Secure searching of biomarkers through hybrid homomorphic encryption scheme

被引:25
作者
Kim, Miran [1 ]
Song, Yongsoo [2 ]
Cheon, Jung Hee [2 ]
机构
[1] Univ Calif San Diego, Div Biomed Informat, San Diego, CA 92093 USA
[2] Seoul Natl Univ, Dept Math Sci, GwanAkRo 1, Seoul 08826, South Korea
关键词
Homomorphic encryption; Biomarkers;
D O I
10.1186/s12920-017-0280-3
中图分类号
Q3 [遗传学];
学科分类号
071007 ; 090102 ;
摘要
Background: As genome sequencing technology develops rapidly, there has lately been an increasing need to keep genomic data secure even when stored in the cloud and still used for research. We are interested in designing a protocol for the secure outsourcing matching problem on encrypted data. Method: We propose an efficient method to securely search a matching position with the query data and extract some information at the position. After decryption, only a small amount of comparisons with the query information should be performed in plaintext state. We apply this method to find a set of biomarkers in encrypted genomes. The important feature of our method is to encode a genomic database as a single element of polynomial ring. Result: Since our method requires a single homomorphic multiplication of hybrid scheme for query computation, it has the advantage over the previous methods in parameter size, computation complexity, and communication cost. In particular, the extraction procedure not only prevents leakage of database information that has not been queried by user but also reduces the communication cost by half. We evaluate the performance of our method and verify that the computation on large-scale personal data can be securely and practically outsourced to a cloud environment during data analysis. It takes about 3.9 s to search-and-extract the reference and alternate sequences at the queried position in a database of size 4M. Conclusion: Our solution for finding a set of biomarkers in DNA sequences shows the progress of cryptographic techniques in terms of their capability can support real-world genome data analysis in a cloud environment.
引用
收藏
页数:8
相关论文
共 19 条
[1]  
[Anonymous], IMPLEMENTATION SECUR
[2]  
Boneh D., 2013, Applied Cryptography and Network Security (ACNS)
[3]  
Brakerski Z., 2014, ACM Trans. on Com. T, V6, P13
[4]   Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP [J].
Brakerski, Zvika .
ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 :868-886
[5]   Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data [J].
Cheon, Jung Hee ;
Kim, Miran ;
Kim, Myungsun .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (01) :188-199
[6]   Homomorphic Computation of Edit Distance [J].
Cheon, Jung Hee ;
Kim, Miran ;
Lauter, Kristin .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015), 2015, 8976 :194-212
[7]   Search-and-Compute on Encrypted Data [J].
Cheon, Jung Hee ;
Kim, Miran ;
Kim, Myungsun .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015), 2015, 8976 :142-159
[8]   Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds [J].
Chillotti, Ilaria ;
Gama, Nicolas ;
Georgieva, Mariya ;
Izabachene, Malika .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 :3-33
[9]   FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second [J].
Ducas, Leo ;
Micciancio, Daniele .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, 2015, 9056 :617-640
[10]   Routes for breaching and protecting genetic privacy [J].
Erlich, Yaniv ;
Narayanan, Arvind .
NATURE REVIEWS GENETICS, 2014, 15 (06) :409-421