2014
DOI: 10.1016/j.procs.2014.08.073
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Threat Modeling for Emerging BiobankClouds

Abstract: There is an increased amount of data produced by next generation sequencing (NGS) machines which demand scalable storage and analysis of genomic data. In order to cope with this huge amount of information, many biobanks are interested in cloud computing capabilities such as on-demand elasticity of computing power and storage capacity. There are several security and privacy requirements mandated by personal data protection legislation which hinder biobanks from migrating big data generated by the NGS machines. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
3
1

Relationship

5
3

Authors

Journals

citations
Cited by 14 publications
(13 citation statements)
references
References 9 publications
0
13
0
Order By: Relevance
“…The system allows defining different roles with different access privileges. In designing the system, we applied the Cloud Privacy Threat Modeling [15] approach to identify the privacy requirements of processing sensitive biomedical data. This model implements a data management policy that aligns with the European data protection directive.…”
Section: Security Modelmentioning
confidence: 99%
“…The system allows defining different roles with different access privileges. In designing the system, we applied the Cloud Privacy Threat Modeling [15] approach to identify the privacy requirements of processing sensitive biomedical data. This model implements a data management policy that aligns with the European data protection directive.…”
Section: Security Modelmentioning
confidence: 99%
“…In [55], the design and implementation of a security framework for BiobankCloud, a platform that supports the secure storage and processing of genomic data in cloud computing environments, has been discussed. The proposed framework is built on the cloud privacy threat modeling approach [54,56] which is used to define the privacy threat model for processing next-generation sequencing data according to the DPD [2]. This solution includes a flexible two-factor authentication and an RBAC access control mechanism, in addition to auditing mechanisms to ensure that the requirements of the DPD are fulfilled.…”
Section: Privacy-preserving Big Data Solutions In the Cloudmentioning
confidence: 99%
“…In the privacy regulatory compliance step, learning sessions with privacy experts, end-users and requirements engineers facilitates the elicitation of privacy requirements (PR). For example, in the EU DPD some of the privacy requirements are: lawfulness, informed consent, purpose binding, transparency, data minimization, data accuracy, data security, and accountability [6]. Each of the requirements that are identified will be labeled with an identifier, e.g., (PRi), name and description to be used in later stages.…”
Section: Privacy Regulatory Compliancementioning
confidence: 99%