skip to main content
10.1145/3267323.3268956acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
short-paper

Towards Efficient Privacy-Preserving Similar Sequence Queries on Outsourced Genomic Databases

Published:15 January 2018Publication History

ABSTRACT

Nowadays, genomic sequencing has become affordable for many people. Since more people let analyze their genome, more genome data gets collected. The good side of this is that analyses on this data become possible. However, this raises privacy concerns because the genomic data uniquely identify their owner, contain sensitive information about his/her risk for getting diseases, and even sensitive information about his/her family members. In this paper, we introduce a highly efficient privacy-preserving protocol for Similar Sequence Queries (SSQs), which can be used for finding genetically similar individuals in an outsourced genomic database aggregated from data of multiple institutions. Our SSQ protocol is based on the edit distance approximation by Asharov et al. (PETS'18), which we extend to the outsourcing scenario. We also improve their protocol by using more efficient building blocks and achieve a 5-6× run-time improvement compared to their work in the two-party scenario. Recently, Cheng et al. (ASIACCS'18) introduced protocols for outsourced SSQs that rely on homomorphic encryption. Our approach outperforms theirs by more than factor 20000× in terms of run-time in the outsourcing scenario.

References

  1. Md Momin Al Aziz, Dima Alhadidi, and Noman Mohammed. 2017. Secure approximation of edit distance on genomic data. In BMC medical genomics .Google ScholarGoogle Scholar
  2. Gilad Asharov, Daniel Demmler, Michael Schapira, Thomas Schneider, Gil Segev, Scott Shenker, and Michael Zohner. 2017. Privacy-preserving interdomain routing at Internet scale. In Privacy Enhancing Technologies Symposium (PETS) .Google ScholarGoogle ScholarCross RefCross Ref
  3. Gilad Asharov, Shai Halevi, Yehuda Lindell, and Tal Rabin. 2018. Privacy-preserving search of similar patients in genomic data. In Privacy Enhancing Technologies Symposium (PETS) .Google ScholarGoogle ScholarCross RefCross Ref
  4. Gilad Asharov, Yehuda Lindell, Thomas Schneider, and Michael Zohner. 2013. More efficient oblivious transfer and extensions for faster secure computation. In ACM SIGSAG Conference on Computer and Communications Security (CCS) . Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Mikhail J. Atallah, Florian Kerschbaum, and Wenliang Du. 2003. Secure and private sequence comparisons. In ACM Workshop on Privacy in the Electronic Society (WPES) . Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Mikhail J. Atallah and Jiangtao Li. 2005. Secure outsourcing of sequence comparisons. In International Journal of Information Security . Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Erman Ayday. 2016. Cryptographic solutions for genomic privacy. In Financial Cryptography and Data Security (FC) .Google ScholarGoogle Scholar
  8. Ke Cheng, Yantian Hou, and Liangmin Wang. 2018. Secure similar sequence query on outsourced genomic data. In ACM Asia Conference on Computer and Communications Security (ASIACCS) . Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Marco Chiesa, Daniel Demmler, Marco Canini, Michael Schapira, and Thomas Schneider. 2017. SIXPACK: securing internet exchange points against curious onlookers. In International Conference on emerging Networking EXperiments and Technologies (CoNEXT) . Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Daniel Demmler, Kay Hamacher, Thomas Schneider, and Sebastian Stammler. 2017. Privacy-preserving whole-genome variant queries. In Cryptology and Network Security (CANS) .Google ScholarGoogle Scholar
  11. Daniel Demmler, Thomas Schneider, and Michael Zohner. 2015. ABY - a framework for efficient mixed-protocol secure two-party computation. In Network and Distributed System Security Symposium (NDSS) .Google ScholarGoogle ScholarCross RefCross Ref
  12. European Bioinformatics Institute. 2017. Genome Reference Consortium Human Build 38, Ensembl release 91. http://dec2017.archive.ensembl.org/Homo_sapiens/Info/Annotation . (2017). Accessed on 2018-03--27.Google ScholarGoogle Scholar
  13. Roger Allan Ford and W. Nicholson Price II. 2016. Privacy and accountability in black-box medicine. Michigan Telecommunications and Technology Law Review (2016).Google ScholarGoogle Scholar
  14. Oded Goldreich, Silvio Micali, and Avi Wigderson. 1987. How to play any mental game. In ACM Symposium on Theory of Computing (STOC) . Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Mathias Humbert, Erman Ayday, Jean-Pierre Hubaux, and Amalio Telenti. 2015. On non-cooperative genomic privacy. In Financial Cryptography and Data Security (FC) .Google ScholarGoogle Scholar
  16. Somesh Jha, Louis Kruger, and Vitaly Shmatikov. 2008. Towards practical privacy for genomic computation. In IEEE Symposium on Security and Privacy (S&P) . Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Seny Kamara and Marina Raykova. 2011. Secure outsourced computation in a multi-tenant cloud. In IBM Workshop on Cryptography and Security in Clouds .Google ScholarGoogle Scholar
  18. Vladimir I. Levenshtein. 1966. Binary codes capable of correcting deletions, insertions, and reversals. In Soviet physics doklady .Google ScholarGoogle Scholar
  19. Md Safiur Rahman Mahdi, Mohammad Zahidul Hasan, and Noman Mohammed. 2017. Secure sequence similarity search on encrypted genomic data. In IEEE/ACM Conference on Connected Health: Applications, Systems and Engineering Technologies . Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Benny Pinkas, Thomas Schneider, Gil Segev, and Michael Zohner. 2015. Phasing: private set intersection using permutation-based hashing. In USENIX Security Symposium . Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Oleksandr Tkachenko, Christian Weinert, Thomas Schneider, and Kay Hamacher. 2018. Large-scale privacy-preserving statistical computations for distributed genome-wide association studies. In ACM Asia Conference on Computer and Communications Security (ASIACCS) . Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Bing Wang, Wei Song, Wenjing Lou, and Y. Thomas Hou. 2017. Privacy-preserving pattern matching over encrypted genetic data in cloud computing. In IEEE Conference on Computer Communications (INFOCOM) .Google ScholarGoogle Scholar
  23. Xiao Shaun Wang, Yan Huang, Yongan Zhao, Haixu Tang, XiaoFeng Wang, and Diyue Bu. 2015. Efficient genome-wide, privacy-preserving similar patient query based on private edit distance. In ACM SIGSAG Conference on Computer and Communications Security (CCS) . Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Kris A. Wetterstrand. 2017. DNA sequencing costs: Data from the NHGRI Genome Sequencing Program (GSP) . (2017). http://www.genome.gov/sequencingcostsdata. Accessed on 2018-03--23.Google ScholarGoogle Scholar
  25. Andrew Yao. 1986. How to generate and exchange secrets. In Foundations of Computer Science (FOCS) . Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Ruiyu Zhu and Yan Huang. 2017. Efficient privacy-preserving general edit distance and beyond. Cryptology ePrint Archive, Report 2017/683. (2017). https://ia.cr/2017/683.Google ScholarGoogle Scholar

Index Terms

  1. Towards Efficient Privacy-Preserving Similar Sequence Queries on Outsourced Genomic Databases

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          WPES'18: Proceedings of the 2018 Workshop on Privacy in the Electronic Society
          October 2018
          190 pages
          ISBN:9781450359894
          DOI:10.1145/3267323

          Copyright © 2018 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 15 January 2018

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • short-paper

          Acceptance Rates

          WPES'18 Paper Acceptance Rate11of25submissions,44%Overall Acceptance Rate106of355submissions,30%

          Upcoming Conference

          CCS '24
          ACM SIGSAC Conference on Computer and Communications Security
          October 14 - 18, 2024
          Salt Lake City , UT , USA

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader