Privacy-Preserving Processing of Raw Genomic Data

被引:32
作者
Ayday, Erman [1 ]
Raisaro, Jean Louis [1 ]
Hengartner, Urs [2 ]
Molyneaux, Adam [3 ]
Hubaux, Jean-Pierre [1 ]
机构
[1] Ecole Polytech Fed Lausanne, Lausanne, Switzerland
[2] Univ Waterloo, Waterloo, ON, Canada
[3] Sophia Genet, Lausanne, Switzerland
来源
DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, DPM 2013 | 2014年 / 8247卷
关键词
Genomics; Privacy; Bioinformatics; Raw genomic data;
D O I
10.1007/978-3-642-54568-9_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Geneticists prefer to store patients' aligned, raw genomic data, in addition to their variant calls (compact and summarized form of the raw data), mainly because of the immaturity of bioinformatic algorithms and sequencing platforms. Thus, we propose a privacy-preserving system to protect the privacy of aligned, raw genomic data. The raw genomic data of a patient includes millions of short reads, each comprised of between 100 and 400 nucleotides (genomic letters). We propose storing these short reads at a biobank in encrypted form. The proposed scheme enables a medical unit (e.g., a pharmaceutical company or a hospital) to privately retrieve a subset of the short reads of the patients (which include a definite range of nucleotides depending on the type of the genetic test) without revealing the nature of the genetic test to the biobank. Furthermore, the proposed scheme lets the biobank mask particular parts of the retrieved short reads if (i) some parts of the provided short reads are out of the requested range, or (ii) the patient does not give consent to some parts of the provided short reads (e.g., parts revealing sensitive diseases). We evaluate the proposed scheme to show the amount of unauthorized genomic data leakage it prevents. Finally, we implement the proposed scheme and assess its practicality.
引用
收藏
页码:133 / 147
页数:15
相关论文
共 16 条
  • [1] Agrawal R., 2004, P ACM SIGMOD INT C M, P563
  • [2] [Anonymous], 2011, P 23 ACM S OP SYST P
  • [3] Ayday E., 2013, P IEEE GLOB COMM C E
  • [4] Ayday E., 2013, ARXIV13061264
  • [5] Ayday E., 2013, P USENIX SEC WORKSH
  • [6] Ayday E., 2013, EPFLREPORT187573
  • [7] Ayday E., 2013, 20 ANN NETW DISTR SY
  • [8] Baldi P, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P691
  • [9] Bernstein DJ, 2008, LECT NOTES COMPUT SC, V4986, P84
  • [10] Chen Yangyi, 2012, NDSS 12