This is a preview of subscription content, access via your institution
Relevant articles
Open Access articles citing this article.
-
Trellis for efficient data and task management in the VA Million Veteran Program
Scientific Reports Open Access 01 December 2021
Access options
Subscribe to this journal
Receive 12 print issues and online access
$209.00 per year
only $17.42 per issue
Buy this article
- Purchase on Springer Link
- Instant access to full article PDF
Prices may be subject to local taxes which are calculated during checkout
Change history
11 August 2016
In the version of this article initially published, the competing financial interests line should have been positive in the HTML as it was in the PDF (“The authors declare competing financial interests”). The statement “M.S. is a co-founder of Personalis and SensOmics and a member of the scientific advisory boards of Personalis, SensOmics and Genapsys” should also have appeared in the HTML. The errors have been corrected in the HTML and PDF versions of the article.
References
Orcut, M. Hackers are homing in on hospitals. MIT Technol. Rev. http://www.technologyreview.com/news/530411/hackers-are-homing-in-on-hospitals/ (2 September 2014).
Anonymous. Data Breach Industry Forecast. 2015 Second Annual Data Breach Industry Forecast https://www.experian.com/assets/data-breach/white-papers/2015-industry-forecast-experian.pdf (Experian, Dublin, 2015).
Wilde Mathews, A. Hacked database included 78.8 million people. Wall Street Journal http://www.wsj.com/articles/anthem-hacked-database-included-78-8-million-people-1424807364 (24 February 2015).
Guidance Regarding Methods for De-identification of Protected Health Information in Accordance with the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule http://www.hhs.gov/hipaa/for-professionals/privacy/special-topics/de-identification/index.html (US Department of Health and Human Services, 2012).
Department of Health and Human Services, Office of the Assistant Secretary for Health, Office for Human Research Protections. Fed. Reg. 80, 53933–54061 (2015).
Naveed, M. et al. Privacy in the genomics era. ACM Comput. Surveys 48 (1), 6 (2015).
Anonymous. Participants in Personal Genome Project identified by privacy experts. MIT Technol. Rev. http://www.technologyreview.com/view/514486/participants-in-personal-genome-project-identified-by-privacy-experts/ (1 May 2013).
Check Hayden, E. Nature 519, 400–401 (2015).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Competing interests
M.S. is a co-founder of Personalis and SensOmics and a member of the scientific advisory boards of Personalis, SensOmics and Genapsys.
Additional information
Editor's note: This article has been peer reviewed.
Rights and permissions
About this article
Cite this article
Datta, S., Bettinger, K. & Snyder, M. Secure cloud computing for genomic data. Nat Biotechnol 34, 588–591 (2016). https://doi.org/10.1038/nbt.3496
Published:
Issue Date:
DOI: https://doi.org/10.1038/nbt.3496
This article is cited by
-
Design of an Intelligent Acquisition System for Athletes’ Physiological Signal Data Based on Internet of Things Cloud Computing
Mobile Networks and Applications (2022)
-
Trellis for efficient data and task management in the VA Million Veteran Program
Scientific Reports (2021)