Private genome analysis through homomorphic encryption

被引:69
|
作者
Kim, Miran [1 ]
Lauter, Kristin [2 ]
机构
[1] Dept Math Sci, Seoul, South Korea
[2] Microsoft Res, Cryptog Res Grp, Redmond, WA USA
基金
新加坡国家研究基金会;
关键词
Approximate Edit distance; Genome-wide association studies; Hamming distance; Homomorphic encryption;
D O I
10.1186/1472-6947-15-S5-S3
中图分类号
R-058 [];
学科分类号
摘要
Background: The rapid development of genome sequencing technology allows researchers to access large genome datasets. However, outsourcing the data processing o the cloud poses high risks for personal privacy. The aim of this paper is to give a practical solution for this problem using homomorphic encryption. In our approach, all the computations can be performed in an untrusted cloud without requiring the decryption key or any interaction with the data owner, which preserves the privacy of genome data. Methods: We present evaluation algorithms for secure computation of the minor allele frequencies and chi(2) statistic in a genome-wide association studies setting. We also describe how to privately compute the Hamming distance and approximate Edit distance between encrypted DNA sequences. Finally, we compare performance details of using two practical homomorphic encryption schemes -the BGV scheme by Gentry, Halevi and Smart and the YASHE scheme by Bos, Lauter, Loftus and Naehrig. Results: The approach with the YASHE scheme analyzes data from 400 people within about 2 seconds and picks a variant associated with disease from 311 spots. For another task, using the BGV scheme, it took about 65 seconds to securely compute the approximate Edit distance for DNA sequences of size 5K and figure out the differences between them. Conclusions: The performance numbers for BGV are better than YASHE when homomorphically evaluating deep circuits (like the Hamming distance algorithm or approximate Edit distance algorithm). On the other hand, it is more efficient to use the YASHE scheme for a low-degree computation, such as minor allele frequencies or chi(2) test statistic in a case-control study.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Secure and private control using semi-homomorphic encryption
    Farokhi, Farhad
    Shames, Iman
    Batterham, Nathan
    [J]. CONTROL ENGINEERING PRACTICE, 2017, 67 : 13 - 20
  • [22] Practical private-key fully homomorphic encryption in rings
    Gribov, Alexey
    Kahrobaei, Delaram
    Shpilrain, Vladimir
    [J]. GROUPS COMPLEXITY CRYPTOLOGY, 2018, 10 (01) : 17 - 27
  • [23] Performance Analysis of HElib on a Privacy Preserving Search for Genome Information with Fully Homomorphic Encryption
    Tsuji, Arisa
    Oguchi, Masato
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2022), 2022, : 129 - 136
  • [24] Perfomance Analysis of A Bidirectional Private Policy Matching Protocol Based on Additively Homomorphic Encryption Systems
    Yamaki, Hirofumi
    Mori, Fumihiro
    Aoyama, Momoko
    [J]. 2013 INTERNATIONAL CONFERENCE ON SIGNAL-IMAGE TECHNOLOGY & INTERNET-BASED SYSTEMS (SITIS), 2013, : 674 - 681
  • [25] Accelerating Fully Homomorphic Encryption Through Architecture-Centric Analysis and Optimization
    Jung, Wonkyung
    Lee, Eojin
    Kim, Sangpyo
    Kim, Jongmin
    Kim, Namhoon
    Lee, Keewoo
    Min, Chohong
    Cheon, Jung Hee
    Ahn, Jung Ho
    [J]. IEEE ACCESS, 2021, 9 : 98772 - 98789
  • [26] Accelerating Fully Homomorphic Encryption Through Microarchitecture-Aware Analysis and Optimization
    Jung, Wonkyung
    Lee, Eojin
    Kim, Sangpyo
    Kim, Namhoon
    Lee, Keewoo
    Min, Chohong
    Cheon, Jung Hee
    Ahn, Jung Ho
    [J]. 2021 IEEE INTERNATIONAL SYMPOSIUM ON PERFORMANCE ANALYSIS OF SYSTEMS AND SOFTWARE (ISPASS 2021), 2021, : 237 - 239
  • [27] Homomorphic Encryption for Privacy-Preserving Genome Sequences Search
    Oguchi, Masato
    Rohloff, Kurt
    Yamada, Yuki
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP 2019), 2019, : 7 - 12
  • [28] Homomorphic Encryption
    Ogburn, Monique
    Turner, Claude
    Dahal, Pushkar
    [J]. COMPLEX ADAPTIVE SYSTEMS: EMERGING TECHNOLOGIES FOR EVOLVING SYSTEMS: SOCIO-TECHNICAL, CYBER AND BIG DATA, 2013, 20 : 502 - 509
  • [29] Fast Unbalanced Private Set Union from Fully Homomorphic Encryption
    Tu, Binbin
    Chen, Yu
    Liu, Qi
    Zhang, Cong
    [J]. PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 2959 - 2973
  • [30] Quantum private query based on quantum homomorphic encryption with qubit rotation
    Chen, Geng
    Wang, Yuqi
    Jian, Liya
    Zhou, Yi
    Liu, Shiming
    [J]. QUANTUM INFORMATION PROCESSING, 2023, 22 (06)