Proceedings of the 8th International Conference on Cloud Computing and Services Science 2018
DOI: 10.5220/0006765804890496
|View full text |Cite
|
Sign up to set email alerts
|

Constructive Privacy for Shared Genetic Data

Abstract: Abstract:The need for the sharing of genetic data, for instance, in genome-wide association studies is incessantly growing. In parallel, serious privacy concerns rise from a multi-party access to genetic information. Several techniques, such as encryption, have been proposed as solutions for the privacy-preserving sharing of genomes. However, existing programming means do not support guarantees for privacy properties and the performance optimization of genetic applications involving shared data. We propose two… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…As future work, we plan to extend an existing framework [10] in order to provide full-fledged support for the security and privacy challenge of distributed biomedical analysis. Furthermore, we plan to extend tools that are used by biomedical researchers to implement a comprehensive development method for distributed analyses.…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…As future work, we plan to extend an existing framework [10] in order to provide full-fledged support for the security and privacy challenge of distributed biomedical analysis. Furthermore, we plan to extend tools that are used by biomedical researchers to implement a comprehensive development method for distributed analyses.…”
Section: Discussionmentioning
confidence: 99%
“…In the context of GWAS, even aggregate data from each country cannot be shared because of possible identifying attacks [9]. Therefore, GWA studies require ad-hoc security protocols and architectures to be applied at this level i.e., privacy-preserving GWAS as in [10].…”
Section: The I-can Biomedical Studymentioning
confidence: 99%
See 3 more Smart Citations