Secure Counting Query Protocol for Genomic Data

被引:0
作者
Jiang, Yatong [1 ]
Shang, Tao [1 ]
Liu, Jianwei [1 ]
机构
[1] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100190, Peoples R China
基金
中国国家自然科学基金;
关键词
Bioinformatics; Genomics; Data privacy; Protocols; Statistical analysis; Cryptography; Homomorphic encryption; Secure multi-party computation; homomorphic encryption; counting query; genomic data; privacy protection; ATTACK;
D O I
10.1109/TCBB.2022.3178446
中图分类号
Q5 [生物化学];
学科分类号
071010 ; 081704 ;
摘要
Statistical analysis on genomic data can explore the relationship between gene sequence and phenotype. Particularly, counting the genomic mutation samples and associating with related phenotypes for statistical analysis can annotate the variation sites and help to diagnose genovariation. Expansion of the size of variation sample data helps to increase the accuracy of statistical analysis. It is feasible to securely share data from genomic databases on cloud platforms. In this paper, we design a secure counting query protocol that can securely share genomic data on cloud platforms. Our protocol supports statistical analysis of the genomic data in VCF (Variant Call Format) files by counting query. There are three participants of data owner, cloud platform and query party. Firstly, the genomic data is preprocessed to reduce the data size. Secondly, Paillier homomorphic is used so that genomic data can be securely shared and calculated on cloud platform. Finally, the results which be decrypted is used to implement counting function of the protocol. Experimental results show that the protocol can implement the query counting function after homomorphic encryption. The query time is less than 1 s, which provide a feasible solution to share genomic data securely on cloud platform for statistical analysis.
引用
收藏
页码:1457 / 1468
页数:12
相关论文
共 50 条
  • [41] Improved secure fuzzy auditing protocol for cloud data storage
    Jindan Zhang
    Baocang Wang
    Debiao He
    Xu An Wang
    [J]. Soft Computing, 2019, 23 : 3411 - 3422
  • [42] Enabling secure and efficient kNN query processing over encrypted spatial data in the cloud
    Cheng, Xiang
    Su, Sen
    Teng, Yiping
    Xiao, Ke
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3205 - 3218
  • [43] Blockchain-Based Fair and Secure Electronic Double Auction Protocol
    Liu, Lietong
    Du, Mingxiao
    Ma, Xiaofeng
    [J]. IEEE INTELLIGENT SYSTEMS, 2020, 35 (03) : 31 - 40
  • [44] Privacy-preserving SVM on Outsourced Genomic Data via Secure Multi-party Computation
    Chen, Huajie
    Uenal, Ali Burak
    Akguen, Mete
    Pfeifer, Nico
    [J]. PROCEEDINGS OF THE SIXTH INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS (IWSPA'20), 2020, : 61 - 69
  • [45] Blockchain-Enhanced Data Privacy Preservation and Secure Sharing Scheme for Healthcare IoT
    Guan, Shaopeng
    Cao, Youliang
    Zhang, Yuan
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (05): : 5600 - 5614
  • [46] Private queries on encrypted genomic data
    Cetin, Gizem S.
    Chen, Hao
    Laine, Kim
    Lauter, Kristin
    Rindal, Peter
    Xia, Yuhou
    [J]. BMC MEDICAL GENOMICS, 2017, 10
  • [47] Private queries on encrypted genomic data
    Gizem S. Çetin
    Hao Chen
    Kim Laine
    Kristin Lauter
    Peter Rindal
    Yuhou Xia
    [J]. BMC Medical Genomics, 10
  • [48] Privacy-Preserving Collaborative Queries in Services Computing Using Multisource Private Data Counting
    Guo, Guanglai
    Zhu, Yan
    Chen, E.
    Yau, Stephen S.
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (01) : 1 - 17
  • [49] PHRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over High-Dimensional Data in Cloud
    Zheng, Yandong
    Zhu, Hui
    Lu, Rongxing
    Guan, Yunguo
    Zhang, Songnian
    Wang, Fengwei
    Shao, Jun
    Li, Hui
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 1831 - 1844
  • [50] An efficient protocol tor the problem of secure two-party vector dominance
    Sang, YP
    Shen, H
    Zhang, ZH
    [J]. PDCAT 2005: SIXTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2005, : 488 - 492