PriRanGe: Privacy-Preserving Range-Constrained Intersection Query Over Genomic Data

被引:1
作者
Yang, Yaxi [1 ]
Tong, Yao [2 ]
Weng, Jian [1 ]
Yi, Yufeng [1 ]
Zheng, Yandong [3 ]
Zhang, Leo Yu [4 ]
Lu, Rongxing [3 ]
机构
[1] Jinan Univ, Coll Informat Sci & Technol, Guangzhou 510632, Peoples R China
[2] Guangzhou Fongwell Data Ltd Co, Guangzhou 510632, Peoples R China
[3] Univ New Brunswick, Fac Comp Sci, Fredericton, NB E3B 5A3, Canada
[4] Deakin Univ, Sch Informat Technol, Burwood, Vic 3125, Australia
基金
中国国家自然科学基金;
关键词
Genomic data; range-constrained intersection query; garbled circuits; secure multiparty computation; EFFICIENT;
D O I
10.1109/TCC.2022.3205700
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Genomic data is being produced rapidly by both individuals and enterprises, and outsourcing this ever-increasing data into clouds is promising for cutting the cost of data owners and mining the wealth of genomic data at a larger scale. However, genome carries sensitive information about individuals, and it is challenging to securely and efficiently perform analysis on remotely hosted genomic databases. In this article, we present a privacy-preserving range-constrained intersection query scheme on genomic data. To achieve security and efficiency, we propose a protocol to fulfill range-constrained intersection query, named PriRanGe. With PriRanGe, a client can securely query genomic data in a specific range in a database while keeping this whole process private. The security of our design targets genomic database confidentiality, query range/result confidentiality, and access pattern protection, and the advantage in efficiency is due to most employed primitives are symmetric. We thoroughly evaluated our design by security proof, experimental analysis and comparison to the state-of-the-art works, all of which support the conclusion that this design is both secure and fast.
引用
收藏
页码:2379 / 2391
页数:13
相关论文
共 54 条
[1]   Efficient Delegated Private Set Intersection on Outsourced Private Datasets [J].
Abadi, Aydin ;
Terzis, Sotirios ;
Metere, Roberto ;
Dong, Changyu .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (04) :608-624
[2]  
Al Aziz M.M., 2016, Proceedings of the 20th International Database Engineering Applications Symposium, P278, DOI [10.1145/2938503, DOI 10.1145/2938503, 10.1145/2938503.2938507, DOI 10.1145/2938503.2938507]
[3]  
Asharov Gilad, 2018, Proceedings on Privacy Enhancing Technologies, V2018, P104, DOI [10.1515/popets-2018-0034, 10.1515/popets-2018-0034]
[4]  
Atallah MJ, 2005, LECT NOTES COMPUT SC, V3424, P63
[5]   Garbling Gadgets for Boolean and Arithmetic Circuits [J].
Ball, Marshall ;
Malkin, Tal ;
Rosulek, Mike .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :565-577
[6]   Secret-Shared Shuffle [J].
Chase, Melissa ;
Ghosh, Esha ;
Poburinnaya, Oxana .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2020, PT III, 2020, 12493 :342-372
[7]   Password-authenticated searchable encryption [J].
Chen, Liqun ;
Huang, Kaibin ;
Manulis, Mark ;
Sekar, Venkkatesh .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (05) :675-693
[8]  
Cheng K, 2020, IEEE INFOCOM SER, P1708, DOI [10.1109/INFOCOM41043.2020.9155279, 10.1109/infocom41043.2020.9155279]
[9]   Secure Similar Sequence Query on Outsourced Genomic Data [J].
Cheng, Ke ;
Hou, Yantian ;
Wang, Liangmin .
PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, :237-251
[10]  
Danezis George., 2014, Proceedings of the 13th Workshop on Privacy in the Electronic Society, P31, DOI [10.1145/2665943.2665952, DOI 10.1145/2665943.2665952]