other from the father. Current genotyping and sequencing technologies have enabled the ability to rapidly and inexpensively discover the genotypes of an individual at a large number of sites in the genome (based on the SNPs in the vicinity of various markers).
[0004] Genotype information in the form of genomic data gives the occurrence of the alleles, e.g., the existence of multiple values for each of one or more of the SNPs. The human genetics community has provided for secure sharing of genomic data from patient participants in genetic research. Beacons are web servers that answer allele presence queries such as "Do you have a genome that has a specific nucleotide (e.g., A) at a specific genomic position (e.g., position 11272 on chromosome 1)?" with "Yes'V'No" responses.
SUMMARY OF THE INVENTION
[0005] In an ensemble of DNA sequence data from multiple individuals it is often the case that membership of the individual is unknown. For example, this information is hidden for published genomes called beacons for which the occurrence of different alleles in populations of a certain phenotype, e.g., Eastern Europeans or cancer patients, is available. As another example, forensic data collected at a crime scene may have samples with DNA from many contributors, such as victims, bystanders and perpetrators, resulting in another mix of alleles. Inventors have recognized that these ensembles can be penetrated to determine the likelihood that an individual, with at least some known alleles, is a member of the ensemble, even if allele frequency in the ensemble is not known. In various embodiments, these new techniques use a known or inferred site frequency spectrum to determine whether genomic data of an individual is included in ensemble genomic data, and thus whether the individual is a member of the ensemble.
[0006] In a first set of embodiments, a method includes obtaining first site frequency spectrum data that indicates a site frequency spectrum for alleles in first genomic data aggregated for an ensemble of unknown individuals. The method also includes determining a number N that indicates a number of individuals whose individual genomic data are aggregated in the first genomic data. The method further includes determining automatically on a processor, based on the first site frequency spectrum data and the number N, both a number NQ and a number NY, wherein the number NQ is a number of queries to employ, wherein each query requests whether a particular allele from an individual is present in the
first genomic data, and the number NY is a number of yes responses that indicate a particular likelihood that the individual is a member of the ensemble. The method still further includes providing output based on at least one of NQ or NY.
[0007] In some embodiments, responses to one source of queries are provided only for fewer than NQ queries in a predetermined time interval, e.g., to protect individual identities in a beacon.
[0008] In other embodiments, the method further includes determining whether an individual subject is a member of the ensemble based on responses to the NQ queries and the value of NY. For example, NQ queries are submitted to a system that manages the first genomic data. In some of these embodiments, at least NQ alleles are selected at random from second genomic data determined for a sample collected from a particular individual subject. In these embodiments, submitting the queries includes submitting a query for each of the at least NQ alleles selected at random from the second genomic data. In some embodiments, the method includes accumulating a number of affirmative responses to the at least NQ queries and determining the likelihood that the particular individual subject is a member of the ensemble based on the number of affirmative responses and the threshold number NY. In some embodiments, the method includes presenting on a display device output data that indicates the likelihood that the particular individual is a member of the ensemble.
[0009] In other sets of embodiments, a computer-readable medium or a system is configured to perform one or more of the steps of one or more of the above methods.
[0010] Still other aspects, features, and advantages of the invention are readily apparent from the following detailed description, simply by illustrating a number of particular embodiments and implementations, including the best mode contemplated for carrying out the invention. The invention is also capable of other and different embodiments, and its several details can be modified in various obvious respects, all without departing from the spirit and scope of the invention. Accordingly, the drawings and description are to be regarded as illustrative in nature, and not as restrictive.
BRIEF DESCRIPTION OF THE DRAWINGS
[0011] The present invention is illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar elements and in which:
[0012] FIG. 1 is a block diagram that illustrates example markers and SNPs along a chromosome, according to an embodiment;
[0013] FIG. 2A is a block diagram that illustrates highly simplified example genomic data for an ensemble compared to genomic data of individuals in the ensemble, according to an embodiment;
[0014] FIG. 2B is a block diagram that illustrates highly simplified example genomic data for an individual not part of the ensemble that might give a false positive for membership in the ensemble, according to an embodiment;
[0015] FIG. 3 is a block diagram that illustrates highly simplified example site frequency spectrum for an ensemble that is used to determine likelihood of membership, according to an embodiment;
[0016] FIG. 4 is a flow diagram that illustrates an example method for determining likelihood that an individual is a member of an ensemble, according to an embodiment;
[0017] FIG. 5 is a block diagram that illustrates a computer system upon which an embodiment of the invention may be implemented;
[0018] FIG. 6 illustrates a chip set upon which an embodiment of the invention may be implemented;
[0019] FIG. 7 is a graph that depicts the dependence of the beta function, used to describe a site frequency spectrum (SFS), on two shape parameters, according to an embodiment;
[0020] FIG. 8A is a graph that illustrates example power of the method for simulated data for an individual, according to an embodiment;
[0021] FIG. 8B is a graph that illustrates example power of the method for simulated data for relatives of an individual, according to an embodiment;
[0022] FIG. 8C is a graph that illustrates example power versus false positive rate in simulated data for relatives of an individual when the number of queries (NQ) is 16,000, according to an embodiment;
[0023] FIG. 8D is a graph that illustrates example power versus false positive rate in simulated data for different error rates when the number of queries (NQ) is 16,000, according to an embodiment;
[0024] FIG. 9A is a graph that illustrates example power of the method for real data for an individual, according to an embodiment;
[0025] FIG. 9B is a graph that illustrates example power of the method for real data for an individual using censored or SNP beacon responses, according to an embodiment;
[0026] FIG. 1 OA is a block diagram that illustrates example beacons constructed from multiple datasets, according to an embodiment;
[0027] Figure 10B is a graph that illustrates example power of tests for beacons containing multiple populations, according to various embodiments;
DETAILED DESCRIPTION
[0028] A method and apparatus are described for determining likelihood that an individual is a member of an ensemble based on ensemble genomic data. In the following description, for the purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to avoid unnecessarily obscuring the present invention.
[0029] Notwithstanding that the numerical ranges and parameters setting forth the broad scope are approximations, the numerical values set forth in specific non-limiting examples are reported as precisely as possible. Any numerical value, however, inherently contains certain errors necessarily resulting from the standard deviation found in their respective testing measurements at the time of this writing. Furthermore, unless otherwise clear from the context, a numerical value presented herein has an implied precision given by the least significant digit. Thus a value 1.1 implies a value from 1.05 to 1.15. The term "about" is used to indicate a broader range centered on the given value, and unless otherwise clear from the context implies a broader rang around the least significant digit, such as "about 1.1" implies a range from 1.0 to 1.2. If the least significant digit is unclear, then the term "about" implies a factor of two, e.g., "about X" implies a value in the range from 0.5X to 2X, for example, about 100 implies a value in a range from 50 to 200. Moreover, all ranges disclosed herein are to be understood to encompass any and all sub-ranges subsumed therein. For
example, a range of "less than 10" can include any and all sub-ranges between (and including) the minimum value of zero and the maximum value of 10, that is, any and all subranges having a minimum value of equal to or greater than zero and a maximum value of equal to or less than 10, e.g., 1 to 4.
[0030] Some embodiments of the invention are described in the context of membership of an individual in a published beacon of genomic data. However, the invention is not limited to this context. In other embodiments, membership is determined for a forensic sample collected at the scene of an incident being investigated, where the individual is one of a prospective or suspected victim, a prospective or suspected bystander or witness, or a prospective or suspected perpetrator.
1. Overview
[0031] FIG. 1 is a block diagram that illustrates example markers 241, 242, 243, 244, 245 and SNPs 231, 232, 233, 234, 235, 236, 237 as alleles along a chromosome indicated by chromosomal position 240, according to an embodiment. The genomic data is a list of 0s and Is, each representing the presence (1) or absence (0) of an allele in the individual.
[0032] A great deal of human genomic data will be collected in the context of health care, along with linked phenotypes in Electronic Health Records (EHRs). A major goal of the human genomics community is to enable efficient sharing, aggregation, and analysis of these data in order to understand the genetic contributors of health and disease. Previous large- scale data-sharing approaches have had limited success due to the potential for privacy breaches and risks of participants being re-identified. Homer (2008) and others (see, for example, Sankararaman, 2009; Jacobs, 2009; Visscher, 2009; and Clayton, 2010 ) showed that subjects in a genome-wide association study could be re-identified using allele- frequencies, resulting in the removal of publicly- available allele frequency data (see, e.g., Zerhouni, 2008). The Beacon Project by the Global Alliance for Genomics and Health aims to simplify data sharing through a web service ("beacon") that provides only allele presence information. Users can query institutional beacons for information about genomic data available at the institution. Queries are of the form "Do you have a genome that has a specific nucleotide (e.g.,'A') at a specific genomic position (e.g., position 11272 on chromosome 1)?" and the beacon server can answer "Yes" or "No". Beacons are intended to be easy to setup and to allow data sharing while protecting participant privacy. By providing only allele
presence information, beacons are safe from re-identification attacks that require allele frequencies.
[0033] However, a privacy breach from a beacon would be troubling since beacons often summarize data having a particular disease of interest. For instance, identifying that a given genome is part of the SFARI beacon, which contains genomic data from families with a child having autism spectrum disorder, means that the individual belongs to a family where some family member has autism spectrum disorder. Thus, if beacons leak membership information, then they also leak phenotype information. While genetic privacy is protected to some extent by the Genetic Information Nondiscrimination Act (GIN A), the offered protections are limited, and GINA does not apply for long term care insurance, life insurance, disability insurance and other special cases (Rothstein 2008). Therefore, data-sharing mechanisms such as beacons must protect participant privacy.
[0034] In beacon genomic data, the details about the genomic data of contributing individuals is purposefully hidden. This is done by just indicating by a 1 any allele that is found in any member of the ensemble, and indicating by a zero an allele that is absent from every member of the ensemble. FIG. 2A is a block diagram that illustrates highly simplified example genomic data for an ensemble compared to genomic data of individuals in the ensemble, according to an embodiment. For simplicity each individual is represented by the state of six alleles, represented by boxes lettered A through F going left to right in the diagram. The presence of an allele is indicted by a shaded box to represent a 1 and a white box to represent a zero. The genomic data of three individuals are depicted. As can be seen, in the simple example, the first individual (top) has alleles A, D and F; the second (middle) has alleles A and B, and the third individual (bottom) has alleles A and D. No individual has alleles C or E. In a beacon data set, any allele that is found in any individual is marked with a one (shaded), but no information is given on how many times each allele occurs in the ensemble. Further, the beacon is not presented to users of the beacon in its entirety, but instead a user is required to indicate a single allele (by chromosome and position) and in response the beacon returns an affirmative (e.g., 1) if shaded, or negative (e.g., 0) if unshaded. Because the human genome includes many millions of alleles and any individual can have anywhere from about 3 million to about 5 million alleles present, it is tedious and time consuming to query a beacon for every allele. If the individual is a member of the ensemble, then every query of the individual's alleles should return a yes. If the genomic data
of the individual and the beacon were without noise, a singe negative response would rule out membership of that individual in the ensemble. Because the genomic data can have noise, it is considered that one cannot be sure if an individual is a member of the ensemble that formed the beacon just because a few responses are negative.
[0035] In fact, it is possible to come to a conclusion that an individual is a member of the beacon ensemble when the individual is not (a type II error also called a false positive error). FIG. 2B is a block diagram that illustrates highly simplified example genomic data for an individual not part of the ensemble that might give a false positive for membership in the ensemble, according to an embodiment. This individual has alleles B and D. Queries on both these alleles would return a positive response from the beacon. Yet the individual is not a member of the ensemble, i.e., is not one of the three individuals whose genomic data is depicted in FIG. 3A. Because the beacons can give such false positives, it is further considered that one cannot be sure if an individual is a member of the beacon.
[0036] Similarly, in a forensic sample that may have DNA from multiple persons at a scene, including one or more victims, bystanders or witnesses, and perpetrators, genomic data can be obtained for the ensemble of persons, as in a beacon. However, for similar reasons, knowledge of whether an individual, for whom genomic data is available in whole or in part, is a member of the ensemble is not certain. For simplicity herein, an ensemble refers to a collection of one or more individuals whose genomic data is combined in a beacon or simulation or by sequencing a forensic sample or experimental sample or other sample. Ensemble beacons or ensemble genomic data refers to genomic data based on the genomic data of the individuals in the ensemble even if combined as in beacons or forensic samples.
[0037] However, as demonstrated below for beacon data, if a site frequency spectrum (SFS, also called an allele frequency spectrum) is known or can be inferred, and if a number (N) of members of the ensemble is known or can be bracketed, and if a mismatch rate (S) for genomic data can be estimated or bracketed based on noise in obtaining genomic data for the individual and the ensemble, then a likelihood that an individual is a member of the ensemble can be determined based on the number of positive response received from a given number of queries. Furthermore, because relatives have similar alleles to an individual, the likelihood that a relative of the individual is included in the ensemble can also be determined based only on the genomic data for the individual.
[0038] The site frequency spectrum (SFS) does not give the frequency of a particular allele in the beacon data, but instead says how many alleles occur with a given frequency (e.g., how many alleles are singletons that occur once in the genomic data of the ensemble, how many alleles are doubletons that appear twice, etc.) FIG. 3 is a block diagram that illustrates highly simplified example site frequency spectrum for an ensemble that is used to determine likelihood of membership, according to an embodiment. Looking at the data in FIG. 2A, it is clear that allele A is a tripleton, allele B is a singleton, allele D is a doubleton and allele F is a singleton in the individual genomes. Thus there are two singletons, one doubleton and one tripleton. This is shown in FIG. 3, by the values (2, 1, 1) in the site frequency spectrum. Note that no specific allele information is provided. Thus a query is also needed for any specific allele.
[0039] The inventors have discovered how the site frequency spectrum provides information on the likelihood that enough queries have been advanced to determine whether an individual or family member of the individual is a member of the ensemble. Thus the likelihood of membership can be determined even without knowing frequency of individual alleles in the ensemble. This is an advantage in some embodiments, because while allele frequencies can vary greatly among ensembles, site frequency spectra have a tendency to be similar in ensembles from one species (e.g., all human ensembles). So even if a specific SFS is not known, one can be estimated from a similar population or for humans in general.
[0040] Note further that all members of the example ensemble have allele A. This is possible because alleles are defined relative to a reference sequence (e.g., the consensus human genome) independent of the ensemble, and not by differences that occur only within the ensemble. Otherwise, all members of the ensemble would have the same sequence at position A and that positon would not be considered an allele position. This also makes clear that, in an ensemble of N individuals, it is possible to have one or more alleles with a frequency of N. In some embodiments, alleles are defined within the ensemble and an allele can have no more than N-l occurrences. If the most common version of the allele is considered normal (allele absent) then no allele can have more than N/2-1 occurrences.
[0041] As shown below for beacon data, by advancing enough queries almost any degree of certainty can be achieved in a statement about whether an individual belongs to an ensemble. For any degree of certainty desired, a number of queries and number of positive responses can be determined that will indicate membership with that degree of certainty.
[0042] Such a result has a disadvantage of exposing the individual as a member of the ensemble, e.g., an ensemble of persons with a particular phenotype, e.g., a disease or condition associated with the beacon, thus infringing on that individual's privacy. As a consequence, procedures for querying the beacon should be changed to compensate, e.g., by limiting the number of queries from any source, e.g., in a predetermined time period, such as one month, one year or all time. On the other hand, the same result offers the advantage of determining which remedial actions are sufficient. Such remedial actions are described below.
[0043] Furthermore, this same result has an advantage of determining whether an individual (e.g., suspect or victim) contributed to a sample mixing DNA from multiple persons, as in a forensic sample. As a result, a suspect can be placed at the scene where the sample was collected with a specified degree of likelihood.
[0044] FIG. 4 is a flow diagram that illustrates an example method for determining likelihood that an individual is a member of an ensemble, according to an embodiment. Although steps are depicted in FIG. 4 as integral steps in a particular order for purposes of illustration, in other embodiments, one or more steps, or portions thereof, are performed in a different order, or overlapping in time, in series or in parallel, or are omitted, or one or more additional steps are added, or the method is changed in some combination of ways.
[0045] In step 401, a source of genomic data for an ensemble is identified. For example, a particular beacon is identified (such as the AMPlab, ICGC and NCBI beacons, among others, see tables below), or DNA sequencing of a forensic sample is obtained from a service or by use of an SNP micro array, or any other method known in the art at the time the method is implemented.
[0046] In step 403, a site frequency spectrum is determined for the ensemble. If one is published for the beacon, then that SFS is used. If not, then in some embodiments, the published SFS for a similar population, e.g., same ethnic composition, or similar medical condition, is used. In some embodiments, a SFS for the consensus human genome is used. Thus the approach is generalizable to many populations. In some embodiments, the SFS is parameterized by the values of two shape parameters a' and V of a Beta distribution, as described in more detail below.
[0047] In step 405, a number of individuals in the ensemble is determined. In some embodiments, that number is given. In other embodiments, when the number N is not known,
a conservative estimate of the number is made. The larger is the number of individuals in the ensemble, the more uncertain is the result. Thus a conservative estimate is a number reasonably expected to be greater than or equal to an unknown number of individuals in the ensemble.
[0048] In step 407 a mismatch rate (S) is determined for the ensemble genomic data. This is the probability that a query that should return an affirmative response instead returns a negative response. In various embodiments, the mismatch rate is published or estimated using any method known in the art at the time the method is implemented. The example embodiments below demonstrate some example ways to determine the mismatch rate. In some embodiments, the mismatch rate is assumed to be zero and step 407 is omitted.
[0049] In step 411, the number of different alleles to query (NQ) and the number of affirmative responses (NY) to achieve a certain degree of certainty (also called likelihood) in the membership result is determined based on the values for the SFS, N and S. Various ways to do this are derived in the example embodiments described below. For example test statistic Λ is computed as a difference or ratio of likelihoods for a null hypothesis that the individual is not a member of the ensemble and an alternate hypothesis that an individual is a member of the ensemble. For each query genome, the likelihood of the beacon responses to n allele presence queries is calculated under the null hypothesis Ho (e.g., that a given individual or relative is not in the beacon) and again under an alternative hypothesis Hi (e.g., that the given individual or a relative is in the beacon).
[0050] Two scenarios are considered, to show how this information yields insight into ensemble membership. In scenario 1, every SNP in the population is a singleton. If there are no sequencing errors, then the chance of false positive (i.e., chance of producing 1 at single SNP if G is not in B) = 0. Every SNP will produce a 0 response on query (since G has the only alternate allele at the SNP of the query). In scenario 2, any SNP is a singleton with probability s (0 < s < 1) and non-singleton with probability 1-s. The chance of a false positive (i.e., the chance of producing 1 at single SNP if G is not in B) = s x 0 + (1-s), which is the probability that someone else has the allele. The chance of all n returning a positive response is less than or equal to (l-s)n. This value falls to zero quickly, for example (0.9)2°°=7xl0 10. So after enough queries the change for a false positive is small.
[0051] In some embodiments, the test statistic Λ is calculated as the ratio of the two likelihoods as given by Equation 4 below. In other embodiments another statistic is based on the two likelihoods. In some embodiments, the log likelihood is determined for the null hypothesis and the alternative hypothesis, and the two log likelihoods are compared. A determination is made of whether the alternative hypothesis is true is based on a comparison of the two likelihoods, e.g., by a difference or ratio. A relationship between the number of queries (required to achieve a desired power and false positive rate) and the number of individuals in the beacon is given by Equation 6 below for an individual. N represents the number of individuals in ensemble; n represents the number of queries. The number of yeses is represented by the sum of x,'s, which are responses from the ensemble, encoded as x,=l for yes and x,=0 for no. The relationship is given by Equation 9 below for a relative with degree of similarity given by the parameter φ. A result of step 411 is a number of queries (NQ) that should be advanced to the beacon (equivalent to a number of alleles to identity in the forensic sample) to determine membership at a particular level of certainty (a certain statistical power). In the illustrated embodiments, the statistical power is a function of the false positive rate or that can be tolerated. Some assumptions and simplifications are made to derive the forms of the equations used in the illustrated embodiments. In other embodiments, other assumptions or simplifications are made instead of or in addition to those made in the examples described below.
[0052] In step 413, genomic data is determined for an individual test subject, e.g., from a record on file or from a DNA sequencing service from a sample drawn from the individual test subject, including results from a SNP micro array. The number of alleles identified in the individual should be at least the number of queries (NQ) to determine membership at the desired level of certainty and preferably many times that number.
[0053] In step 415, a number NQ of alleles are selected at random. There is no need to require that the selected alleles be singletons or have any other particular frequency. In some embodiments, however, only the most rare SNPs in a population that are also present in the individual are selected.
[0054] In step 417, it is determined how many of the selected alleles from the individual are present in the ensemble (e.g., how many positive responses are received from the beacon or how many of the selected alleles are listed in the genomic data for the forensic sample).
[0055] In step 421, the likelihood that the test subject is a member of the ensemble is determined. For example, if the number of yes responses from the beacon (or alleles found in the forensic sample) are at or greater than the threshold number NY determined in step 411, then it is determined that the test subject is a member of the ensemble at the level of certainly associated with the threshold.
[0056] In step 423 output data is presented based on NQ or NY. For example, in some embodiments, output indicating the likelihood is presented on a display device, such as display 514 described below with reference to FIG. 5. In some embodiments, treatment of the test subject is based at least in part on the output. For example, if the test subject is a member of an ensemble that has a certain disease or responds to a certain treatment, then the test subject is diagnosed with that disease or given that certain treatment.
[0057] In some embodiments, the method 400 is executed on the beacon side, e.g., at a server that provides the beacon service, and steps 413 through 421 are omitted. In these embodiments, step 423 includes limiting the number of queries from any one source or user identifier to a number less than NQ associated with a certainty of about 50%, or selected in a range from about 20% to about 50%. In some embodiments, the limit on number of queries accepted from a single source is enforced for a predetermined time interval or period, e.g., for one week or one month or one year or for all time. In some embodiments, the responses are censored and a query for an SNP associated with a rare allele is indicated to be absent in the response, even if it is present in the ensemble.
[0058] Thus, these techniques allow robust identification of individuals from DNA mixtures (e.g., using SNP micro-array data) for many populations in a way that is independent of the actual frequency of each individual allele, or prevent or inhibit unintentional identification of an individual as a member of an ensemble, such as a beacon. .
2. Example embodiments
[0059] Here is shown, by various example embodiments, that individuals in a beacon are susceptible to re-identification even if the only data shared is "presence'V'absence" information about alleles in a beacon. Specifically, a likelihood ratio test is demonstrated that indicates whether a given individual is present in a given genetic beacon. This test is not dependent on individual allele frequencies and is the most powerful test for a specified false positive rate. Through simulations, it is shown that in a beacon with 1,000 individuals, re- identification is possible with just 5,000 queries. Relatives can also be identified in the
beacon. Re-identification is possible even in the presence of sequencing errors and variant calling differences. In a beacon constructed using 65 European individuals from the 1000 Genomes Project, it is demonstrated that re-identification is possible with just 250 SNP queries. With just 1000 SNP queries, it was possible to detect the presence of an individual from the Personal Genome Project (PGP) in an existing beacon. These results show that beacons can disclose membership and phenotypic information about participants and may not adequately protect privacy. Risk mitigation is proposed for some embodiments through policies and standards such as not allowing anonymous pings of genetic beacons, limiting a number of queries from a single source in a predetermined time period, or requiring minimum beacon sizes, among others, or some combination.
2.1 Bi-allelic SNPs in beacon comprised of unrelated individuals from a single population.
[0060] Only bi-allelic single-nucleotide polymorphisms (SNPs) are considered in the following analysis. In response to a query q = {C, P, A}, the beacon sends a response message with a value "Yes" (represented by the numerical value 1) if allele A is an alternate allele at position P on chromosome C with non-zero frequency in the samples used to construct the beacon, and answers "No" (represented by the numerical value 0) otherwise. Given a set of n queries Q = {qi,■■■ , qn), the beacon returns a set of responses
R = {xi,■■■ , xn). In this example, it is assumed that the attacker has access to more information - the number of individuals in the beacon database N and the site frequency spectrum (SFS) of the population in the beacon, the latter parameterized as a Beta distribution with shape parameters ( ', b').
[0061] The Beta distribution is a continuous probability distribution, and has been applied to model the behavior of random variables limited to intervals of finite length in a wide variety of disciplines. For example, it has been used as a statistical description of allele frequencies in population genetics. Thus, it is assumed that alternate allele frequencies /for all SNPs observed in the population are distributed as ~ Beta(a ?').This is justified, for example, by Sankararaman 2009 or Clayton 2010. The Beta distribution for a probability density function (PDF) for a random variable r on the interval 0 to 1 is given by Equation 1.
where Β( ', £>') is a function of a' and V selected to ensure the probability integrates to 1 on the interval 0 to 1 and so is constant as r varies over the interval 0 to 1. FIG. 7 is a graph that
depicts the dependence of the Beta function used to describe a site frequency spectrum (SFS) on two shape parameters, according to an embodiment. The horizontal axis indicates the value of a normalized independent variable, such as copy number for an allele normalized by the number of copies in an ensemble, and the vertical axis indicates the probability of that value. The distribution can be shaped to fit suitable empirical data, such as an SFS that indicates the distribution of allele copies in an ensemble of subjects, based on the two shape parameters ', b Five example shapes are represented by: trace 711 for a' = V = 0.5; trace 712 for a' = 5, V = 1 ; trace 713 for a' = 1, V = 3; trace 714 for a' = 2, b' = 2; and, trace 715 for a' = 2, V = 5.
[0062] For this example attack scenario, a situation identical to that used by Homer et al. [1] and others is assumed, wherein the attacker receives a Variant Call Format (VCF) file for the query genome (the genome of the individual whose membership in the ensemble is at question) listing all the SNP positions in the query genome at which the individual has an alternate allele than the reference genotype calls for at the corresponding positions. The attacker then queries the beacon for all heterozygous positions using the alternate allele listed in the VCF and obtains the set of responses R from the beacon. If the query individual is present in the beacon, then every allele in the query genome must be present in the beacon. Thus the beacon will return a "Yes (1)" response to every query. If a query individual is not present in the beacon, then the beacon response will be "Yes (1)" if some individual in the beacon has the allele and "No (0)" otherwise.
[0063] Here is demonstrated a likelihood ratio test (LRT) that uses the responses R to decide whether the query genome is in the beacon or not. By calculating the likelihood of the responses, the method can differentiate query genome of individuals who are in the beacon from the query genome of individuals who are not in the beacon. This approach for re- identifying individuals within a beacon is based on a likelihood ratio test that uses the response information. For each query genome, the likelihood of the beacon responses to n allele presence queries is calculated under the null hypothesis Ho that a given individual is not in the beacon and again under the alternative hypothesis Hi that the given individual is in the beacon. A test statistic Λ is calculated as the ratio of the two likelihoods.
[0064] To make this likelihood ratio test generalizable across populations, direct dependence on frequencies of specific alleles is removed since frequencies can vary considerably for a given allele across populations. Instead, this test is formulated to depend on the shape of SFS,
which is described by (α', £>'), the shape parameters of the Beta distribution. While allele frequencies for a given allele can vary considerably across populations, the SFS parameters for most populations are similar to each other as shown in Table 1. Only the genome based on an Affymetrix array of SNPs has considerably different shape parameters from the other populations.
Table 1. Beta distribution shape parameters estimated from site frequency spectra for simulation data and some public whole-genome datasets,
Therefore the results from a test that depends on the shape of the SFS but is independent of the actual frequencies of individual alleles can be generalized to many populations, e.g., using shape parameters of a' about 0.1 and V about 1.0 for human genome datasets of unknown allele frequencies and unknown SFS. The shape of such a distribution would be expected to be something like a trace 713 of FIG. 7 for which the magnitude of V is several times the magnitude of ' .
[0065] The shape parameters for the genome datasets in Table 1 were computed based on the frequency i of each allele i among N individuals as follows. Note that each/z is the count of the number of times allele i occurs divided by N or 2N, depending on the type of frequency distribution used, so all the values occur on the interval between 0 and 1. Alternate allele frequencies for populations were modeled by Beta distributions similar to the approaches used by [2, 5]. If [ I, · · · ,fn) are distributed over the interval 0 to 1 as Beta(a V), and the sample mean and sample variance v are defined as usual by Equation 2 and Equation 3, respectively.
then, the shape parameters a' and V are deduced using the method of moments estimators and given by Equations 4 and 5.
provided that v < f (l— ) .
[0066] In an ideal setting, one would expect responses Xi = x2 · · · = x„ = 1 if a query genome g is in the beacon B. In practice, due to sequencing errors and differences in variant calling pipelines, there might be some mismatches between the query copy of a genome and its copy in the beacon. The mismatch happens with probability S. Also there is a possibility of a false positive, where all the alleles in the query genome are in the beacon but the genome itself is not, as demonstrated above with reference to FIG. 2B.
[0067] Let the alternate allele frequency at the SNP corresponding to query q, be /J. Since the beacon is only queried at the positions where the query genome is heterozygous, it is not a random sample of the beacon; and, thus /J is not distributed as Beta ( ' , V) but shows an ascertainment bias. In theory, fi ~ Beta (a, b), with a = ' + 1 and b = V + 1, is the posterior distribution of the alternate allele frequency /at heterozygous sites, assuming Hardy- Weinberg equilibrium. Since the claimed method does not depend on the derivation, the derivation of the distribution for the query results is not repeated here. The derivation is incorporated by reference to the provisional application, as cited above. In practice, for both simulated and real genomic data demonstrated below, the observed values of the parameters of the posterior distribution are slightly different from their expectations given the distribution in the genome. In the power curves demonstrating likelihood described below, the correct estimated values of the parameters a and b for the simulated data are used rather than the theoretical expectation or estimates from real data.
[0068] The log-likelihood UK) of a response set R = {x , . . . , xn} can be written as Equation 6.
L(R) = ∑?=! *. log [P(xt = 1)] + (1 - xi \og[P(xt = 0)] (6).
for each x,- having two possible outcomes: true(l), e.g., the allele is present in the ensemble, or false (0), the allele is not present in the ensemble. The probability P of the outcome depends on the hypothesis. In various embodiments, the log likelihood is determined for a null hypothesis (e.g., the test subject or relative is not a member of the ensemble) and one alternative hypothesis (the test subject or relative is a member of the ensemble and x,- = 1 for all i, or some other condition of interest), and the two log likelihoods are compared. A determination is made of whether the alternative hypothesis is true based on a comparison of
the two likelihoods, e.g., by a difference or ratio. In this illustrated embodiment, a ratio of the two likelihoods is determined.
[0069] In this example embodiment, the null hypothesis is that the test subject (query genome) is not in the ensemble and the alternative hypothesis is that the test subject is in the ensemble. Under this alternative hypothesis, HI, the log likelihood is computed as given by equation (7)
LHI (R) = ∑?=i *£ log [l - + (1 - x^log^] (7)
Where DN-I is the probability that none of N-l genomes in the ensemble has an alternative allele at a given position, which can be determined from the SFS. The example embodiment uses Equation 7 and the derivation of Equation 7 is not needed to practice the embodiment; therefore the derivation of Equation 7 is not repeated here. The derivation is incorporated by reference to the provisional application, as cited above.
[0070] Similarly, the log-likelihood under the null hypothesis HO that the test subject (query genome) is not in the ensemble is computed as given by Equation 8.
LHO 00 =
(8) Where DN is the probability that none of N genomes in the ensemble has an alternative allele at a given position, again determined from the SFS. Again, this example embodiment uses Equation 8 and the derivation of Equation 8 is not needed to practice the embodiment;
therefore the derivation of Equation 8 is not repeated here. The derivation is incorporated by reference to the provisional application, as cited above.
[0071] In this embodiment, the value of DN and DN-I are determined as follows. DN is defined as the probability that none of N individuals have an alternative allele. Thus
Recall, a and b are the parameters of the SFS distribution of the alternate allele frequency /at heterozygous sites. In this embodiment, equation 9a is evaluated using the Gamma function, Γ. The gamma function is the well known extension of the factorial function to real and complex numbers, so in the case of a positive integer m, T(m) = (m-1)!. For complex number t with a positive real part, G(i) = /0°° xt~1e~xdx. The Stirling approximation to the Gamma function is used and is given by Equation 9b. rco - jfe)' <9b)
Also used is the result that
limy→∞ (l - ~ (9c) It is further assumed that N » a, b and N» 1, so that a «1. This leads to the estimate
b+2N
This example embodiment uses Equation 9d, and the derivation of Equation 9d is not needed to practice the embodiment; therefore the derivation of Equation 9d is not repeated here. The derivation is incorporated by reference to the provisional application, as cited above.
[0072] DN-I is defined as the probability that none of N-l individuals have an alternative allele. Thus
This can be approximated with Equation 9d by replacing N in Equation 9d with (N-l).
[0073] The test statistic Λ in this embodiment is based on a log of the ratio of the likelihoods of the two hypotheses, and therefore is based on the difference of the log likelihoods, as given by Equation 11a.
Λ = Lm (R) - LH1 (R) (11a) which, after substituting Equation 8 for the first term and Equation 7 for the second term, yields
Again, this example embodiment uses Equation l ib through l id, and the derivation of Equations l ib through l id is not needed to practice the embodiment; therefore the derivation of Equations l ib through l id is not repeated here. The derivation is incorporated by reference to the provisional application, as cited above.
[0074] An advantage of Equation 1 lb is that it is understood to be a test for a simple null hypothesis, Ho, that has probability 0= 1-DN of a consistent result against a simple alternative hypothesis HI, that has a probability 0= \- 5DN_ of a consistent result when one
is given R samples as a Bernoulli random variable, x,- ~ Bernoulli^, that is, x,- is a random variable with only two possible outcomes, true (1) that the allele at positon i is in the ensemble, or false (0), it is not, as described above. The x,- (whether an allele is present in the ensemble) can only take two values: 1 (present) or 0 (absent). So each x,- is a Bernoulli random variable by definition. Each x,- has the same Prob(x,- =1) because in the absence of frequency information, all alleles are similar in that they are generated from the SFS.
Therefore the x,- are assumed to be independent and identically distributed (i.i.d.). By the Neyman- Pearson lemma, the likelihood ratio test, l ib, is the most powerful test for a given test size. The size of a test in hypothesis testing literature is defined as the probability of falsely rejecting the null hypothesis (e.g., falsely claiming an allele is present in the beacon when it is in fact absent). So the test size can be considered to be the (expected) false positive rate when the null hypothesis is true, given by a false positive rate, .
[0075] In this embodiment, the null hypothesis is rejected if the likelihood is much less than the likelihood of the alternative. This is expressed in terms of Λ < t for some threshold t. The threshold is selected to meet some arbitrary false positive rate, , e.g., a false positive rate of 1% or 5%. Thus a threshold ^ associated with a given false positive rate oris one such that the test statistic Λ will be less than that threshold, ta , with a probability of Qr,as given by Equation 12.
P(A < ta | Ho) = cc. (12) This is equivalent to rejecting the null hypothesis under the conditions of Expression 13a and Equation 13b.
∑r=1*£ > fa (13a) That is, the null hypothesis is rejected if the number of yeses is greater than a normalized threshold t'a, where
fa = ^ (13b)
Again, this example embodiment uses Equations 13a and 13b, and the derivation of
Equations 13a and 13b is not needed to practice the embodiment; therefore the derivation of Equations 13a and 13b is not repeated here. The derivation is incorporated by reference to the provisional application, as cited above. In this embodiment, the normalized threshold
t'a serves as the number NY that is a number of yes responses that indicate a particular likelihood (particular false positive rate, a) that the individual is a member of the ensemble.
[0076] The likelihood that the conclusion is correct, Ι-β, is called the power of the test, where ?is the probability that the conclusion is erroneous. The power can be estimated as follows. Because the x,- are Bernoulli random variables with known estimates of probabilities # under the various hypotheses, the binomial distribution properties can be used to compare the distributions and estimate the power of the test of Equations 13a andl3b.The x,- are independent and identically distributed under each hypothesis, therefore the number of yeses xi) expected under each hypothesis is given by the Binomial distribution. For example, in this illustrated embodiment the number of yesses expected is given by Binomial(n, 1-DN) for the null hypothesis and Binomial(n,
for the alternate hypothesis. Therefore the power of the test is given by Equation 13c.
l - = P(∑?=1 Z£ > t'a I H (13c) The number of yeses that exceed the normalized threshold, t'a, given the alternate hypothesis is the test statistic. Note that the normalized thresholdt'a, is defined in terms of the number of yeses that achieve a certain false positive rate for the null hypothesis in Equation 13b. A sufficient statistic for the likelihood ratio test is the number of "Yes" responses from the beacon.
[0077] To achieve any particular small value of a, with the power of Ι-β, the number of queries, n, may have to be increased to get a useful result. In this illustrated embodiments, a suitable number of queries, NQ, is determined as follows.
[0078] In the null and alternative hypotheses, as stated above, x, is a Bernoulli random variable. Therefore, by the central limit theorem, the likelihood ratio test (LRT) statistic Λ has a Gaussian distribution. The parameters of the Gaussian distribution can be used to obtain a relationship between the number, n, of queries (required to achieve a desired power, Ι-β, and false positive rate, ) and the number, N, of individuals in the beacon.
[0079] Let /Jo and OQ be the mean and standard deviation of the LRT statistic under the null hypothesis and γ and θ be the corresponding values under the alternative hypothesis. For an LRT statistic that has a normal distribution the two distributions are related as follows
where the notation zy indicates the _ -quantile of the standard normal distribution. For Λ described above, it can be shown that the value of n sufficient to achieve a particular power (Ι-β) and false positive rate (or) is related to the number of genomes in the ensemble N by Equation 15.
n = {ζα-Ζι_β δγ Γ(ϋ' + 1)2"'+ 1
Na'+1 r(a'+b'+2) ^ } where a' and V are the parameters of the Beta distribution used to fit the SFS, as described above; and, Γ is the gamma function. This example embodiment uses Equation 15, and the derivation of Equation 15 is not needed to practice the embodiment; therefore the derivation of Equation 15 is not repeated here. The derivation is incorporated by reference to the provisional application, as cited above. Note that the right hand side of Equation 15 is independent of both n and N and depends on both the false positive rate or and the power \-β. Thus the value of n to achieve such power and rate increases is NQ; and, by virtue of Equation 15, NQ is proportional to the denominator of the left side of Equation 15, which is Na'+1.
[0080] Therefore, in this embodiment, equations 15 and 13b provide the values for NQ and NY, respectively, in step 411.
[0081] Thus, a sufficient statistic for the likelihood ratio test is NY, the number of "Yes" responses from the beacon. If a "truth set" of individuals known to be (or not be) in the beacon is available, the critical value and power of the test can be computed using only the number of "Yes" responses from the beacon. Thus the empirical power is not dependent on the SFS parameters, which suggests the test is robust to SFS parameters.
2.2 Detecting relatives.
[0082] The relatedness of two individuals can be parameterized using a single parameter φ which is the probability that the two individuals share an allele at a single SNP. Thus, identical twins have φ = 1, parent-offspring and sibling pairs have φ = 0.5, first cousins have φ = 0.25 and so on.
[0083] Under the alternate hypothesis (a relative of the query genome g with relatedness is present in beacon B), the response x,- is given by x,- = 0 if none of the other N-l genomes in the beacon has the alternate allele and (a) there is no mismatch between the query genome and its copy in the beacon and the relative is homozygous reference at the SNP, or (b) there is
a mismatch between the query genome and its copy in the beacon and the relative is not homozygous reference at the SNP. Otherwise, x,- = 1. For an individual that is heterozygous at a SNP with alternate allele frequency/, the genotype probabilities for a relative with relatedness φ can be determined given the genotype of the individual.
[0084] The likelihood for the null hypothesis remains the same as before. Under the alternate hypothesis (a relative of the query genome g with relatedness is present in beacon B), the log-likelihood is given by Equations 16a through 16c.
P(xi = O lHi) = 8DN_1 + (1 - 25)(1 - φ)2ϋΝ + (1 - 25)0(1 - φ)ϋ
2
(16a) i
where D i is estimated using Equation 9d by replacing N with the value N— , and
2 2
P(xt = HHi) = 1 - - (1 - 25) (1 - φ)2ϋΝ - (1 - 25)0(1 - 0)£>„_!
2
(16b)
Thus
¾ =
log {l - - (1 - 25)(1 - φ)2ΌΝ - (1 - 25)0(1 - ) l} + - x^l°9 [δΌΝ-ι + (1 - 25)(1 - φ)2ΌΝ + (1 - 25)0(1 - 0)Dw_i}]
(16c)
This example embodiment uses Equations 16a through 16c, and the derivation of Equations 16a through 16c is not needed to practice the embodiment; therefore the derivation of Equations 16a through 16c is not repeated here. The derivation is incorporated by reference to the provisional application, as cited above.
[0085] The LRT statistic is calculated using the expressions of Equations 16a through 16c. Here the exact test uses the NY (∑=1 X; ) as the sufficient statistic (as before) and the sufficient statistic is binomially distributed under both hypotheses. The distribution of the null hypothesis is the same as before, the distribution of the alternate hypothesis Hi is given by Equation 16d
∑=1 X; I Hi is distributed as
Binomial(n, 1 - SD^ - (1 - 25)(1 - φ)2ϋΝ - (1 - 25)0(1 - ø)£> ±) (16d)
2.3 Censoring output.
[0086] It is valuable to determine how beacons should be modified in some embodiments to protect against such attacks as described above. In some embodiments, the beacon is modified based on the NQ or NY that are useful to re-identify an individual in the beacon. Because the rare alleles with low frequency in the SFS provide the most information about an individual, in a censoring approach, a YES response is not returned for queries for the rare SNPs. That is, one solution to the re-identification problem is to return accurate responses only for common variants. Thus, a setting is considered in which the beacon chooses a threshold frequency/* and returns "No" responses to queries for alleles that have frequency less than or equal to/* in the population (not necessarily in the beacon samples). For alleles at frequency larger than/*, the beacon will return an accurate response.
[0087] In this embodiment, under the alternative hypothesis (query genome g is present in beacon B, g £ B), the response x,- is given by x,- = 0 if either: (a) frequency of the allele /· </*; or, (b) frequency of the allele >/*; and there is a mismatch between the query genome and its copy in the beacon and none of the other N-1 genomes in the beacon has the alternate allele. Otherwise, x,- = 1.
[0088] The probability of a false result given the alternate hypothesis is given by Equation 17a through 17a through 17c.
P(xt = 0 \H1) =
Which can be reduced to
P(xl = 0 \H1) = (17b)
where
EN-I = If b) + 5£>JV-I{1 - lf b + 27V - 2)} (17c)
Here Iy(a,b) is the cumulative distribution function for a Beta distribution with shape parameters a and b at value y. This example embodiment uses Equations 17a through 17c, and the derivation of Equations 17a through 17c is not needed to practice the embodiment; therefore the derivation of Equations 17a through 17c is not repeated here. The derivation is incorporated by reference to the provisional application, as cited above
[0089] Thus the log likelihood of the alternative hypothesis is given by Equation 18.
LHl (R) = ∑?=i *i l giX - ¾-i) + (1 - xdlog iEn-J (18)
[0090] Under the null hypothesis (query genome g is not in beacon B, g <£ B), the response x, is given by x,- = 0 if either: (a) frequency of the allele /J < f*; or, (b) frequency of the allele /J > f*; and none of the other N genomes in the beacon has the alternate allele. Otherwise, x,- = 1.
[0091] The probability of a false result given the alternate hypothesis is given by Equation 17a through 19a through 19c.
P(Xi = 0 \ =
Which can be reduced to
P(xi = 0 \H0) = FN (19b) where
FN = lf b) + DN{1 - lf a, b + 27V)} (19c) This example embodiment uses Equations 19a through 19c, and the derivation of Equations 19a through 19c is not needed to practice the embodiment; therefore the derivation of Equations 19a through 19c is not repeated here. The derivation is incorporated by reference to the provisional application, as cited above.
[0092] Thus the log likelihood of the null hypothesis is given by Equation 20.
[0093] The Gaussian approximation can be used to obtain an estimate of the optimal censoring frequency/*. The Gaussian distribution of the sums for the two hypotheses are given by Equations 21 to 24.
μ1 = ηΒ + nC(l - EN_t) (21)
(22) nB + nC(l - FN) (23)
Using these Equations with Equation 14, the power is given by Equation 25.
γ _ β _ φ-l
Φ is used (commonly in statistics literature) for the cumulative distribution function of the standard normal distribution. That is, if x is Normal with mean 0 and variance 1; Φ (t) =
Prob(x < t) for any value of t. Φ 1 is the inverse of that function, i.e, if Φ 1 (s) = t, that means
Φ (t) = s. It appears because if the values of μγ, σ\ , μ , OQ are known (say from Equations 21
to 24), and one sets a desired limit on , one can solve Equation 14 to find
and estimate the statistical power of the test. The Φ 1 is needed to convert from ζ(1-β) to the power (Ι-β).
[0094] This example embodiment uses Equations 21 through 25, and the derivation of Equations 21 through 25 is not needed to practice the embodiment; therefore the derivation of Equations 21 through 25 is not repeated here. The derivation is incorporated by reference to the provisional application, as cited above. All terms in Equation 25 depend on/*, n, N, a, b, or and β. Thus, in a beacon with N individuals from a population with SFS parametrized by Beta(a-\, b-Y) while allowing n queries given a desired false positive rate or and maximum allowable power Ι-β, one can find the censoring threshold/*. An analytical solution cannot be obtained for/* due to the form of the cumulative distribution function. However, a grid search over/* can be used to be find the optimal value for censoring threshold.
2.4 Simulation embodiments.
[0095] Simulations were performed with 500,000 SNPs in a sample of 1000 diploid individuals. Alternate allele frequencies were sampled from a multinomial distribution with probabilities obtained from the expected allele frequency distribution for standard neutral model assuming a population size of 10,000 individuals. A beacon was constructed using 1000 simulated individuals. The query set of individuals consisted of 200 diploid individuals from the beacon and 200 diploid individuals not in the beacon whose genotypes were simulated according to the generated allele frequencies at all SNPs. The false positive rate was set to 0.05 for all scenarios.
[0096] For initial experiments, the mismatch rate δ between the beacon and the 200 query copies of the same genomes was set to one part per million to simulate near ideal data quality.
[0097] The null distribution of the LRT statistic was obtained empirically using the exact test calculation for the 200 individuals not in the beacon. Power was calculated empirically as the proportion of the 200 tests for the query genomes in the beacon that were successfully rejected.
[0098] To examine if relatives could be identified from the beacon, 200 individuals from the beacon were used to generate query genomes with varying degrees of relatedness to the original individual.
[0099] Genome sequencing is more error-prone than array genotyping. Even with high coverage data, biological replicates of the same individual may have 1-5% SNPs unique to each replicate. On the same sequenced sample, different variant calling pipelines can produce SNP calls at positions that may differ from each other. This is modeled in the simulation by allowing for a mismatch probability δ that, for a query individual who is in the beacon and is heterozygous at the query SNP, the copy in the beacon is homozygous reference, i.e, the beacon will (erroneously) return 0 as the response to the query. Table 2 shows the levels of mismatch modeled in the simulated experiments.
Table 2. Error types modeled by mismatch rate &
[0100] FIG. 8A is a graph that illustrates example power of the method for simulated data for an individual, according to an embodiment. The horizontal axis indicates the number of queries, NQ, each query asking whether a single SNP is present in the simulated beacon. The vertical axis indicates the power of test. The dashed line indicates the theoretical power given by Equation 13c, and the solid line gives the empirical power observed in the simulation. It can be seen that the LRT has more than 95% power for detecting whether an individual is in the beacon with just 5,000 SNP queries. It can also be seen that the theoretical analysis matches the empirical results very well.
[0101] FIG. 8B is a graph that illustrates example power of the method for simulated data for relatives of an individual, according to an embodiment. The horizontal axis indicates the number of queries, NQ, each query asking whether a single SNP is present in the simulated beacon. The vertical axis indicates the power of test. The dashed line indicates the theoretical power given by Equation 13c, using Equation 16d for the binomial distribution of the alternative hypothesis, and the solid line gives the empirical power observed in the simulation. Pairs of theoretical and empirical powers are shown for each of four values of relatedness, for φ= 1 (e.g., identical twin, which is the same cure as in FIG. 8A), 0.5, 0.25 and 0.125. For the same number of SNPs queried, the power for detecting relatives is reduced but still considerable. FIG. 8C is a graph that illustrates example power versus false positive rate in simulated data for relatives of an individual when NQ = 16,000, according to
an embodiment. Such curves are called ROC curves (for Receiver Operating Characteristic, named for historical uses) in statistics. The logarithmic horizontal axis indicates false positive rate ( ) and the vertical axis indicates power (Ι-β). With 16,000 queries, the power is useful for parents and non-identical siblings, 0 =0.5.
[0102] FIG. 8D is a graph that illustrates example power versus false positive rate in simulated data for different error rates when NQ = 16,000, according to an embodiment. The logarithmic horizontal axis indicates false positive rate (a) and the vertical axis indicates power (Ι-β). Empirical power and false alarm rates were determined when mismatch rates S
-6 -3 -2 -1
were set to 10 , 10 , 10 and 10 . It can be seen that sequencing errors and variant calling differences reduce the power of the test, but error rates up to one in a hundred (10 ) are well tolerated.
2.5 Real data embodiments.
2.5.1 1000 Genomes Phase 1 CEU beacon
[0103] A beacon was generated using the CEU (Western European) population from Phase 1 of the 1000 Genomes Project [8]. Of the 85 CEU samples present in Phase 1, 65 are used in the beacon. 20 samples from the beacon and the remaining 20 samples are used as query genomes. Whole genomes were then used to query the beacon, as before. To test if sharing SNP array data was more secure than sharing whole genomes, we repeated the setup with Affymetrix array data for the CEU samples. SNP array data was then used to query the beacon.
[0104] In some embodiments, the response from a beacon is based on the values of NQ and NY, as described above for step 423. In some of these embodiments, as described above, censoring is invoked to change the beacon response to queries for SNPs of low frequency in the beacon in order to protect the identity of individuals in the beacon. To test the effect of censoring on power, a beacon was constructed using the same data as above, except that the beacon always responded "No" to each query for a SNP that is a singleton in the beacon.
[0105] FIG. 9A is a graph that illustrates example power of the method for real data for an individual, according to an embodiment. The horizontal axis indicates the number of queries, NQ. The vertical axis indicates the power of test. The dashed line indicates the theoretical power given by Equation 13c for a 5% false positive rate, and the solid line gives the empirical power observed in the data. Using just 250 SNPs, beacon membership can be
detected with 95% power and 5% false positive rate. FIG. 9B is a graph that illustrates example power of the method for real data for an individual using censored or SNP beacon responses, according to an embodiment. The horizontal axis indicates the number of queries, NQ. The vertical axis indicates the power of test. A trace is shone for responses based on the microarray subset of SNPs, on the whole genome sequencing (WGS) data set (as plotted in FIG. 9A) and on the censored WGS data set for which a query for a SNP that is a singleton in the data set receives a "No" response from the beacon. A beacon constructed using the same individuals but with SNP array data shows a reduction in power, as does a beacon which uses sequence data but censors responses by always replying 'No' to queries for singletons. Even in these scenarios, the LRT has greater than 90% power if 10,000 or more queries are permitted.
2.5.2 Beacons from multiple datasets
[0106] FIG. 10A is a block diagram that illustrates example beacons constructed from multiple datasets, according to an embodiment. CEU indicates an SNP reference panel based on central European, Ukraine genomes; JPT indicates an SNP reference panel based on Japan, Tokyo genomes; and, YRI indicates an SNP reference panel based on Yoruba of Ibadan, Nigeria genomes. As depicted in FIG. 10A, multiple beacons were constructed that contained either a single population (65 CEU individuals) or multiple populations (a CEU+YRI beacon with 32 CEU and 33 YRI individuals and a CEU+JPT beacon with 32 CEU and 33 JPT individuals). 40 CEU individuals were used as query individuals, with 20 belonging to all beacons and 20 belonging to none of the beacons.
[0107] From the theoretical analysis, one can see that increasing beacon size increases the number of SNPs required to achieve a given power level at a specified false positive rate threshold. Combining multiple datasets can make detection more difficult in the same way. A question of interest is whether combining multiple datasets can also make detection more difficult by affecting the SFS of the samples in the beacon.
[0108] Figure 10B is a graph that illustrates example power of tests for beacons containing multiple populations, according to various embodiments. The horizontal axis indicates the number of queries, NQ. The vertical axis indicates the power of test. A trace is plotted for each of the three beacon populations. The results show that for a fixed number of SNPs to query, the power for the multi-population beacons is higher than that for the CEU-only beacon. A single-population beacon is therefore more secure than a multi-population beacon
of the same size. Since the protective effect of extra samples in the beacon against re- identification depends on their allele sharing with the query genome, including other populations in a beacon is less effective than including the same number of individuals from the population of the query genome.
2.5.3 Attacks on existing beacons
[0109] To test the method on existing beacons, a single genome (id: hu48C4EB or PGP 183) from the Personal Genome Project (Church 2005) was selected. 1000 heterozygous SNPs were chosen from the selected individual's genome. The Beacon Network query interface was used to query all existing beacons for the alternate allele at the chosen SNPs. If a beacon of size N produced k "Yes" responses to n queries, the p- value was calculated under the null hypothesis as P(x > k; x ~ Binomial(n, 1 -[½)). TO avoid overloading the beacon servers, a delay of 5 seconds was inserted between queries, and all 1000 queries were completed in 3 hours 53 minutes from a single computer. For the beacons of known size, the results are shown in Table 3. Based on the metadata alone, it was possible to ascertain that the selected individual was present in the PGP beacon and the Known VARiants (Glusman 2011) beacon, respectively. Both gave 100% yes responses. Yet only the PGP would reject the null hypothesis that the individual is not in the ensemble; and thus, with 1000 queries, conclude that the individual is in the beacon. The size of the Known VARiants beacon is so large that 1000 queries is not nearly enough to make a determination to reject the null hypothesis, demonstrating that re-identification is more difficult in larger beacons.
Table 3. Existing Beacons with known size.
[0110] The theoretical analysis was used to estimate the number of queries required to re- identify individuals and relatives from existing beacons. Publicly available beacon metadata
was used to infer the number of individuals present in the beacon. Where this was not possible (the AMPlab, ICGC and NCBI beacons), conservative estimates were used based on the size of the underlying datasets. For SFS parameters, the estimates for the simulation data, described above, were used. The Known Variants beacon contained 63,500 exomes and 8,400 whole genomes. Since exomes are only 1% of entire genomes in length, this beacon can be assumed to consist of two beacons: an exome beacon with 72,000 exomes; and a genome beacon with 8,400 whole genomes. Re-identification is possible in the genome beacon by avoiding queries for SNPs in the coding regions. The results of the computation for multiple existing beacons are summarized in Table 4.
Table 4. Estimated number of SNP queries (NQ) for re-identification in real beacons with a false positive rate of 5% and a power of 95%.
From Table 4, it is seen that only the Broad Institute exome beacon and the Known VARiants exome beacon are safe from our re-identification attack, needing in excess of 200,000 queries to determine if an individual is included. This is because exomes have much fewer SNPs than genomes and so have fewer low frequency SNPs that can give away identification of individuals For all other beacons, re-identification is possible with 95% power, using less than 50,000 allele queries. Thus the approach is computationally feasible with most existing beacons.
[0111] In the illustrated embodiments, the proposed LRT provides a demonstration that individual privacy can be compromised through beacons. The illustrated embodiment was
presented to show that beacon membership can be identified using only the query genome, even if allele frequencies are not known. As a result, the bounds obtained for the number of queries required for re-identification (Table 4) are conservative and need not be used directly to guide the construction of beacons. In other embodiments, a re-identification test that uses only rare SNPs and/or incorporates the allele frequencies at SNPs is expected to be more powerful than the illustrated embodiment and will require fewer queries than the estimates of Table 4.
[0112] The empirical power of the test does not depend on the SFS parameters. The power of the test is similar for populations with different SFS parameters and Figure 9A shows good agreement between theoretical and empirical power curves on the CEU beacon. This suggests that the test is robust to different SFS parameters.
[0113] A computational performance limitation is that establishing high confidence may need millions of queries, which can take many months to perform. In the above experimental embodiments with existing beacons, 1000 queries to the beacon server (for all beacons) was made in 3 hours 53 minutes, with a 5 second delay between queries accounting for 1.4 hours of the total time.
[0114] In the illustrated embodiments, some simplifying assumptions were made. In other embodiments, other assumptions are made and still provide estimates of NQ and NY to achieve a certain degree of confidence in the results. For example, it is assumed above that the beacon samples and the query genome belong to the same population. This is a reasonable assumption since beacons often publish the ethnicity of the datasets included while the ethnicity of the query genome can be identified by comparing it to reference panels like 1000 Genomes. Genotypes are assumed to be distributed according to Hardy- Weinberg equilibrium. It is also assumed that allele queries are independent, which can lead to overly confident predictions for common SNPs. It is expected that this assumption will not affect these results significantly, since most SNPs are rare (< 5% frequency) in human populations.
2.6 Enhanced beacon security.
[0115] It is valuable to determine how beacons should be modified in some embodiments to protect against such attacks as summarized in Table 4.
[0116] The likelihood ratio test for identifying whether a given individual genome is part of a beacon has been developed, such as described above. These experiments show that in a variety of settings, re-identification is possible with high power for not only individuals in the
beacon but also their relatives. Since beacons are often designed to share samples with a certain phenotype, this also discloses phenotype information about the individual who is detected to be part of the beacon. While detecting membership does not breach privacy, disclosure of potentially sensitive phenotype information is a serious privacy breach. Of the eight beacons listed in Table 4 which index genomic data that is not publicly available, four are associated with a single phenotype (Cafe CardioKit, ICGC, IBD, SFARI beacons), three are associated with multiple phenotypes (Broad Institute, NCBI, UKlOK beacons) and one is not associated with any phenotype (Native American+Egyptian beacon). Table 5 lists the phenotypes associated with various beacons.
Table 5. Phenotypes linked with genomic data from existing beacons
A dataset is denoted as "public" if individual-level genotype data can be downloaded with requesting access. Beacons which index non-public data are shown in bold. For beacons indexing public data, the phenotype is listed as "N.A." (not applicable).
[0117] If the LRT described above (with false positive rate a=5%) identifies an individual as belonging to a case-only beacon (e.g., rejects the null hypothesis) for a disease with population prevalence (prior probability of an individual having the disease) p = 1%, then the posterior probability of the individual having the disease is given by (l-o) + ap = 0.9505 according to Bayes' theorem. For the same result in a case-control beacon with equal numbers of cases and controls, the probability of the individual having the disease is given by
0.5 * (1- a)+0.05p = 0.4755. In contrast, while genomic risk prediction has high success rates for mendelian diseases with highly penetrant alleles and in some cancers, the success of
such approaches for predicting common disease risk is modest (Shrodi 2014). An upper bound on the performance of genomic risk prediction using an individual's genome can be obtained by considering the (broad-sense) heritability of the disease being studied. Polderman et al. (2015) examined the heritability of 17,804 human traits. From their analysis, one can see that 26 out of 43 ICD 10-ICF sub-chapter level disease categories have heritability less than 50%, suggesting that the performance of genomic risk prediction for many disease categories will be limited.
[0118] The above results have important implications for setting up beacons to allow data sharing while still protecting individual privacy. Beacons are designed to help researchers find datasets relevant to their research interests (e.g., containing an allele that the researchers may have previously found associated in a genome-wide association study, GWAS).
Individual level genotype data is usually access-controlled (Zerhouni 2008) and a researcher may spend considerable time and effort applying for access, only to find that the dataset is not relevant to the researcher's study. An advantage of a beacon is that any researcher can use it to query access-controlled data without applying for access. This will allow researchers to establish if an access-controlled dataset might be of interest; and, then apply for access only for relevant datasets. Two desirable features in beacons might therefore be that they contain a single dataset (so researchers who find a relevant dataset by querying a beacon can get data access through a single request) and that they return accurate information about presence of rare alleles. Solutions to protect privacy in beacons advantageously also maintain the utility of beacons by supporting these features.
[0119] Here are examined two ways in which security can be improved for anonymous- access beacons: (1) making detection of membership in the beacon more difficult, and (2) reducing the leakage of phenotype information from the beacon.
[0120] A number of approaches can be used make detection of membership in the beacon more difficult. Increasing beacon size can make detection more difficult as demonstrated above for the Known VARiant beacon. However, a disadvantage of this approach is some circumstances is that protection against genome- wide re-identification attacks will involve including tens of thousands of individuals. Another approach is to limit the genome region in the beacons. Beacons sharing small genomic regions (single genes or exomes) are more secure than those sharing whole genomes because there are fewer low frequency SNPs that give strong indication of individual membership. Confining a beacon to one population type
provides more security for a given number of members. As demonstrated in FIG. 10B, beacons containing multiple populations are less secure than single-population beacons of the same size. Publishing metadata, such as the ethnicity of samples, beacon size or the names of datasets included, reduces beacon security. Conversely limiting the metadata about the beacons is advantageous to enhance security. Limiting the number and/or rate of queries per IP address can slow down attackers and are therefore not as effective as some of the other approaches. Data anonymization (Erlich 2014) approaches, such as using only common variation or censoring (FIG. 9B) make re-identification more difficult but not impossible. All of these methods make detection of membership in the beacon more difficult and can be combined in some embodiments, but these approaches can also reduce the utility of beacons to some users. Thus such approaches should be applied with caution and an eye to the expected utility of the beacon.
[0121] An alternative way of improving beacon security is to address the leakage of phenotype information, instead of or in addition to, reducing the possibility of re- identification. As described earlier, the probability that a re-identified sample has the disease associated with the beacon dataset depends on the proportion of cases in the beacon dataset. Therefore, by adding a suitable number of controls or aggregating responses from multiple beacons, the probability that a re-identified sample has the disease may be reduced to an acceptable level. Heritability estimates can be used to determine an acceptable probability level for a particular disease. These solutions reduce the phenotype information that can be obtained from a beacon with a minor reduction in the utility of the beacon due to the inclusion of non-case samples.
[0122] It is expected that, due to the lack of monitoring and access control, anonymous- access beacons will always be open to re-identification attempts. To improve security and reduce loss of privacy through beacons, it is advantageous to prohibit anonymous access. Requiring users to authenticate to access beacons will allow the research community to discourage re-identification attacks through policies outlining acceptable uses of beacons (Erlich 2014), which can be enforced against authorized users.
3. Computational hardware
[0123] FIG. 5 is a block diagram that illustrates a computer system 500 upon which an embodiment of the invention may be implemented. Computer system 500 includes a communication mechanism such as a bus 510 for passing information between other internal
and external components of the computer system 500. Information is represented as physical signals of a measurable phenomenon, typically electric voltages, but including, in other embodiments, such phenomena as magnetic, electromagnetic, pressure, chemical, molecular atomic and quantum interactions. For example, north and south magnetic fields, or a zero and non-zero electric voltage, represent two states (0, 1) of a binary digit (bit). Other phenomena can represent digits of a higher base. A superposition of multiple simultaneous quantum states before measurement represents a quantum bit (qubit). A sequence of one or more digits constitutes digital data that is used to represent a number or code for a character. In some embodiments, information called analog data is represented by a near continuum of measurable values within a particular range. Computer system 500, or a portion thereof, constitutes a means for performing one or more steps of one or more methods described herein.
[0124] A sequence of binary digits constitutes digital data that is used to represent a number or code for a character. A bus 510 includes many parallel conductors of information so that information is transferred quickly among devices coupled to the bus 510. One or more processors 502 for processing information are coupled with the bus 510. A processor 502 performs a set of operations on information. The set of operations include bringing information in from the bus 510 and placing information on the bus 510. The set of operations also typically include comparing two or more units of information, shifting positions of units of information, and combining two or more units of information, such as by addition or multiplication. A sequence of operations to be executed by the processor 502 constitutes computer instructions.
[0125] Computer system 500 also includes a memory 504 coupled to bus 510. The memory 504, such as a random access memory (RAM) or other dynamic storage device, stores information including computer instructions. Dynamic memory allows information stored therein to be changed by the computer system 500. RAM allows a unit of information stored at a location called a memory address to be stored and retrieved independently of information at neighboring addresses. The memory 504 is also used by the processor 502 to store temporary values during execution of computer instructions. The computer system 500 also includes a read only memory (ROM) 506 or other static storage device coupled to the bus 510 for storing static information, including instructions, that is not changed by the computer system 500. Also coupled to bus 510 is a non- volatile (persistent) storage device 508, such as
a magnetic disk or optical disk, for storing information, including instructions, that persists even when the computer system 500 is turned off or otherwise loses power.
[0126] Information, including instructions, is provided to the bus 510 for use by the processor from an external input device 512, such as a keyboard containing alphanumeric keys operated by a human user, or a sensor. A sensor detects conditions in its vicinity and transforms those detections into signals compatible with the signals used to represent information in computer system 500. Other external devices coupled to bus 510, used primarily for interacting with humans, include a display device 514, such as a cathode ray tube (CRT) or a liquid crystal display (LCD), for presenting images, and a pointing device 516, such as a mouse or a trackball or cursor direction keys, for controlling a position of a small cursor image presented on the display 514 and issuing commands associated with graphical elements presented on the display 514.
[0127] In the illustrated embodiment, special purpose hardware, such as an application specific integrated circuit (IC) 520, is coupled to bus 510. The special purpose hardware is configured to perform operations not performed by processor 502 quickly enough for special purposes. Examples of application specific ICs include graphics accelerator cards for generating images for display 514, cryptographic boards for encrypting and decrypting messages sent over a network, speech recognition, and interfaces to special external devices, such as robotic arms and medical scanning equipment that repeatedly perform some complex sequence of operations that are more efficiently implemented in hardware.
[0128] Computer system 500 also includes one or more instances of a communications interface 570 coupled to bus 510. Communication interface 570 provides a two-way communication coupling to a variety of external devices that operate with their own processors, such as printers, scanners and external disks. In general the coupling is with a network link 578 that is connected to a local network 580 to which a variety of external devices with their own processors are connected. For example, communication interface 570 may be a parallel port or a serial port or a universal serial bus (USB) port on a personal computer. In some embodiments, communications interface 570 is an integrated services digital network (ISDN) card or a digital subscriber line (DSL) card or a telephone modem that provides an information communication connection to a corresponding type of telephone line. In some embodiments, a communication interface 570 is a cable modem that converts signals on bus 510 into signals for a communication connection over a coaxial cable or into
optical signals for a communication connection over a fiber optic cable. As another example, communications interface 570 may be a local area network (LAN) card to provide a data communication connection to a compatible LAN, such as Ethernet. Wireless links may also be implemented. Carrier waves, such as acoustic waves and electromagnetic waves, including radio, optical and infrared waves travel through space without wires or cables. Signals include man-made variations in amplitude, frequency, phase, polarization or other physical properties of carrier waves. For wireless links, the communications interface 570 sends and receives electrical, acoustic or electromagnetic signals, including infrared and optical signals that carry information streams, such as digital data.
[0129] The term computer-readable medium is used herein to refer to any medium that participates in providing information to processor 502, including instructions for execution. Such a medium may take many forms, including, but not limited to, non-volatile media, volatile media and transmission media. Non-volatile media include, for example, optical or magnetic disks, such as storage device 508. Volatile media include, for example, dynamic memory 504. Transmission media include, for example, coaxial cables, copper wire, fiber optic cables, and waves that travel through space without wires or cables, such as acoustic waves and electromagnetic waves, including radio, optical and infrared waves. The term computer-readable storage medium is used herein to refer to any medium that participates in providing information to processor 502, except for transmission media.
[0130] Common forms of computer-readable media include, for example, a floppy disk, a flexible disk, a hard disk, a magnetic tape, or any other magnetic medium, a compact disk ROM (CD-ROM), a digital video disk (DVD) or any other optical medium, punch cards, paper tape, or any other physical medium with patterns of holes, a RAM, a programmable ROM (PROM), an erasable PROM (EPROM), a FLASH-EPROM, or any other memory chip or cartridge, a carrier wave, or any other medium from which a computer can read. The term non-transitory computer-readable storage medium is used herein to refer to any medium that participates in providing information to processor 502, except for carrier waves and other signals.
[0131] Logic encoded in one or more tangible media includes one or both of processor instructions on a computer-readable storage media and special purpose hardware, such as ASIC 520.
[0132] Network link 578 typically provides information communication through one or more networks to other devices that use or process the information. For example, network link 578 may provide a connection through local network 580 to a host computer 582 or to equipment 584 operated by an Internet Service Provider (ISP). ISP equipment 584 in turn provides data communication services through the public, world-wide packet-switching communication network of networks now commonly referred to as the Internet 590. A computer called a server 592 connected to the Internet provides a service in response to information received over the Internet. For example, server 592 provides information representing video data for presentation at display 514.
[0133] The invention is related to the use of computer system 500 for implementing the techniques described herein. According to one embodiment of the invention, those techniques are performed by computer system 500 in response to processor 502 executing one or more sequences of one or more instructions contained in memory 504. Such instructions, also called software and program code, may be read into memory 504 from another computer-readable medium such as storage device 508. Execution of the sequences of instructions contained in memory 504 causes processor 502 to perform the method steps described herein. In alternative embodiments, hardware, such as application specific integrated circuit 520, may be used in place of or in combination with software to implement the invention. Thus, embodiments of the invention are not limited to any specific combination of hardware and software.
[0134] The signals transmitted over network link 578 and other networks through communications interface 570, carry information to and from computer system 500.
Computer system 500 can send and receive information, including program code, through the networks 580, 590 among others, through network link 578 and communications interface 570. In an example using the Internet 590, a server 592 transmits program code for a particular application, requested by a message sent from computer 500, through Internet 590, ISP equipment 584, local network 580 and communications interface 570. The received code may be executed by processor 502 as it is received, or may be stored in storage device 508 or other non-volatile storage for later execution, or both. In this manner, computer system 500 may obtain application program code in the form of a signal on a carrier wave.
[0135] Various forms of computer readable media may be involved in carrying one or more sequence of instructions or data or both to processor 502 for execution. For example,
instructions and data may initially be carried on a magnetic disk of a remote computer such as host 582. The remote computer loads the instructions and data into its dynamic memory and sends the instructions and data over a telephone line using a modem. A modem local to the computer system 500 receives the instructions and data on a telephone line and uses an infrared transmitter to convert the instructions and data to a signal on an infra-red a carrier wave serving as the network link 578. An infrared detector serving as communications interface 570 receives the instructions and data carried in the infrared signal and places information representing the instructions and data onto bus 510. Bus 510 carries the information to memory 504 from which processor 502 retrieves and executes the instructions using some of the data sent with the instructions. The instructions and data received in memory 504 may optionally be stored on storage device 508, either before or after execution by the processor 502.
[0136] FIG. 6 illustrates a chip set 600 upon which an embodiment of the invention may be implemented. Chip set 600 is programmed to perform one or more steps of a method described herein and includes, for instance, the processor and memory components described with respect to FIG. 5 incorporated in one or more physical packages (e.g., chips). By way of example, a physical package includes an arrangement of one or more materials, components, and/or wires on a structural assembly (e.g., a baseboard) to provide one or more
characteristics such as physical strength, conservation of size, and/or limitation of electrical interaction. It is contemplated that in certain embodiments the chip set can be implemented in a single chip. Chip set 600, or a portion thereof, constitutes a means for performing one or more steps of a method described herein.
[0137] In one embodiment, the chip set 600 includes a communication mechanism such as a bus 601 for passing information among the components of the chip set 600. A processor 603 has connectivity to the bus 601 to execute instructions and process information stored in, for example, a memory 605. The processor 603 may include one or more processing cores with each core configured to perform independently. A multi-core processor enables
multiprocessing within a single physical package. Examples of a multi-core processor include two, four, eight, or greater numbers of processing cores. Alternatively or in addition, the processor 603 may include one or more microprocessors configured in tandem via the bus 601 to enable independent execution of instructions, pipelining, and multithreading. The processor 603 may also be accompanied with one or more specialized components to perform
certain processing functions and tasks such as one or more digital signal processors (DSP) 607, or one or more application-specific integrated circuits (ASIC) 609. A DSP 607 typically is configured to process real-world signals (e.g., sound) in real time independently of the processor 603. Similarly, an ASIC 609 can be configured to performed specialized functions not easily performed by a general purposed processor. Other specialized components to aid in performing the inventive functions described herein include one or more field
programmable gate arrays (FPGA) (not shown), one or more controllers (not shown), or one or more other special-purpose computer chips.
[0138] The processor 603 and accompanying components have connectivity to the memory 605 via the bus 601. The memory 605 includes both dynamic memory (e.g., RAM, magnetic disk, writable optical disk, etc.) and static memory (e.g., ROM, CD-ROM, etc.) for storing executable instructions that when executed perform one or more steps of a method described herein. The memory 605 also stores the data associated with or generated by the execution of one or more steps of the methods described herein.
4. Alternatives, extensions and modifications
[0139] In the foregoing specification, the invention has been described with reference to specific embodiments thereof. It will, however, be evident that various modifications and changes may be made thereto without departing from the broader spirit and scope of the invention. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense. Throughout this specification and the claims, unless the context requires otherwise, the word "comprise" and its variations, such as "comprises" and "comprising," will be understood to imply the inclusion of a stated item, element or step or group of items, elements or steps but not the exclusion of any other item, element or step or group of items, elements or steps. Furthermore, the indefinite article "a" or "an" is meant to indicate one or more of the item, element or step modified by the article.
5. References
1000 Genomes Project Consortium. 2012. An integrated map of genetic variation from 1,092 human genomes. Nature 491(7422): 56-65.
Church, G. M. 2005. The personal genome project. Molecular systems biology 1(1):E1-E3. Clayton, David. On inferring presence of an individual in a mixture: a Bayesian approach.
2010. Biostatistics l l(4):661-73.
Erlich, Yaniv, and Arvind Narayanan. 2014. Routes for breaching and protecting genetic privacy. Nature Reviews: Genetics 15 (6): 409-21.
Erlich, Yaniv, James B. Williams, David Glazer, Kenneth Yocum, Nita Farahany, Maynard
Olson, Arvind Narayanan, et al. 2014. Redefining genomic privacy: trust and empowerment. PLoS Biology 12(l l):el001983.
The Genome of the Netherlands Consortium. 2014. Whole-genome sequence variation, population structure and demographic history of the Dutch population. Nature Genetics
46(8):818-825.
Glusman, G., J. Caballero, D. E. Mauldin, L. Hood, and J. C. Roach. 2011. Kaviar: an
accessible system for testing SNV novelty. Bioinformatics, 27(22):3216-3217.
Goldstein, Benjamin A., Lingyao Yang, Elias Salfati, and Themistoclies L. Assimes. 2015.
Contemporary Considerations for Constructing a Genetic Risk Score: An Empirical
Approach. Genetic Epidemiology 39(6):439^45.
Homer, Nils, Szabolcs Szelinger, Margot Redman, David Duggan, Waibhav Tembe, Jill
Muehling, John V. Pearson, Dietrich A. Stephan, Stanley F. Nelson, and David W.
Craig. 2008. Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays. PLoS Genetics
4(8):el000167.
Jacobs, Kevin B., Meredith Yeager, Sholom Wacholder, David Craig, Peter Kraft, David J.
Hunter, Justin Paschal, et al. 2009. A new statistic and its power to infer membership in a genome-wide association study using genotype frequencies. Nature Genetics 41(ll):1253-7.
Polderman, Tinea J. C, Beben Benyamin, Christiaan A. de Leeuw, Patrick F. Sullivan, Arjen van Bochoven, Peter M. Visscher, and Danielle Posthuma. 2015. Meta-analysis of the heritability of human traits based on fifty years of twin studies. Nature Genetics, 47(7):702-709.
Rothstein, Mark A. 2008. Putting the Genetic Information Nondiscrimination Act in context.
Genetics in Medicine 10(9):655-656.
Sankararaman, Sriram, Guillaume Obozinski, Michael I Jordan, and Eran Halperin. 2009.
Genomic privacy and limits of individual detection in a pool. Nature Genetics
41(9):965-7.
Schrodi, Steven J., Shubhabrata Mukherjee, Ying Shan, Gerard Tromp, John J. Sninsky, Amy P. Callear, Tonia C. Carter, et al. 2014. Genetic -based prediction of disease traits: prediction is very difficult, especially about the future. Frontiers in Genetics 5: 162.
Visscher, Peter M., and William G. Hill. 2009.The limits of individual identification from sample allele frequencies: theory and statistical analysis. PLoS Genetics,
5(10):el000628.
Wei, Zhi, Wei Wang, Jonathan Bradfield, Jin Li, Christopher Cardinale, Edward Frackelton, Cecilia Kim, et al. 2013. Large sample size, wide variant spectrum, and advanced machine-learning technique boost risk prediction for inflammatory bowel disease. American Journal of Human Genetics, 92(6): 1008-12.
Zerhouni, Elias A., and Elizabeth G. Nabel. 2008. Protecting aggregate genomic data.
Science 322(5898):44.
Wong, Lai-Ping, RickTwee-Hee Ong, Wan- Ting Poh, Xuanyao Liu, Peng Chen, Ruoying Li, KevinKoi-Yau Lam, et al. 2013. Deep Whole-Genome Sequencing of 100 Southeast Asian Malays. The American Journal of Human Genetics 92(l):52-66.
Claims
1. A method implemented on a processor comprising:
obtaining first site frequency spectrum data that indicates a site frequency spectrum for alleles in first genomic data aggregated for an ensemble of unknown individuals; determining a number N that indicates a number of individuals whose individual genomic data are aggregated in the first genomic data;
determining, based on the first site frequency spectrum data and the number N, both a number NQ and a number NY, wherein the number NQ is a number of queries to employ, wherein each query requests whether a particular allele from an individual is present in the first genomic data, and the number NY is a number of yes responses that indicate a particular likelihood that the individual is a member of the ensemble; and
providing output based on at least one of NQ or NY.
2. A method as recited in claim 1, wherein providing output based on at least one of NQ or NY further comprises providing from a system that manages the first genomic data responses to fewer than NQ different queries from a single source of queries within a predetermined time period.
3. A method as recited in claim 1, further comprising:
submitting, to a system that manages the first genomic data, NQ queries whether NQ different alleles present in an individual subject are present in the first genomic data; and
determining whether the individual subject is a member of the ensemble based on
responses to the NQ queries and the value of NY.
4. A method as recited in claim 3, wherein:
the method further comprises selecting at least NQ alleles at random from second
genomic data determined for a sample collected from the individual subject; and submitting the NQ queries further comprises, for each of the at least NQ alleles selected at random from the second genomic data, submitting a query whether the allele is present in the first genomic data.
5. A method as recited in claim 3, wherein determining whether the individual subject is a member of the ensemble further comprises:
accumulating a number of affirmative responses to the at least NQ queries; and determining the particular likelihood that the individual subject is a member of the
ensemble if the number of affirmative responses is equal to or greater than the threshold number NY.
6. A method as recited in claim 3, wherein providing output based on at least one of NQ or NY further comprises presenting on a display device output data that indicates the likelihood that the particular individual is a member of the ensemble.
7 A method as recited in claim 3, wherein obtaining the first site frequency spectrum data further comprises determining the first site frequency spectrum data based on a site frequency spectrum known for a population that is reasonably expected to be similar to the ensemble of unknown individuals.
8. A method as recited in claim 3, wherein determining the number N of individuals whose individual genomic data are aggregated in the first genomic data further comprises approximating the number N as a number reasonably expected to be greater than or equal to an unknown number of individuals in the ensemble.
9. A method as recited in claim 3, wherein the first genomic data is determined for a forensic sample collected at a scene of an incident to be investigated and the individual subject is one of a prospective victim or a prospective bystander or a prospective perpetrator.
10. A non-transitory computer-readable medium carrying one or more sequences of instructions, wherein execution of the one or more sequences of instructions by one or more processors causes an apparatus to:
obtain first site frequency spectrum data that indicates a site frequency spectrum for
alleles in first genomic data aggregated for an ensemble of unknown individuals; determine a number N that indicates a number of individuals whose individual genomic data are aggregated in the first genomic data;
determine, based on the first site frequency spectrum data and the number N, both a
number NQ and a number NY, wherein the number NQ is a number of queries to employ, wherein each query requests whether a particular allele from an individual is present in the first genomic data, and the number NY is a number of yes responses that indicate a particular likelihood that the individual is a member of the ensemble; and
provide output based on at least one of NQ or NY.
11. A non-transitory computer-readable medium as recited in claim 10, wherein providing output based on at least one of NQ or NY further comprises providing from a system that manages the first genomic data responses to fewer than NQ different queries from a single source of queries within a predetermined time period.
12. A non-transitory computer-readable medium as recited in claim 10, wherein execution of the one or more sequences of instructions by the one or more processors further causes the apparatus to:
submit, to a system that manages the first genomic data, NQ queries whether NQ different alleles present in an individual subject are present in the first genomic data; and determine whether the individual subject is a member of the ensemble based on responses to the NQ queries and the value of NY.
13. A non-transitory computer-readable medium as recited in claim 12, wherein obtaining the first site frequency spectrum data further comprises determining the first site frequency spectrum data based on a site frequency spectrum known for a population that is reasonably expected to be similar to the ensemble of unknown individuals.
14. A non-transitory computer-readable medium as recited in claim 12, wherein determining the number N of individuals whose individual genomic data are aggregated in the first genomic data further comprises approximating the number N as a number reasonably expected to be greater than or equal to an unknown number of individuals in the ensemble.
15. A non-transitory computer-readable medium as recited in claim 12, wherein the first genomic data is determined for a forensic sample collected at a scene of an incident to be investigated and the individual subject is one of a prospective victim or a prospective bystander or a prospective perpetrator.
16. A system comprising:
one or more processors;
one or more computer-readable media; and
one or more sequences of instructions stored on the one or more computer readable media, wherein execution of the one or more sequences of instructions by the one or more processors causes an apparatus to:
obtain first site frequency spectrum data that indicates a site frequency spectrum for alleles in first genomic data aggregated for an ensemble of unknown individuals; determine a number N that indicates a number of individuals whose individual genomic data are aggregated in the first genomic data;
determine, based on the first site frequency spectrum data and the number N, both a number NQ and a number NY, wherein the number NQ is a number of queries to employ, wherein each query requests whether a particular allele from an individual is present in the first genomic data, and the number NY is a number of yes responses that indicate a particular likelihood that the individual is a member of the ensemble; and
provide output based on at least one of NQ or NY.
17. A system as recited in claim 16, wherein providing output based on at least one of NQ or NY further comprises providing from a system that manages the first genomic data responses to fewer than NQ different queries from a single source of queries within a predetermined time period.
18. A non-transitory computer-readable medium as recited in claim 16, wherein execution of the one or more sequences of instructions by the one or more processors further causes the apparatus to:
submit, to a system that manages the first genomic data, NQ queries whether NQ different alleles present in an individual subject are present in the first genomic data; and determine whether the individual subject is a member of the ensemble based on responses to the NQ queries and the value of NY.
19. A system as recited in claim 18, wherein determining the first site frequency spectrum data further comprises determining the first site frequency spectrum data based on a site frequency spectrum known for a population that is reasonably expected to be similar to the ensemble of unknown individuals.
20. A system as recited in claim 18, wherein determining the number N of individuals whose individual genomic data are aggregated in the first genomic data further comprises approximating the number N as a number reasonably expected to be greater than or equal to an unknown number of individuals in the ensemble.
21. A system as recited in claim 18, wherein the first genomic data is determined for a forensic sample collected at a scene of an incident to be investigated and the particular individual subject is one of a prospective victim or a prospective bystander or a prospective perpetrator.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP16854308.0A EP3360067A4 (en) | 2015-10-07 | 2016-10-06 | Techniques for determining whether an individual is included in ensemble genomic data |
US15/766,611 US10747899B2 (en) | 2015-10-07 | 2016-10-06 | Techniques for determining whether an individual is included in ensemble genomic data |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201562238386P | 2015-10-07 | 2015-10-07 | |
US62/238,386 | 2015-10-07 | ||
US201562242081P | 2015-10-15 | 2015-10-15 | |
US62/242,081 | 2015-10-15 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017062599A1 true WO2017062599A1 (en) | 2017-04-13 |
Family
ID=58488528
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2016/055717 WO2017062599A1 (en) | 2015-10-07 | 2016-10-06 | Techniques for determining whether an individual is included in ensemble genomic data |
Country Status (3)
Country | Link |
---|---|
US (1) | US10747899B2 (en) |
EP (1) | EP3360067A4 (en) |
WO (1) | WO2017062599A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10538758B2 (en) | 2015-08-19 | 2020-01-21 | Arc Bio, Llc | Capture of nucleic acids using a nucleic acid-guided nuclease-based system |
US10669571B2 (en) | 2014-12-20 | 2020-06-02 | Arc Bio, Llc | Compositions and methods for targeted depletion, enrichment, and partitioning of nucleic acids using CRISPR/Cas system proteins |
CN111433856A (en) * | 2017-11-30 | 2020-07-17 | 皇家飞利浦有限公司 | Proactive resistance to re-identification of genomic data |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030186280A1 (en) * | 2002-03-28 | 2003-10-02 | Affymetrix, Inc. | Methods for detecting genomic regions of biological significance |
WO2007084902A2 (en) | 2006-01-18 | 2007-07-26 | Lucas Martin | Methods of determining relative genetic likelihoods of an individual matching a population |
US20080255768A1 (en) * | 2006-01-18 | 2008-10-16 | Martin Lucas | Methods of determining relative genetic likelihoods of an individual matching a population |
US20130090909A1 (en) * | 2011-06-28 | 2013-04-11 | The Board Of Trustees Of The Leland Stanford Junior University | Method And System For Functional Evolutionary Assessment Of Genetic Variants |
US20150078552A1 (en) * | 2001-02-02 | 2015-03-19 | Cybergenetics, Inc. | Method and System for DNA Mixture Analysis |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030190644A1 (en) * | 1999-10-13 | 2003-10-09 | Andreas Braun | Methods for generating databases and databases for identifying polymorphic genetic markers |
AU2001297684A1 (en) * | 2000-12-04 | 2002-08-19 | Genaissance Pharmaceuticals, Inc. | System and method for the management of genomic data |
US7124033B2 (en) * | 2003-04-30 | 2006-10-17 | Perlegen Sciences, Inc. | Method for identifying matched groups |
US20080228700A1 (en) * | 2007-03-16 | 2008-09-18 | Expanse Networks, Inc. | Attribute Combination Discovery |
EP2264183B1 (en) * | 2009-06-09 | 2016-12-07 | Gendiag.exe, S.L. | Risk markers for cardiovascular disease |
JP5695383B2 (en) * | 2009-10-05 | 2015-04-01 | 花王株式会社 | Hair shape susceptibility gene |
US9447474B2 (en) | 2009-12-03 | 2016-09-20 | Yissum Research Development Company Of The Hebrew University Of Jerusalem, Ltd. | System and method for analyzing DNA mixtures |
-
2016
- 2016-10-06 US US15/766,611 patent/US10747899B2/en active Active
- 2016-10-06 WO PCT/US2016/055717 patent/WO2017062599A1/en active Application Filing
- 2016-10-06 EP EP16854308.0A patent/EP3360067A4/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150078552A1 (en) * | 2001-02-02 | 2015-03-19 | Cybergenetics, Inc. | Method and System for DNA Mixture Analysis |
US20030186280A1 (en) * | 2002-03-28 | 2003-10-02 | Affymetrix, Inc. | Methods for detecting genomic regions of biological significance |
WO2007084902A2 (en) | 2006-01-18 | 2007-07-26 | Lucas Martin | Methods of determining relative genetic likelihoods of an individual matching a population |
US20080255768A1 (en) * | 2006-01-18 | 2008-10-16 | Martin Lucas | Methods of determining relative genetic likelihoods of an individual matching a population |
US20130090909A1 (en) * | 2011-06-28 | 2013-04-11 | The Board Of Trustees Of The Leland Stanford Junior University | Method And System For Functional Evolutionary Assessment Of Genetic Variants |
Non-Patent Citations (1)
Title |
---|
See also references of EP3360067A4 |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10669571B2 (en) | 2014-12-20 | 2020-06-02 | Arc Bio, Llc | Compositions and methods for targeted depletion, enrichment, and partitioning of nucleic acids using CRISPR/Cas system proteins |
US10774365B2 (en) | 2014-12-20 | 2020-09-15 | Arc Bio, Llc | Compositions and methods for targeted depletion, enrichment, and partitioning of nucleic acids using CRISPR/Cas system proteins |
US11692213B2 (en) | 2014-12-20 | 2023-07-04 | Arc Bio, Llc | Compositions and methods for targeted depletion, enrichment, and partitioning of nucleic acids using CRISPR/Cas system proteins |
US10538758B2 (en) | 2015-08-19 | 2020-01-21 | Arc Bio, Llc | Capture of nucleic acids using a nucleic acid-guided nuclease-based system |
CN111433856A (en) * | 2017-11-30 | 2020-07-17 | 皇家飞利浦有限公司 | Proactive resistance to re-identification of genomic data |
Also Published As
Publication number | Publication date |
---|---|
EP3360067A4 (en) | 2019-06-12 |
EP3360067A1 (en) | 2018-08-15 |
US10747899B2 (en) | 2020-08-18 |
US20180285593A1 (en) | 2018-10-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhou et al. | To release or not to release: evaluating information leaks in aggregate human-genome data | |
EP2895980B1 (en) | Privacy-enhancing technologies for medical tests using genomic data | |
US9536047B2 (en) | Privacy-enhancing technologies for medical tests using genomic data | |
Ayday et al. | Protecting and evaluating genomic privacy in medical tests and personalized medicine | |
Wang et al. | Learning your identity and disease from research papers: information leaks in genome wide association study | |
McPeek et al. | Statistical tests for detection of misspecified relationships by use of genome-screen data | |
Nielsen et al. | SNP calling, genotype calling, and sample allele frequency estimation from new-generation sequencing data | |
Humbert et al. | De-anonymizing genomic databases using phenotypic traits | |
Valouev et al. | An algorithm for assembly of ordered restriction maps from single DNA molecules | |
Humbert et al. | Quantifying interdependent risks in genomic privacy | |
Ayoz et al. | Genome reconstruction attacks against genomic data-sharing beacons | |
Gürsoy et al. | Data sanitization to reduce private information leakage from functional genomics | |
Ayday et al. | Privacy-enhancing technologies for medical tests using genomic data | |
Zhu et al. | Privacy-preserving construction of generalized linear mixed model for biomedical computation | |
Oestreich et al. | Privacy considerations for sharing genomics data | |
US10747899B2 (en) | Techniques for determining whether an individual is included in ensemble genomic data | |
Decouchant et al. | Accurate filtering of privacy-sensitive information in raw genomic data | |
Gómez-Romero et al. | Precise detection of de novo single nucleotide variants in human genomes | |
Zhao et al. | Using encrypted genotypes and phenotypes for collaborative genomic analyses to maintain data confidentiality | |
Yang et al. | DNA mixture interpretation using linear regression and neural networks on massively parallel sequencing data of single nucleotide polymorphisms | |
Li et al. | Tests of association based on genomic windows can lead to spurious associations when using genotype panels with heterogeneous SNP densities | |
Cai et al. | Large-scale simultaneous testing of cross-covariance matrices with applications to PheWAS | |
Oprisanu et al. | How Much Does GenoGuard Really" Guard"? An Empirical Analysis of Long-Term Security for Genomic Data | |
Li et al. | Vindel: a simple pipeline for checking indel redundancy | |
WO2020259847A1 (en) | A computer implemented method for privacy preserving storage of raw genome data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16854308 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2016854308 Country of ref document: EP |