Reconstructing Genotypes in Private Genomic Databases from Genetic Risk Scores

J Comput Biol. 2021 May;28(5):435-451. doi: 10.1089/cmb.2020.0445. Epub 2021 Jan 5.

Abstract

Some organizations such as 23andMe and the UK Biobank have large genomic databases that they re-use for multiple different genome-wide association studies. Even research studies that compile smaller genomic databases often utilize these databases to investigate many related traits. It is common for the study to report a genetic risk score (GRS) model for each trait within the publication. Here, we show that under some circumstances, these GRS models can be used to recover the genetic variants of individuals in these genomic databases-a reconstruction attack. In particular, if two GRS models are trained by using a largely overlapping set of participants, it is often possible to determine the genotype for each of the individuals who were used to train one GRS model, but not the other. We demonstrate this theoretically and experimentally by analyzing the Cornell Dog Genome database. The accuracy of our reconstruction attack depends on how accurately we can estimate the rate of co-occurrence of pairs of single nucleotide polymorphisms within the private database, so if this aggregate information is ever released, it would drastically reduce the security of a private genomic database. Caution should be applied when using the same database for multiple analysis, especially when a small number of individuals are included or excluded from one part of the study.

Keywords: GWAS; genetic risk scores; genomic privacy; long-term privacy; reconstruction attack.

Publication types

  • Research Support, Non-U.S. Gov't

MeSH terms

  • Animals
  • Biological Specimen Banks
  • Computational Biology / methods*
  • Computer Security
  • Databases, Genetic*
  • Dogs
  • Genetic Variation*
  • Genome-Wide Association Study / veterinary*
  • Genotyping Techniques
  • Humans
  • Models, Genetic
  • Risk Factors
  • United Kingdom