Privacy-preserving genome-wide association studies on cloud environment using fully homomorphic encryption

被引:50
|
作者
Lu, Wen-Jie [1 ]
Yamada, Yoshiji [3 ]
Sakuma, Jun [1 ,2 ]
机构
[1] Univ Tsukuba, Grad Sch Syst & Informat Engn, Tsukuba, Ibaraki, Japan
[2] JST CREST, Kawaguchi, Saitama, Japan
[3] Mie Univ, Life Sci Res Ctr, Tsu, Mie 514, Japan
关键词
GWAS; Outsourcing; Fully homomorphic encryption;
D O I
10.1186/1472-6947-15-S5-S1
中图分类号
R-058 [];
学科分类号
摘要
Objective: Developed sequencing techniques are yielding large-scale genomic data at low cost. A genome-wide association study (GWAS) targeting genetic variations that are significantly associated with a particular disease offers great potential for medical improvement. However, subjects who volunteer their genomic data expose themselves to the risk of privacy invasion; these privacy concerns prevent efficient genomic data sharing. Our goal is to presents a cryptographic solution to this problem. Methods: To maintain the privacy of subjects, we propose encryption of all genotype and phenotype data. To allow the cloud to perform meaningful computation in relation to the encrypted data, we use a fully homomorphic encryption scheme. Noting that we can evaluate typical statistics for GWAS from a frequency table, our solution evaluates frequency tables with encrypted genomic and clinical data as input. We propose to use a packing technique for efficient evaluation of these frequency tables. Results: Our solution supports evaluation of the D' measure of linkage disequilibrium, the Hardy-Weinberg Equilibrium, the chi(2) test, etc. In this paper, we take chi(2) test and linkage disequilibrium as examples and demonstrate how we can conduct these algorithms securely and efficiently in an outsourcing setting. We demonstrate with experimentation that secure outsourcing computation of one chi(2) test with 10, 000 subjects requires about 35 ms and evaluation of one linkage disequilibrium with 10, 000 subjects requires about 80 ms. Conclusions: With appropriate encoding and packing technique, cryptographic solutions based on fully homomorphic encryption for secure computations of GWAS can be practical.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] Privacy-Preserving Federated Learning Using Homomorphic Encryption
    Park, Jaehyoung
    Lim, Hyuk
    APPLIED SCIENCES-BASEL, 2022, 12 (02):
  • [32] Towards practical privacy-preserving genome-wide association study
    Charlotte Bonte
    Eleftheria Makri
    Amin Ardeshirdavani
    Jaak Simm
    Yves Moreau
    Frederik Vercauteren
    BMC Bioinformatics, 19
  • [33] Privacy-preserving Surveillance Methods using Homomorphic Encryption
    Bowditch, William
    Abramson, Will
    Buchanan, William J.
    Pitropakis, Nikolaos
    Hall, Adam J.
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 240 - 248
  • [34] Privacy-Preserving Biometric Matching Using Homomorphic Encryption
    Pradel, Gaetan
    Mitchell, Chris
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 494 - 505
  • [35] Fully Homomorphic Encryption with Table Lookup for Privacy-Preserving Smart Grid
    Li, Ruixiao
    Ishimaki, Yu
    Yamana, Hayato
    2019 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP 2019), 2019, : 19 - 24
  • [36] smartFHE: Privacy-Preserving Smart Contracts from Fully Homomorphic Encryption
    Solomon, Ravital
    Weber, Rick
    Almashaqbeh, Ghada
    2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P, 2023, : 309 - 331
  • [37] Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption
    Kim, Sungwook
    Kim, Jinsu
    Koo, Dongyoung
    Kim, Yuna
    Yoon, Hyunsoo
    Shin, Junbum
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 617 - 628
  • [38] Privacy-Preserving Functional IP Verification utilizing Fully Homomorphic Encryption
    Konstantinou, Charalambos
    Keliris, Anastasis
    Maniatakos, Michail
    2015 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2015, : 333 - 338
  • [39] Privacy-Preserving Data Synchronization Using Tensor-based Fully Homomorphic Encryption
    Gai, Keke
    Wu, Yulu
    Zhu, Liehuang
    Qiu, Meikang
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1149 - 1156
  • [40] Privacy-preserving association rule mining via multi-key fully homomorphic encryption
    Jia, Peiheng
    Zhang, Jie
    Zhao, Bowen
    Li, Hongtao
    Liu, Ximeng
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (02) : 641 - 650