Secure searching of biomarkers through hybrid homomorphic encryption scheme

被引:25
作者
Kim, Miran [1 ]
Song, Yongsoo [2 ]
Cheon, Jung Hee [2 ]
机构
[1] Univ Calif San Diego, Div Biomed Informat, San Diego, CA 92093 USA
[2] Seoul Natl Univ, Dept Math Sci, GwanAkRo 1, Seoul 08826, South Korea
关键词
Homomorphic encryption; Biomarkers;
D O I
10.1186/s12920-017-0280-3
中图分类号
Q3 [遗传学];
学科分类号
071007 ; 090102 ;
摘要
Background: As genome sequencing technology develops rapidly, there has lately been an increasing need to keep genomic data secure even when stored in the cloud and still used for research. We are interested in designing a protocol for the secure outsourcing matching problem on encrypted data. Method: We propose an efficient method to securely search a matching position with the query data and extract some information at the position. After decryption, only a small amount of comparisons with the query information should be performed in plaintext state. We apply this method to find a set of biomarkers in encrypted genomes. The important feature of our method is to encode a genomic database as a single element of polynomial ring. Result: Since our method requires a single homomorphic multiplication of hybrid scheme for query computation, it has the advantage over the previous methods in parameter size, computation complexity, and communication cost. In particular, the extraction procedure not only prevents leakage of database information that has not been queried by user but also reduces the communication cost by half. We evaluate the performance of our method and verify that the computation on large-scale personal data can be securely and practically outsourced to a cloud environment during data analysis. It takes about 3.9 s to search-and-extract the reference and alternate sequences at the queried position in a database of size 4M. Conclusion: Our solution for finding a set of biomarkers in DNA sequences shows the progress of cryptographic techniques in terms of their capability can support real-world genome data analysis in a cloud environment.
引用
收藏
页数:8
相关论文
共 19 条
[11]   The design and implementation of FFTW3 [J].
Frigo, M ;
Johnson, SG .
PROCEEDINGS OF THE IEEE, 2005, 93 (02) :216-231
[12]  
Gentry C, 2013, LECT NOTES COMPUT SC, V8042, P75, DOI 10.1007/978-3-642-40041-4_5
[13]   Homomorphic Evaluation of the AES Circuit [J].
Gentry, Craig ;
Halevi, Shai ;
Smart, Nigel P. .
ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 :850-867
[14]  
Humbert M., 2013, Proc. 2013 ACM SIGSAC Conf. Comput. Commun. Secur, P1141
[15]   Private Computation on Encrypted Genomic Data [J].
Lauter, Kristin ;
Lopez-Alt, Adriana ;
Naehrig, Michael .
PROGRESS IN CRYPTOLOGY - LATINCRYPT 2014, 2015, 8895 :3-27
[16]   Inference of brain pathway activities for Alzheimer's disease classification [J].
Lee, Jongan ;
Kim, Younghoon ;
Jeong, Yong ;
Na, Duk L. ;
Kim, Jong-Won ;
Lee, Kwang H. ;
Lee, Doheon .
BMC MEDICAL INFORMATICS AND DECISION MAKING, 2015, 15
[17]   On Ideal Lattices and Learning with Errors over Rings [J].
Lyubashevsky, Vadim ;
Peikert, Chris ;
Regev, Oded .
JOURNAL OF THE ACM, 2013, 60 (06)
[18]   Privacy in the Genomic Era [J].
Naveed, Muhammad ;
Ayday, Erman ;
Clayton, Ellen W. ;
Fellay, Jacques ;
Gunter, Carl A. ;
Hubaux, Jean-Pierre ;
Malin, Bradley A. ;
Wang, Xiaofeng .
ACM COMPUTING SURVEYS, 2015, 48 (01)
[19]  
Yasuda M., 2013, Proceedings of the 2013 ACM workshop on Cloud computing security workshop, P65, DOI [10.1145/2517488.2517497, DOI 10.1145/2517488.2517497]