Towards practical privacy-preserving genome-wide association study

被引:31
|
作者
Bonte, Charlotte [1 ]
Makri, Eleftheria [1 ,2 ]
Ardeshirdavani, Amin [3 ]
Simm, Jaak [3 ]
Moreau, Yves [3 ]
Vercauteren, Frederik [1 ]
机构
[1] Katholieke Univ Leuven, COSIC, Imec, Dept Elect Engn, Leuven, Belgium
[2] Saxion Univ Appl Sci, ABRR, Enschede, Netherlands
[3] Katholieke Univ Leuven, STADIUS, Leuven, Belgium
来源
BMC BIOINFORMATICS | 2018年 / 19卷
基金
欧盟地平线“2020”;
关键词
Genome-wide association study (GWAS); Homomorphic encryption (HE); Secure multiparty computation (MPC);
D O I
10.1186/s12859-018-2541-3
中图分类号
Q5 [生物化学];
学科分类号
071010 ; 081704 ;
摘要
BackgroundThe deployment of Genome-wide association studies (GWASs) requires genomic information of a large population to produce reliable results. This raises significant privacy concerns, making people hesitate to contribute their genetic information to such studies.ResultsWe propose two provably secure solutions to address this challenge: (1) a somewhat homomorphic encryption (HE) approach, and (2) a secure multiparty computation (MPC) approach. Unlike previous work, our approach does not rely on adding noise to the input data, nor does it reveal any information about the patients. Our protocols aim to prevent data breaches by calculating the (2) statistic in a privacy-preserving manner, without revealing any information other than whether the statistic is significant or not. Specifically, our protocols compute the (2) statistic, but only return a yes/no answer, indicating significance. By not revealing the statistic value itself but only the significance, our approach thwarts attacks exploiting statistic values. We significantly increased the efficiency of our HE protocols by introducing a new masking technique to perform the secure comparison that is necessary for determining significance.ConclusionsWe show that full-scale privacy-preserving GWAS is practical, as long as the statistics can be computed by low degree polynomials. Our implementations demonstrated that both approaches are efficient. The secure multiparty computation technique completes its execution in approximately 2 ms for data contributed by one million subjects.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] Practical aspects of genome-wide association interaction analysis
    Elena S. Gusareva
    Kristel Van Steen
    Human Genetics, 2014, 133 : 1343 - 1358
  • [42] Privacy-preserving Practical Convex Hulls Protocol
    Zhu, Youwen
    Huang, Liusheng
    Yang, Wei
    Chen, Zhili
    Li, Lingjun
    Yu, Zhenshan
    Luo, Yonglong
    FCST: 2008 JAPAN-CHINA JOINT WORKSHOP ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, PROCEEDINGS, 2008, : 10 - 16
  • [43] A Practical Privacy-Preserving Algorithm for Document Data
    Mimoto, Tomoaki
    Kiyomoto, Shinsaku
    Kitamura, Koji
    Miyaji, Atsuko
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1377 - 1384
  • [44] Genome-wide association studies: theoretical and practical concerns
    William Y. S. Wang
    Bryan J. Barratt
    David G. Clayton
    John A. Todd
    Nature Reviews Genetics, 2005, 6 : 109 - 118
  • [45] Genome-wide association studies: Theoretical and practical concerns
    Wang, WYS
    Barratt, BJ
    Clayton, DG
    Todd, JA
    NATURE REVIEWS GENETICS, 2005, 6 (02) : 109 - 118
  • [46] Toward practical privacy-preserving linear regression
    Xu, Wenju
    Wang, Baocang
    Liu, Jiasen
    Chen, Yange
    Duan, Pu
    Hong, Zhiyong
    INFORMATION SCIENCES, 2022, 596 (119-136) : 119 - 136
  • [47] Practical Verifiable & Privacy-Preserving Double Auctions
    Zahedani, Armin Memar
    Vos, Jelle
    Erkin, Zekeriya
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [48] Practical Privacy-Preserving Protocols for Criminal Investigations
    Kerschbaum, Florian
    Schaad, Andreas
    Biswas, Debmalya
    ISI: 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2009, : 197 - 199
  • [49] A Practical Framework for Privacy-Preserving Data Analytics
    Fan, Liyue
    Jin, Hongxia
    PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW 2015), 2015, : 311 - 321
  • [50] A Practical System for Privacy-Preserving Video Surveillance
    Bentafat, Elmahdi
    Rathore, M. Mazhar
    Bakiras, Spiridon
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT II, 2020, 12147 : 21 - 39