Towards practical privacy for genomic computation

被引:93
|
作者
Jha, Somesh [1 ]
Kruger, Louis [1 ]
Shmatikov, Vitaly [2 ]
机构
[1] Univ Wisconsin, Madison, WI 53706 USA
[2] Univ Texas Austin, Austin, TX 78712 USA
关键词
D O I
10.1109/SP.2008.34
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Many basic tasks in computational biology involve operations on individual DNA and protein sequences. These sequences, even when anonymized, are vulnerable to re-identification attacks and may reveal highly sensitive information about individuals. We present a relatively efficient, privacy-preserving implementation of fundamental genomic computations such as calculating the edit distance and Smith-Waterman similarity scores between two sequences. Our techniques are cryptographically secure and significantly more practical than previous solutions. We evaluate our prototype implementation on sequences from the Pfam database of protein families, and demonstrate that its performance is adequate for solving real-world sequence-alignment and related problems in a privacy-preserving manner. Furthermore, our techniques have applications beyond computational biology. They can be used to obtain efficient, privacy-preserving implementations for many dynamic programming algorithms over distributed datasets.
引用
收藏
页码:216 / +
页数:5
相关论文
共 50 条
  • [1] Towards practical privacy-preserving protocols
    Demmler, Daniel
    IT-INFORMATION TECHNOLOGY, 2022, 64 (1-2): : 49 - 53
  • [2] Towards Practical Differential Privacy for SQL Queries
    Johnson, Noah
    Near, Joseph P.
    Song, Dawn
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2018, 11 (05): : 526 - 539
  • [3] Privacy-Preserving Genomic Computation Through Program Specialization
    Wang, Rui
    Wang, XiaoFeng
    Li, Zhou
    Tang, Haixu
    Reiter, Michael K.
    Dong, Zheng
    CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 338 - 347
  • [4] Towards Practical RAM Based Secure Computation
    Buescher, Niklas
    Weber, Alina
    Katzenbeisser, Stefan
    COMPUTER SECURITY (ESORICS 2018), PT II, 2018, 11099 : 416 - 437
  • [5] On the theory of quantum and towards practical computation: A review
    Kudelić, Robert
    Journal of Computational Science, 2024, 83
  • [6] Towards Practical Topology-Hiding Computation
    Li, Shuaishuai
    ADVANCES IN CRYPTOLOGY- ASIACRYPT 2022, PT I, 2022, 13791 : 588 - 617
  • [7] Blockchain privacy and regulatory compliance: Towards a practical equilibrium
    Buterin, Vitalik
    Illum, Jacob
    Nadler, Matthias
    Schar, Fabian
    Soleimani, Ameen
    BLOCKCHAIN-RESEARCH AND APPLICATIONS, 2024, 5 (01):
  • [8] Towards practical feasibility of core computation in data exchange
    Pichler, Reinhard
    Savenkov, Vadim
    THEORETICAL COMPUTER SCIENCE, 2010, 411 (7-9) : 935 - 957
  • [9] Towards Practical Feasibility of Core Computation in Data Exchange
    Pichler, Reinhard
    Savenkov, Vadim
    LOGIC FOR PROGRAMMING, ARTIFICIAL INTELLIGENCE, AND REASONING, PROCEEDINGS, 2008, 5330 : 62 - 78
  • [10] Towards Preserving Privacy of Outsourced Genomic Data Over the Cloud
    Muntahal, Sidra tul
    Khan, Abid
    Manzoor, Umar
    Samar, Kinza
    Ahmed, Mansoor
    Tahir, Mouzna
    Anjum, Adeel
    Rehman, Saif ur
    Alam, Masoom
    Javaid, Nadeem
    Balubaid, Mohammed A.
    JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2017, 7 (06) : 1475 - 1482