Efficient privacy-preserving whole-genome variant queries

被引:4
|
作者
Akguen, Mete [1 ,2 ,3 ,4 ]
Pfeifer, Nico [2 ,5 ,6 ]
Kohlbacher, Oliver [2 ,3 ,7 ]
机构
[1] Univ Tubingen, Dept Comp Sci, Med Data Privacy & Privacy Preserving ML Healthca, Tubingen, Germany
[2] Univ Tubingen, Inst Bioinformat & Med Informat, Tubingen, Germany
[3] Univ Hosp Tubingen, Translat Bioinformat, Tubingen, Germany
[4] Izmir Inst Technol, Dept Comp Engn, Izmir, Turkey
[5] Univ Tubingen, Dept Comp Sci, Methods Med Informat, Tubingen, Germany
[6] Max Planck Inst Informat, Stat Learning Computat Biol, Saarbrucken, Germany
[7] Univ Tubingen, Appl Bioinformat, Dept Comp Sci, Tubingen, Germany
关键词
D O I
10.1093/bioinformatics/btac070
中图分类号
Q5 [生物化学];
学科分类号
071010 ; 081704 ;
摘要
Motivation: Diagnosis and treatment decisions on genomic data have become widespread as the cost of genome sequencing decreases gradually. In this context, disease-gene association studies are of great importance. However, genomic data are very sensitive when compared to other data types and contains information about individuals and their relatives. Many studies have shown that this information can be obtained from the query-response pairs on genomic databases. In this work, we propose a method that uses secure multi-party computation to query genomic databases in a privacy-protected manner. The proposed solution privately outsources genomic data from arbitrarily many sources to the two non-colluding proxies and allows genomic databases to be safely stored in semi-honest cloud environments. It provides data privacy, query privacy and output privacy by using XOR-based sharing and unlike previous solutions, it allows queries to run efficiently on hundreds of thousands of genomic data. Results: We measure the performance of our solution with parameters similar to real-world applications. It is possible to query a genomic database with 3 000 000 variants with five genomic query predicates under 400 ms. Querying 1 048 576 genomes, each containing 1 000 000 variants, for the presence of five different query variants can be achieved approximately in 6 min with a small amount of dedicated hardware and connectivity. These execution times are in the right range to enable real-world applications in medical research and healthcare. Unlike previous studies, it is possible to query multiple databases with response times fast enough for practical application. To the best of our knowledge, this is the first solution that provides this performance for querying large-scale genomic data.
引用
收藏
页码:2202 / 2210
页数:9
相关论文
共 50 条
  • [21] Efficient and Privacy-Preserving Multi-Party Skyline Queries Over Encrypted Data
    Ding, Xiaofeng
    Wang, Zuan
    Zhou, Pan
    Choo, Kim-Kwang Raymond
    Jin, Hai
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 4589 - 4604
  • [22] Towards Efficient and Privacy-Preserving Interval Skyline Queries Over Time Series Data
    Zhang, Songnian
    Ray, Suprio
    Lu, Rongxing
    Zheng, Yandong
    Guan, Yunguo
    Shao, Jun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (02) : 1348 - 1363
  • [23] A Privacy-Preserving Encoding for Efficient Comparison Queries and Access Control from Predicate Encryption
    Chen, Shao-Heng
    Tseng, Fu-Kuo
    Chen, Rong-Jaye
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 788 - 797
  • [24] An Efficient Privacy-Preserving Comparison Protocol
    Saha, Tushar Kanti
    Koshiba, Takeshi
    ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2017, 2018, 7 : 553 - 565
  • [25] Efficient Privacy-Preserving Link Discovery
    He, Xiaoyun
    Vaidya, Jaideep
    Shafiq, Basit
    Adam, Nabil
    Terzi, Evimaria
    Grandison, Tyrone
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, 5476 : 16 - +
  • [26] Efficient privacy-preserving implicit authentication
    Blanco-Justicia, Alberto
    Domingo-Ferrer, Josep
    COMPUTER COMMUNICATIONS, 2018, 125 : 13 - 23
  • [27] Privacy Protection in Whole-Genome Sequencing
    不详
    CANCER DISCOVERY, 2012, 2 (12) : 1070 - 1070
  • [28] Efficient Privacy-Preserving Face Recognition
    Sadeghi, Ahmad-Reza
    Schneider, Thomas
    Wehrenberg, Immo
    INFORMATION SECURITY AND CRYPTOLOGY - ISISC 2009, 2010, 5984 : 229 - 244
  • [29] An efficient method for privacy preserving location queries
    Yubao Liu
    Xiuwei Chen
    Zhan Li
    Zhijie Li
    Raymond Chi-Wing Wong
    Frontiers of Computer Science, 2012, 6 : 409 - 420
  • [30] An efficient method for privacy preserving location queries
    Liu, Yubao
    Chen, Xiuwei
    Li, Zhan
    Li, Zhijie
    Wong, Raymond Chi-Wing
    FRONTIERS OF COMPUTER SCIENCE, 2012, 6 (04) : 409 - 420