Cargando…

Private genome analysis through homomorphic encryption

BACKGROUND: The rapid development of genome sequencing technology allows researchers to access large genome datasets. However, outsourcing the data processing o the cloud poses high risks for personal privacy. The aim of this paper is to give a practical solution for this problem using homomorphic e...

Descripción completa

Detalles Bibliográficos
Autores principales: Kim, Miran, Lauter, Kristin
Formato: Online Artículo Texto
Lenguaje:English
Publicado: BioMed Central 2015
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4699052/
https://www.ncbi.nlm.nih.gov/pubmed/26733152
http://dx.doi.org/10.1186/1472-6947-15-S5-S3
_version_ 1782408126371201024
author Kim, Miran
Lauter, Kristin
author_facet Kim, Miran
Lauter, Kristin
author_sort Kim, Miran
collection PubMed
description BACKGROUND: The rapid development of genome sequencing technology allows researchers to access large genome datasets. However, outsourcing the data processing o the cloud poses high risks for personal privacy. The aim of this paper is to give a practical solution for this problem using homomorphic encryption. In our approach, all the computations can be performed in an untrusted cloud without requiring the decryption key or any interaction with the data owner, which preserves the privacy of genome data. METHODS: We present evaluation algorithms for secure computation of the minor allele frequencies and χ(2 )statistic in a genome-wide association studies setting. We also describe how to privately compute the Hamming distance and approximate Edit distance between encrypted DNA sequences. Finally, we compare performance details of using two practical homomorphic encryption schemes - the BGV scheme by Gentry, Halevi and Smart and the YASHE scheme by Bos, Lauter, Loftus and Naehrig. RESULTS: The approach with the YASHE scheme analyzes data from 400 people within about 2 seconds and picks a variant associated with disease from 311 spots. For another task, using the BGV scheme, it took about 65 seconds to securely compute the approximate Edit distance for DNA sequences of size 5K and figure out the differences between them. CONCLUSIONS: The performance numbers for BGV are better than YASHE when homomorphically evaluating deep circuits (like the Hamming distance algorithm or approximate Edit distance algorithm). On the other hand, it is more efficient to use the YASHE scheme for a low-degree computation, such as minor allele frequencies or χ(2 )test statistic in a case-control study.
format Online
Article
Text
id pubmed-4699052
institution National Center for Biotechnology Information
language English
publishDate 2015
publisher BioMed Central
record_format MEDLINE/PubMed
spelling pubmed-46990522016-01-13 Private genome analysis through homomorphic encryption Kim, Miran Lauter, Kristin BMC Med Inform Decis Mak Proceedings BACKGROUND: The rapid development of genome sequencing technology allows researchers to access large genome datasets. However, outsourcing the data processing o the cloud poses high risks for personal privacy. The aim of this paper is to give a practical solution for this problem using homomorphic encryption. In our approach, all the computations can be performed in an untrusted cloud without requiring the decryption key or any interaction with the data owner, which preserves the privacy of genome data. METHODS: We present evaluation algorithms for secure computation of the minor allele frequencies and χ(2 )statistic in a genome-wide association studies setting. We also describe how to privately compute the Hamming distance and approximate Edit distance between encrypted DNA sequences. Finally, we compare performance details of using two practical homomorphic encryption schemes - the BGV scheme by Gentry, Halevi and Smart and the YASHE scheme by Bos, Lauter, Loftus and Naehrig. RESULTS: The approach with the YASHE scheme analyzes data from 400 people within about 2 seconds and picks a variant associated with disease from 311 spots. For another task, using the BGV scheme, it took about 65 seconds to securely compute the approximate Edit distance for DNA sequences of size 5K and figure out the differences between them. CONCLUSIONS: The performance numbers for BGV are better than YASHE when homomorphically evaluating deep circuits (like the Hamming distance algorithm or approximate Edit distance algorithm). On the other hand, it is more efficient to use the YASHE scheme for a low-degree computation, such as minor allele frequencies or χ(2 )test statistic in a case-control study. BioMed Central 2015-12-21 /pmc/articles/PMC4699052/ /pubmed/26733152 http://dx.doi.org/10.1186/1472-6947-15-S5-S3 Text en Copyright © 2015 Kim and Lauter. http://creativecommons.org/licenses/by/4.0 This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated.
spellingShingle Proceedings
Kim, Miran
Lauter, Kristin
Private genome analysis through homomorphic encryption
title Private genome analysis through homomorphic encryption
title_full Private genome analysis through homomorphic encryption
title_fullStr Private genome analysis through homomorphic encryption
title_full_unstemmed Private genome analysis through homomorphic encryption
title_short Private genome analysis through homomorphic encryption
title_sort private genome analysis through homomorphic encryption
topic Proceedings
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4699052/
https://www.ncbi.nlm.nih.gov/pubmed/26733152
http://dx.doi.org/10.1186/1472-6947-15-S5-S3
work_keys_str_mv AT kimmiran privategenomeanalysisthroughhomomorphicencryption
AT lauterkristin privategenomeanalysisthroughhomomorphicencryption