Balancing Security and Privacy in Genomic Range Queries

被引:3
|
作者
Hwang, Seoyeon [1 ]
Ozturk, Ercan [1 ]
Tsudik, Gene [1 ]
机构
[1] Univ Calif Irvine, Irvine, CA 92697 USA
关键词
Cryptographic protocols; genomic security; genomic privacy; range query; range completeness; private substring matching; PUBLIC-KEY CRYPTOSYSTEM; HOMOMORPHIC COMPUTATION; PROTOCOLS;
D O I
10.1145/3575796
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Exciting recent advances in genome sequencing, coupled with greatly reduced storage and computation costs, make genomic testing increasingly accessible to individuals. Already today, one's digitized DNA can be easily obtained from a sequencing lab and later used to conduct numerous tests by engaging with a testing facility. Due to the inherent sensitivity of genetic material and the often-proprietary nature of genomic tests, privacy is a natural and crucial issue. While genomic privacy received a great deal of attention within and outside the research community, genomic security has not been sufficiently studied. This is surprising since the usage of fake or altered genomes can have grave consequences, such as erroneous drug prescriptions and genetic test outcomes. Unfortunately, in the genomic domain, privacy and security (as often happens) are at odds with each other. In this article, we attempt to reconcile security with privacy in genomic testing by designing a novel technique for a secure and private genomic range query protocol between a genomic testing facility and an individual user. The proposed technique ensures authenticity and completeness of user-supplied genomic material while maintaining its privacy by releasing only the minimum thereof. To confirm its broad usability, we show how to apply the proposed technique to a previously proposed genomic private substring matching protocol. Experiments show that the proposed technique offers good performance and is quite practical. Furthermore, we generalize the genomic range query problem to sparse integer sets and discuss potential use cases.
引用
收藏
页数:28
相关论文
共 50 条
  • [1] BALANCING PRIVACY AND SECURITY
    Bradbury, Steven G.
    [J]. HARVARD JOURNAL OF LAW AND PUBLIC POLICY, 2015, 38 (01): : 5 - 15
  • [2] Privacy-Preserving Range Queries from Keyword Queries
    Di Crescenzo, Giovanni
    Ghosh, Abhrajit
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXIX, 2015, 9149 : 35 - 50
  • [3] Privacy and Security in the Genomic Era
    Ayday, Erman
    Hubaux, Jean-Pierre
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1863 - 1865
  • [4] Balancing XAI with Privacy and Security Considerations
    Spartalis, Christoforos N.
    Semertzidis, Theodoros
    Daras, Petros
    [J]. COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, CPS4CIP, PT II, 2024, 14399 : 111 - 124
  • [5] Balancing Cyber-Security and Privacy
    Patakyova, Maria T.
    [J]. BRATISLAVA LAW REVIEW, 2020, 4 (01): : 181 - 183
  • [6] Balancing Security and Privacy in the Digital Workplace
    Miller, Christine
    Wells, F. Stuart
    [J]. JOURNAL OF CHANGE MANAGEMENT, 2007, 7 (3-4) : 315 - 328
  • [7] Answering Count Queries for Genomic Data With Perfect Privacy
    Jiang, Bo
    Seif, Mohamed
    Tandon, Ravi
    Li, Ming
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3862 - 3875
  • [8] BALANCING PRIVACY AND SECURITY IN THE AUSTRALIAN PASSPORT SYSTEM
    Clark, Steven R.
    [J]. DEAKIN LAW REVIEW, 2011, 16 (02): : 325 - 360
  • [9] Answering Range Queries Under Local Differential Privacy
    Cormode, Graham
    Kulkarni, Tejas
    Srivastava, Divesh
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2019, 12 (10): : 1126 - 1138
  • [10] Answering Range Queries Under Local Differential Privacy
    Kulkarni, Tejas
    [J]. SIGMOD '19: PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2019, : 1832 - 1834