Analysis of security and privacy challenges for DNA-genomics applications and databases

被引:19
作者
Arshad, Saadia [1 ]
Arshad, Junaid [2 ]
Khan, Muhammad Mubashir [1 ]
Parkinson, Simon [3 ]
机构
[1] NED Univ Engn & Technol, Dept Comp Sci & IT, Karachi, Pakistan
[2] Birmingham City Univ, Sch Comp & Digital Technol, Birmingham, W Midlands, England
[3] Univ Huddersfield, Dept Comp Sci, Huddersfield, W Yorkshire, England
关键词
Cyberbiosecurity; DNA; Genomics; Cyber-attacks; Vulnerabilities; Bioinformatics; CLOUD; ATTACKS;
D O I
10.1016/j.jbi.2021.103815
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
DNA technology is rapidly moving towards digitization. Scientists use software tools and applications for sequencing, synthesizing, analyzing and sharing of DNA and genomic data, operate lab equipment and store genetic information in shared datastores. Using cutting-edge computing methods and techniques, researchers have decoded human genome, created organisms with new capabilities, automated drug development and transformed food safety. Such software applications are typically developed to progress scientific understanding and as such cyber security is never a concern for these applications. However, with the increasing commercialisation of DNA technologies, coupled with the sensitivity of DNA data, there is a need to adopt a security-bydesign approach. In this paper we investigate bio-cyber security threats to genomic-DNA data and software applications making use of such data to advance scientific research. Specifically, we adopt an empirical approach to analyse and identify vulnerabilities within genomic-DNA databases and bioinformatics software applications that can lead to cyber-attacks affecting the confidentiality, integrity and availability of such sensitive data. We present a detailed analysis of these threats and highlight potential protection mechanisms to help researchers pursue these research directions.
引用
收藏
页数:14
相关论文
共 76 条
[1]  
A.M. Blog, MYH STAT CYB INC
[2]   Harnessing cloud computing with Galaxy Cloud [J].
Afgan, Enis ;
Baker, Dannon ;
Coraor, Nate ;
Goto, Hiroki ;
Paul, Ian M. ;
Makova, Kateryna D. ;
Nekrutenko, Anton ;
Taylor, James .
NATURE BIOTECHNOLOGY, 2011, 29 (11) :972-974
[3]   Artificial DNA cutters for DNA manipulation and genome engineering [J].
Aiba, Yuichiro ;
Sumaoka, Jun ;
Komiyama, Makoto .
CHEMICAL SOCIETY REVIEWS, 2011, 40 (12) :5657-5668
[4]   Homomorphic encryption systems statement: Trends and challenges [J].
Alaya, Bechir ;
Laouamer, Lamri ;
Msilini, Nihel .
COMPUTER SCIENCE REVIEW, 2020, 36
[5]   A systematic review on the status and progress of homomorphic encryption technologies [J].
Alloghani, Mohamed ;
Alani, Mohammed M. ;
Al-Jumeily, Dhiya ;
Baker, Thar ;
Mustafina, Jamila ;
Hussain, Abir ;
Aljaaf, Ahmed J. .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 48
[6]  
Analytica O., 2021, EMERALD EXPERT BRIEF
[7]  
[Anonymous], 2006, ISSSR
[8]  
[Anonymous], 2020, ANN ONCOL, DOI DOI 10.1093/annonc/mdy517
[9]  
[Anonymous], GenBank
[10]   Inference Attacks against Kin Genomic Privacy [J].
Ayday, Erman ;
Humbert, Mathias .
IEEE SECURITY & PRIVACY, 2017, 15 (05) :29-37