Skip to main content
. Author manuscript; available in PMC: 2021 Sep 2.
Published in final edited form as: Proc ACM Workshop Priv Electron Soc. 2020 Nov 9;2020:163–179. doi: 10.1145/3411497.3420214

Table 6:

Comparison of the proposed method and LDP-based data sharing mechanism in terms of privacy when the kinship relationships are also considered. Using the shared SNPs of the donor and Mendel’s law, we compute the attacker’s estimation error for all sensitive SNPs of the donor’s parents. t is the order of the Markov chain. Only non-sensitive SNPs are shared in LDP1. Kinship attack is performed for LDP1.

ϵ

0.1 0.2 0.5 1
Proposed method, t = 1 0.5620 0.5629 0.5605 0.5534
Proposed method, t = 4 0.6554 0.6430 0.6296 0.6228
LDP1 0.5805 0.5662 0.5543 0.5468
LDP1 after attack 0.5040 0.5016 0.4944 0.4934