Secure Management of Biomedical Data With Cryptographic Hardware

被引:38
作者
Canim, Mustafa [1 ]
Kantarcioglu, Murat [1 ]
Malin, Bradley [2 ]
机构
[1] Univ Texas Dallas, Dept Comp Sci, Richardson, TX 75083 USA
[2] Vanderbilt Univ, Dept Biomed Informat, Nashville, TN 37203 USA
来源
IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE | 2012年 / 16卷 / 01期
基金
美国国家科学基金会; 美国国家卫生研究院;
关键词
Cryptographic hardware; cryptography; databases; genomics; privacy; security; GENOMIC MEDICINE; ASSOCIATION;
D O I
10.1109/TITB.2011.2171701
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The biomedical community is increasingly migrating toward research endeavors that are dependent on large quantities of genomic and clinical data. At the same time, various regulations require that such data be shared beyond the initial collecting organization (e.g., an academic medical center). It is of critical importance to ensure that when such data are shared, as well as managed, it is done so in a manner that upholds the privacy of the corresponding individuals and the overall security of the system. In general, organizations have attempted to achieve these goals through deidentification methods that remove explicitly, and potentially, identifying features (e.g., names, dates, and geocodes). However, a growing number of studies demonstrate that deidentified data can be reidentified to named individuals using simple automated methods. As an alternative, it was shown that biomedical data could be shared, managed, and analyzed through practical cryptographic protocols without revealing the contents of any particular record. Yet, such protocols required the inclusion of multiple third parties, which may not always be feasible in the context of trust or bandwidth constraints. Thus, in this paper, we introduce a framework that removes the need for multiple third parties by collocating services to store and to process sensitive biomedical data through the integration of cryptographic hardware. Within this framework, we define a secure protocol to process genomic data and perform a series of experiments to demonstrate that such an approach can be run in an efficient manner for typical biomedical investigations.
引用
收藏
页码:166 / 175
页数:10
相关论文
共 41 条
[1]  
ADAM NR, 1989, COMPUT SURV, V21, P515, DOI 10.1145/76894.76895
[2]   GenePING: Secure, scalable management of personal genomic data [J].
Adida, Ben ;
Kohane, Isaac S. .
BMC GENOMICS, 2006, 7 (1)
[3]  
Aggarwal G., 2005, P 2 BIENN C INN DAT, P186
[4]  
Agrawal R., 2004, ACM SIGMOD INT C MAN
[5]  
Agrawal Rakesh., 2006, Proceedings of the 22nd International Conference on Data Engineering, P26
[6]  
[Anonymous], IFIP
[7]  
[Anonymous], 2004, VLDB
[8]  
[Anonymous], 2010, UNDERSTANDING TRANSP
[9]  
[Anonymous], 2010, UNDERSTANDING EXTENS
[10]  
Asonov D., 2002, PET, P209