Towards practical privacy for genomic computation

被引:93
|
作者
Jha, Somesh [1 ]
Kruger, Louis [1 ]
Shmatikov, Vitaly [2 ]
机构
[1] Univ Wisconsin, Madison, WI 53706 USA
[2] Univ Texas Austin, Austin, TX 78712 USA
关键词
D O I
10.1109/SP.2008.34
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Many basic tasks in computational biology involve operations on individual DNA and protein sequences. These sequences, even when anonymized, are vulnerable to re-identification attacks and may reveal highly sensitive information about individuals. We present a relatively efficient, privacy-preserving implementation of fundamental genomic computations such as calculating the edit distance and Smith-Waterman similarity scores between two sequences. Our techniques are cryptographically secure and significantly more practical than previous solutions. We evaluate our prototype implementation on sequences from the Pfam database of protein families, and demonstrate that its performance is adequate for solving real-world sequence-alignment and related problems in a privacy-preserving manner. Furthermore, our techniques have applications beyond computational biology. They can be used to obtain efficient, privacy-preserving implementations for many dynamic programming algorithms over distributed datasets.
引用
收藏
页码:216 / +
页数:5
相关论文
共 50 条
  • [41] Towards Efficient Privacy-Preserving Similar Sequence Queries on Outsourced Genomic Databases
    Schneider, Thomas
    Tkachenko, Oleksandr
    PROCEEDINGS OF THE 2018 WORKSHOP ON PRIVACY IN THE ELECTRONIC SOCIETY (WPES'18), 2018, : 71 - 75
  • [42] Practical Everlasting Privacy
    Arapinis, Myrto
    Cortier, Veronique
    Kremer, Steve
    Ryan, Mark
    PRINCIPLES OF SECURITY AND TRUST, POST 2013, 2013, 7796 : 21 - 40
  • [43] Privacy-preserving SVM on Outsourced Genomic Data via Secure Multi-party Computation
    Chen, Huajie
    Uenal, Ali Burak
    Akguen, Mete
    Pfeifer, Nico
    PROCEEDINGS OF THE SIXTH INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS (IWSPA'20), 2020, : 61 - 69
  • [44] Secure computation for data privacy
    Singh, Meena
    Saxena, Ashutosh
    2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 58 - 62
  • [45] Differential Privacy in Quantum Computation
    Zhou, Li
    Ying, Mingsheng
    2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 249 - 262
  • [46] Function Computation with Privacy Constraints
    Tu, Wenwen
    Lai, Lifeng
    2017 FIFTY-FIRST ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS, AND COMPUTERS, 2017, : 1672 - 1676
  • [47] Towards Practical Secure Privacy-Preserving Machine (Deep) Learning with Distributed Data
    Kumar, Mohit
    Moser, Bernhard
    Fischer, Lukas
    Freudenthaler, Bernhard
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2022 WORKSHOPS, 2022, 1633 : 55 - 66
  • [48] Towards Secure Computation of Similar Patient Query on Genomic Data Under Multiple Keys
    Zhao, Chuan
    Zhao, Shengnan
    Zhang, Bo
    Jing, Shan
    Chen, Zhenxiang
    Zhao, Minghao
    CYBERSPACE SAFETY AND SECURITY, PT II, 2019, 11983 : 275 - 284
  • [49] A Practical Privacy-Preserving Cooperative Computation Protocol without Oblivious Transfer for Linear Systems of Equations
    Kang, Ju-Sung
    Hong, Dowon
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2007, 3 (01): : 21 - 25
  • [50] Privacy and protection in the genomic era
    不详
    NATURE MEDICINE, 2013, 19 (09) : 1073 - 1073