Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society 2013
DOI: 10.1145/2517840.2517843
|View full text |Cite
|
Sign up to set email alerts
|

Protecting and evaluating genomic privacy in medical tests and personalized medicine

Abstract: In this paper, we propose privacy-enhancing technologies for medical tests and personalized medicine methods that use patients' genomic data. Focusing on genetic diseasesusceptibility tests, we develop a new architecture (between the patient and the medical unit) and propose a "privacypreserving disease susceptibility test" (PDS) by using homomorphic encryption and proxy re-encryption. Assuming the whole genome sequencing to be done by a certified institution, we propose to store patients' genomic data encrypt… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
114
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
4
2
1

Relationship

4
3

Authors

Journals

citations
Cited by 97 publications
(114 citation statements)
references
References 28 publications
0
114
0
Order By: Relevance
“…First of all, upstream protection of genomic data by cryptographic means would dramatically thwart any attempt to deanonymize this data [4]. It has been proposed to use homomorphic encryption and private set intersection for providing personalized medical tests while preserving privacy of genomic data [5,6]. Although encryption of genomic data does not reduce much utility and efficiency in healthcare, such cryptographic techniques probably add too much overhead in genomic research [21].…”
Section: Countermeasuresmentioning
confidence: 99%
See 1 more Smart Citation
“…First of all, upstream protection of genomic data by cryptographic means would dramatically thwart any attempt to deanonymize this data [4]. It has been proposed to use homomorphic encryption and private set intersection for providing personalized medical tests while preserving privacy of genomic data [5,6]. Although encryption of genomic data does not reduce much utility and efficiency in healthcare, such cryptographic techniques probably add too much overhead in genomic research [21].…”
Section: Countermeasuresmentioning
confidence: 99%
“…For instance, the relationship between SNPs and phenotypes is increasingly used in forensics for reconstructing facial composites from DNA information [7,8]. 5 Therefore,…”
Section: Introductionmentioning
confidence: 99%
“…The results are shown in Table II. We use the Zipf's model in [30], where N = 486118, W = 0.037871 and s = 0.905773. For different hair colors known by adversary B , we perform the Bernoulli trials with corresponding P ret on the password pool, and estimate Adv(B ) in Equation (8). We repeat the whole experiment 1000 times for each hair color, and the average results are shown in Figure 12.…”
Section: Tjmentioning
confidence: 99%
“…Baldi et al [10] propose a set of techniques based on private set operations to address genomic privacy in several important applications, namely, paternity tests, personalized medicine, and genetic compatibility tests. Ayday et al [8] introduce a framework that integrates stream ciphers and order-preserving encryption to store and retrieve raw genomic data in a privacy-preserving manner. Researchers also propose to protect privacy in genomic computation by partitioning the computation through program specialization, according to the sensitivity levels of different parts of the genome data [7].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation