A novel, privacy-preserving cryptographic approach for sharing sequencing data

被引:7
|
作者
Cassa, Christopher A. [1 ,2 ,3 ]
Miller, Rachel A. [3 ]
Mandl, Kenneth D. [4 ,5 ,6 ]
机构
[1] Brigham & Womens Hosp, Div Genet, Boston, MA 02215 USA
[2] Harvard Univ, Sch Med, Div Genet, Boston, MA USA
[3] MIT, CSAIL, Cambridge, MA 02139 USA
[4] Childrens Hosp, Harvard MIT Hlth Sci & Technol, Childrens Hosp Informat Program, Boston, MA 02115 USA
[5] Harvard Univ, Sch Med, Div Pediat, Boston, MA USA
[6] Childrens Hosp, Manton Ctr Orphan Dis, Boston, MA 02115 USA
关键词
MANAGED CARE ORGANIZATION; PERSONALIZED MEDICINE; GENETIC INFORMATION; GENOMIC RESEARCH; HEART-DISEASE; FRAMINGHAM; RISK; ASSOCIATION; WOMEN; DNA;
D O I
10.1136/amiajnl-2012-001366
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Objective DNA samples are often processed and sequenced in facilities external to the point of collection. These samples are routinely labeled with patient identifiers or pseudonyms, allowing for potential linkage to identity and private clinical information if intercepted during transmission. We present a cryptographic scheme to securely transmit externally generated sequence data which does not require any patient identifiers, public key infrastructure, or the transmission of passwords. Materials and methods This novel encryption scheme cryptographically protects participant sequence data using a shared secret key that is derived from a unique subset of an individual's genetic sequence. This scheme requires access to a subset of an individual's genetic sequence to acquire full access to the transmitted sequence data, which helps to prevent sample mismatch. Results We validate that the proposed encryption scheme is robust to sequencing errors, population uniqueness, and sibling disambiguation, and provides sufficient cryptographic key space. Discussion Access to a set of an individual's genotypes and a mutually agreed cryptographic seed is needed to unlock the full sequence, which provides additional sample authentication and authorization security. We present modest fixed and marginal costs to implement this transmission architecture. Conclusions It is possible for genomics researchers who sequence participant samples externally to protect the transmission of sequence data using unique features of an individual's genetic sequence.
引用
收藏
页码:69 / 76
页数:8
相关论文
共 50 条
  • [21] Privacy-preserving data sharing via probabilistic modeling
    Jalko, Joonas
    Lagerspetz, Eemil
    Haukka, Jari
    Tarkoma, Sasu
    Honkela, Antti
    Kaski, Samuel
    [J]. PATTERNS, 2021, 2 (07):
  • [22] Towards Privacy-preserving Data Sharing in Smart Environments
    Hernandez-Ramos, Jose L.
    Bernal Bernabe, Jorge
    Skarmeta, Antonio F.
    [J]. 2014 EIGHTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2014, : 334 - 339
  • [23] Scalable and Privacy-Preserving Data Sharing Based on Blockchain
    Bao-Kun Zheng
    Lie-Huang Zhu
    Meng Shen
    Feng Gao
    Chuan Zhang
    Yan-Dong Li
    Jing Yang
    [J]. Journal of Computer Science and Technology, 2018, 33 : 557 - 567
  • [24] Methods of privacy-preserving genomic sequencing data alignments
    Lu, Dandan
    Zhang, Yue
    Zhang, Ling
    Wang, Haiyan
    Weng, Wanlin
    Li, Li
    Cai, Hongmin
    [J]. BRIEFINGS IN BIOINFORMATICS, 2021, 22 (06)
  • [25] Accuracy in Privacy-Preserving Data Mining Using the Paradigm of Cryptographic Elections
    Magkos, Emmanouil
    Maragoudakis, Manolis
    Chrissikopoulos, Vassilis
    Gridzalis, Stefanos
    [J]. PRIVACY IN STATISTICAL DATABASES, PROCEEDINGS, 2008, 5262 : 284 - +
  • [26] Privacy-preserving Cross-domain Routing Optimization -A Cryptographic Approach
    Chen, Qingjun
    Qian, Chen
    Zhong, Sheng
    [J]. 2015 IEEE 23RD INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2015, : 356 - 365
  • [27] CRYPTOGRAPHIC ALGORITHMS FOR PRIVACY-PRESERVING ONLINE APPLICATIONS
    Li, Ruinian
    Xiao, Yinhao
    Zhang, Cheng
    Song, Tianyi
    Hu, Chunqiang
    [J]. MATHEMATICAL FOUNDATIONS OF COMPUTING, 2018, 1 (04): : 311 - 330
  • [28] Specifying and implementing privacy-preserving cryptographic protocols
    Theodoros Balopoulos
    Stefanos Gritzalis
    Sokratis K. Katsikas
    [J]. International Journal of Information Security, 2008, 7 : 395 - 420
  • [29] Specifying and implementing privacy-preserving cryptographic protocols
    Balopoulos, Theodoros
    Gritzalis, Stefanos
    Katsikas, Sokratis K.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (06) : 395 - 420
  • [30] Cryptographic Approaches for Privacy-Preserving Machine Learning
    Jiang Han
    Liu Yiran
    Song Xiangfu
    Wang Hao
    Zheng Zhihua
    Xu Qiuliang
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (05) : 1068 - 1078