2017
DOI: 10.1186/s12920-017-0276-z
|View full text |Cite
|
Sign up to set email alerts
|

Private queries on encrypted genomic data

Abstract: BackgroundOne of the tasks in the iDASH Secure Genome Analysis Competition in 2016 was to demonstrate the feasibility of privacy-preserving queries on homomorphically encrypted genomic data. More precisely, given a list of up to 100,000 mutations, the task was to encrypt the data using homomorphic encryption in a way that allows it to be stored securely in the cloud, and enables the data owner to query the dataset for the presence of specific mutations, without revealing any information about the dataset or th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
4
1

Relationship

2
7

Authors

Journals

citations
Cited by 33 publications
(21 citation statements)
references
References 24 publications
0
21
0
Order By: Relevance
“…Finally, a secure aggregation over these block-wise Edit distances was applied to approximate the global Edit distance between the sequences. (3) The winning solution of Track 3 from the Microsoft team 42 utilized a technique called permutation-based cuckoo hashing. This method improves the string-matching performance by shortening the strings that need to be homomorphically compared.…”
Section: Discussionmentioning
confidence: 99%
“…Finally, a secure aggregation over these block-wise Edit distances was applied to approximate the global Edit distance between the sequences. (3) The winning solution of Track 3 from the Microsoft team 42 utilized a technique called permutation-based cuckoo hashing. This method improves the string-matching performance by shortening the strings that need to be homomorphically compared.…”
Section: Discussionmentioning
confidence: 99%
“…278 Hence, an alternative is to utilize encryption and then use searchable encryption to extract the information of interest. Various researchers 251,[278][279][280][281][282][283] online, e-health services, patient monitoring, wireless applications, and nursing call centers. 284 In EHR systems, the details of a patient are entered, which are utilized by the doctors for diagnosis of the disease.…”
Section: Encrypted Genomic Datamentioning
confidence: 99%
“…The specific application addressed focuses on filtering information based on homomorphic techniques and the objective is to retrieve medical information without mismatch or other accidental acquisition of sensitive informa-tion [51,19,34,66]. The studies that focused on the application of homomorphic encryption in health care systems include Tang et al [67], Çetin et al [68], Emmanuel et al [22], [23], Bocu and Costache [69], and Wang and Zhang [70]. Some other applications include encryption of biomarkers and other genetic data, especially given that the medical fraternity is moving towards personalized health [71,72,18,73,74].…”
Section: Big Data and Cloud Computingmentioning
confidence: 99%