Secure Counting Query Protocol for Genomic Data

被引:0
作者
Jiang, Yatong [1 ]
Shang, Tao [1 ]
Liu, Jianwei [1 ]
机构
[1] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100190, Peoples R China
基金
中国国家自然科学基金;
关键词
Bioinformatics; Genomics; Data privacy; Protocols; Statistical analysis; Cryptography; Homomorphic encryption; Secure multi-party computation; homomorphic encryption; counting query; genomic data; privacy protection; ATTACK;
D O I
10.1109/TCBB.2022.3178446
中图分类号
Q5 [生物化学];
学科分类号
071010 ; 081704 ;
摘要
Statistical analysis on genomic data can explore the relationship between gene sequence and phenotype. Particularly, counting the genomic mutation samples and associating with related phenotypes for statistical analysis can annotate the variation sites and help to diagnose genovariation. Expansion of the size of variation sample data helps to increase the accuracy of statistical analysis. It is feasible to securely share data from genomic databases on cloud platforms. In this paper, we design a secure counting query protocol that can securely share genomic data on cloud platforms. Our protocol supports statistical analysis of the genomic data in VCF (Variant Call Format) files by counting query. There are three participants of data owner, cloud platform and query party. Firstly, the genomic data is preprocessed to reduce the data size. Secondly, Paillier homomorphic is used so that genomic data can be securely shared and calculated on cloud platform. Finally, the results which be decrypted is used to implement counting function of the protocol. Experimental results show that the protocol can implement the query counting function after homomorphic encryption. The query time is less than 1 s, which provide a feasible solution to share genomic data securely on cloud platform for statistical analysis.
引用
收藏
页码:1457 / 1468
页数:12
相关论文
共 50 条
  • [31] Light Weight Circular Error Learning Algorithm (CELA) for Secure Data Communication Protocol in IoT-Cloud Systems
    Mangala, N.
    Reddy, B. Eswara
    Venugopal, K. R.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (07) : 845 - 858
  • [32] Extending the Genomic Data Model and the Genometric Query Language with Domain Taxonomies
    Cappelli, Eleonora
    Weitschek, Emanuel
    WEB ENGINEERING (ICWE 2017), 2017, 10360 : 567 - 574
  • [33] Secure FPGA as a Service - Towards Secure Data Processing by Physicalizing the Cloud
    Will, Mark A.
    Ko, Ryan K. L.
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 449 - 455
  • [34] Secure similar patients query with homomorphically evaluated thresholds
    Pratapa, Mounika
    Essex, Aleksander
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 85
  • [35] Secure query processing for smart grid data using searchable symmetric encryption
    Souror, Samia
    Badawy, Mohammed
    El-Fishawy, Nawal
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (16) : 24173 - 24211
  • [36] A secure paillier cryptosystem based privacy-preserving data aggregation and query processing models for smart grid
    Kumar, Jatinder
    Singh, Ashutosh Kumar
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (06): : 7389 - 7400
  • [37] Privacy-Preserving Secure Computation of Skyline Query in Distributed Multi-Party Databases †
    Qaosar, Mahboob
    Zaman, Asif
    Siddique, Md. Anisuzzaman
    Annisa
    Morimoto, Yasuhiko
    INFORMATION, 2019, 10 (03):
  • [38] Improved secure fuzzy auditing protocol for cloud data storage
    Zhang, Jindan
    Wang, Baocang
    He, Debiao
    Wang, Xu An
    SOFT COMPUTING, 2019, 23 (10) : 3411 - 3422
  • [39] Private and Efficient Query Processing on Outsourced Genomic Databases
    Ghasemi, Reza
    Al Aziz, Md. Momin
    Mohammed, Noman
    Dehkordi, Massoud Hadian
    Jiang, Xiaoqian
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2017, 21 (05) : 1466 - 1472
  • [40] Data Integrity Checking Protocol Based on Secure Multiparty Computation
    Shi, Runhua
    Zhang, Yechi
    Zhong, Hong
    Cui, Jie
    Zhang, Shun
    WIRELESS COMMUNICATIONS, NETWORKING AND APPLICATIONS, WCNA 2014, 2016, 348 : 873 - 882