2018
DOI: 10.1007/978-3-030-02641-7_4
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Whole-Genome Variant Queries

Abstract: Medical research and treatments rely increasingly on genomic data. Queries on so-called variants are of high importance in, e.g., biomarker identification and general disease association studies. However, the human genome is a very sensitive piece of information that is worth protecting. By observing queries and responses to classical genomic databases, medical conditions can be inferred. The Beacon project is an example of a public genomic querying service, which undermines the privacy of the querier as well … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
4

Relationship

3
5

Authors

Journals

citations
Cited by 13 publications
(13 citation statements)
references
References 38 publications
0
13
0
Order By: Relevance
“…It is important to note that by using the outsourcing setting we achieve practical PPIL with security against malicious PPIL clients and malicious PPIL servers, whereas in the client/server setting even solutions with substantially weaker security against a semihonest client currently have impractical runtimes and communication. Furthermore, the outsourcing model with multiple STTPs is widely adopted not only in recent academic papers, e.g., for private machine learning [70,71], and genomic privacy [72,73,74,75,76,77], to name just a few, but also deployed in industrial products, see [78] for a few examples.…”
Section: A Outsourcing Schemementioning
confidence: 99%
“…It is important to note that by using the outsourcing setting we achieve practical PPIL with security against malicious PPIL clients and malicious PPIL servers, whereas in the client/server setting even solutions with substantially weaker security against a semihonest client currently have impractical runtimes and communication. Furthermore, the outsourcing model with multiple STTPs is widely adopted not only in recent academic papers, e.g., for private machine learning [70,71], and genomic privacy [72,73,74,75,76,77], to name just a few, but also deployed in industrial products, see [78] for a few examples.…”
Section: A Outsourcing Schemementioning
confidence: 99%
“…The privacy of other applications of genomics were also addressed in the literature, e.g., outsourcing of genome data storing [41], pattern matching [43], genome sequence queries [17], and Genome-Wide Association Studies (GWAS) [10,11,15,42], see [33] for a good survey on genomic privacy.…”
Section: Related Workmentioning
confidence: 99%
“…Note that we use the two-server architecture which has been widely used in recent works [11,13,26,28]. We don't use the single-server model due to its difficulty in fulfilling various computation operations in our system while achieving good efficiency and security performances simultaneously.…”
Section: System Modelmentioning
confidence: 99%
“…Privacy-preserving query and analysis over genetic data have received much attention recently. Existing works [7,11,16,33,34,37] deal with genome variant query, pattern matching, range query, count query and statistic information computation over genomic data in a privacy-preserving manner. Secure similar sequence query on genomic data, which is the focus of our research, is a special case of secure query processing on genomic data.…”
Section: Related Workmentioning
confidence: 99%