Towards Secure Computation of Similar Patient Query on Genomic Data Under Multiple Keys

被引:0
|
作者
Zhao, Chuan [1 ,2 ]
Zhao, Shengnan [3 ]
Zhang, Bo [1 ,2 ]
Jing, Shan [1 ,2 ]
Chen, Zhenxiang [1 ,2 ]
Zhao, Minghao [4 ]
机构
[1] Univ Jinan, Shandong Prov Key Lab Network Based Intelligent C, Jinan 250022, Peoples R China
[2] Univ Jinan, Sch Informat Sci & Engn, Jinan 250022, Peoples R China
[3] Shandong Univ, Sch Software, Jinan 250101, Peoples R China
[4] Tsinghua Univ, Sch Software, Beijing, Peoples R China
来源
CYBERSPACE SAFETY AND SECURITY, PT II | 2019年 / 11983卷
基金
中国国家自然科学基金;
关键词
Secure computation; Genomic data privacy; Homomorphic encryption; Electronic health records; EDIT DISTANCE; SEQUENCE;
D O I
10.1007/978-3-030-37352-8_24
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Genomics plays an especial role in our daily lives. Genomic data, however, are highly-sensitive and thus normally stored in repositories with strict access control insurance. This severely restricts the associated processing on genomic data, in which multiple institutes holding their own data hope to conduct specific computation on the entire dataset. Accordingly, researchers attempt to propose methods to enable secure computation on genomic data among multiple parties. Nevertheless, most of the existing solutions fall short in efficiency, security or scalability. In this paper, we focus on providing a secure and practical solution to perform similar patient query on distributed Electronic Health Records (EHR) databases with genomic data. To achieve this, we propose a privacy-preserving framework to execute similar patient query on genomic data owned by distributed owners in a server-aided setting. Specifically, we apply multi-key homomorphic encryption to the proposed framework, where each data owner performs queries on its local EHR database, encrypts query results with its unique public key, and sends them to the servers for further secure edit-distance computation on genomic data encrypted under multiple keys. Security and performance analysis show that our system achieves satisfactory efficiency, scalability, and flexibility while protecting the privacy of each data contributor.
引用
收藏
页码:275 / 284
页数:10
相关论文
共 7 条
  • [1] SEMKC: Secure and Efficient Computation over Outsourced Data Encrypted under Multiple Keys
    Nayak, Sanjeet Kumar
    Tripathy, Somanath
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (01) : 414 - 428
  • [2] Secure Counting Query Protocol for Genomic Data
    Jiang, Yatong
    Shang, Tao
    Liu, Jianwei
    IEEE-ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, 2023, 20 (02) : 1457 - 1468
  • [3] Efficiently Outsourcing Multiparty Computation Under Multiple Keys
    Peter, Andreas
    Tews, Erik
    Katzenbeisser, Stefan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (12) : 2046 - 2058
  • [4] Efficient and Privacy-Preserving Similar Patients Query Scheme Over Outsourced Genomic Data
    Zhu, Dan
    Zhu, Hui
    Wang, Xiangyu
    Lu, Rongxing
    Feng, Dengguo
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (02) : 1286 - 1302
  • [5] Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: A Survey
    Aloufi, Asma
    Hu, Peizhao
    Song, Yongsoo
    Lauter, Kristin
    ACM COMPUTING SURVEYS, 2022, 54 (09)
  • [6] Towards an efficient and secure computation over outsourced encrypted data using distributed hash table
    Masood R.
    Pandey N.
    Rana Q.P.
    International Journal of Cloud Computing, 2022, 11 (03): : 217 - 233
  • [7] Towards Blockchain-Based Secure Data Management for Remote Patient Monitoring
    Faruk, Md Jobair Hossain
    Shahriar, Hossain
    Valero, Maria
    Sneha, Sweta
    Ahamed, Sheikh, I
    Rahman, Mohammad
    2021 IEEE INTERNATIONAL CONFERENCE ON DIGITAL HEALTH (ICDH 2021), 2021, : 299 - 308