Proceedings of the 13th Workshop on Privacy in the Electronic Society 2014
DOI: 10.1145/2665943.2665962
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM

Abstract: Widespread use and low prices of genomic sequencing bring us into the area of personalized medicine and biostatistics of large cohorts. As the processed genomic data is highly sensitive, Privacy-Enhancing Technologies for genomic data need to be developed. In this work, we present a novel and flexible mechanism for the private processing of whole genomic sequences which is flexible enough to support any query. The basic underlying idea is to store DNA in several small encrypted blocks, use ORAM mechanisms to a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 27 publications
(17 citation statements)
references
References 31 publications
0
17
0
Order By: Relevance
“…Ayday et al proposed a scheme to protect the privacy of users' genomic data yet enable medical units to access the genomic data in order to conduct medical tests or to develop personalized medicine methods [2]. Karvelas et al proposed using the oblivious RAM mechanisms to access genomic data (that is stored at a third party) and secure twoparty computation protocols to compute various functionalities on the data [3]. Recently, Wang et al proposed private edit distance protocols to find similar patients (e.g., across several hospitals) [4].…”
Section: Related Workmentioning
confidence: 99%
“…Ayday et al proposed a scheme to protect the privacy of users' genomic data yet enable medical units to access the genomic data in order to conduct medical tests or to develop personalized medicine methods [2]. Karvelas et al proposed using the oblivious RAM mechanisms to access genomic data (that is stored at a third party) and secure twoparty computation protocols to compute various functionalities on the data [3]. Recently, Wang et al proposed private edit distance protocols to find similar patients (e.g., across several hospitals) [4].…”
Section: Related Workmentioning
confidence: 99%
“…They also implemented a prototype system in an Android App. In [Karvelas et al, 2014], authors propose a technique to store genomic data in encrypted form, use an Oblivious RAM to access the desired data without leaking the access pattern, and finally run secure two-party computation protocol to privately compute the required function on the retrieved encrypted genomic data. The proposed construction includes two separate servers: cloud and proxy.…”
Section: Viia Healthcarementioning
confidence: 99%
“…These advances on protocol efficiency have motivated the apparition of new applications such as, biometric identification [39]. Typically, ORAMs are designed and used to solve the problem of DB outsourcing [40]. This model would require the user to execute various ORAM primitives so that the remote database is correctly shuffled.…”
Section: Protocol Extensionsmentioning
confidence: 99%