Cargando…
Private genome analysis through homomorphic encryption
BACKGROUND: The rapid development of genome sequencing technology allows researchers to access large genome datasets. However, outsourcing the data processing o the cloud poses high risks for personal privacy. The aim of this paper is to give a practical solution for this problem using homomorphic e...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
BioMed Central
2015
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4699052/ https://www.ncbi.nlm.nih.gov/pubmed/26733152 http://dx.doi.org/10.1186/1472-6947-15-S5-S3 |
_version_ | 1782408126371201024 |
---|---|
author | Kim, Miran Lauter, Kristin |
author_facet | Kim, Miran Lauter, Kristin |
author_sort | Kim, Miran |
collection | PubMed |
description | BACKGROUND: The rapid development of genome sequencing technology allows researchers to access large genome datasets. However, outsourcing the data processing o the cloud poses high risks for personal privacy. The aim of this paper is to give a practical solution for this problem using homomorphic encryption. In our approach, all the computations can be performed in an untrusted cloud without requiring the decryption key or any interaction with the data owner, which preserves the privacy of genome data. METHODS: We present evaluation algorithms for secure computation of the minor allele frequencies and χ(2 )statistic in a genome-wide association studies setting. We also describe how to privately compute the Hamming distance and approximate Edit distance between encrypted DNA sequences. Finally, we compare performance details of using two practical homomorphic encryption schemes - the BGV scheme by Gentry, Halevi and Smart and the YASHE scheme by Bos, Lauter, Loftus and Naehrig. RESULTS: The approach with the YASHE scheme analyzes data from 400 people within about 2 seconds and picks a variant associated with disease from 311 spots. For another task, using the BGV scheme, it took about 65 seconds to securely compute the approximate Edit distance for DNA sequences of size 5K and figure out the differences between them. CONCLUSIONS: The performance numbers for BGV are better than YASHE when homomorphically evaluating deep circuits (like the Hamming distance algorithm or approximate Edit distance algorithm). On the other hand, it is more efficient to use the YASHE scheme for a low-degree computation, such as minor allele frequencies or χ(2 )test statistic in a case-control study. |
format | Online Article Text |
id | pubmed-4699052 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2015 |
publisher | BioMed Central |
record_format | MEDLINE/PubMed |
spelling | pubmed-46990522016-01-13 Private genome analysis through homomorphic encryption Kim, Miran Lauter, Kristin BMC Med Inform Decis Mak Proceedings BACKGROUND: The rapid development of genome sequencing technology allows researchers to access large genome datasets. However, outsourcing the data processing o the cloud poses high risks for personal privacy. The aim of this paper is to give a practical solution for this problem using homomorphic encryption. In our approach, all the computations can be performed in an untrusted cloud without requiring the decryption key or any interaction with the data owner, which preserves the privacy of genome data. METHODS: We present evaluation algorithms for secure computation of the minor allele frequencies and χ(2 )statistic in a genome-wide association studies setting. We also describe how to privately compute the Hamming distance and approximate Edit distance between encrypted DNA sequences. Finally, we compare performance details of using two practical homomorphic encryption schemes - the BGV scheme by Gentry, Halevi and Smart and the YASHE scheme by Bos, Lauter, Loftus and Naehrig. RESULTS: The approach with the YASHE scheme analyzes data from 400 people within about 2 seconds and picks a variant associated with disease from 311 spots. For another task, using the BGV scheme, it took about 65 seconds to securely compute the approximate Edit distance for DNA sequences of size 5K and figure out the differences between them. CONCLUSIONS: The performance numbers for BGV are better than YASHE when homomorphically evaluating deep circuits (like the Hamming distance algorithm or approximate Edit distance algorithm). On the other hand, it is more efficient to use the YASHE scheme for a low-degree computation, such as minor allele frequencies or χ(2 )test statistic in a case-control study. BioMed Central 2015-12-21 /pmc/articles/PMC4699052/ /pubmed/26733152 http://dx.doi.org/10.1186/1472-6947-15-S5-S3 Text en Copyright © 2015 Kim and Lauter. http://creativecommons.org/licenses/by/4.0 This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated. |
spellingShingle | Proceedings Kim, Miran Lauter, Kristin Private genome analysis through homomorphic encryption |
title | Private genome analysis through homomorphic encryption |
title_full | Private genome analysis through homomorphic encryption |
title_fullStr | Private genome analysis through homomorphic encryption |
title_full_unstemmed | Private genome analysis through homomorphic encryption |
title_short | Private genome analysis through homomorphic encryption |
title_sort | private genome analysis through homomorphic encryption |
topic | Proceedings |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4699052/ https://www.ncbi.nlm.nih.gov/pubmed/26733152 http://dx.doi.org/10.1186/1472-6947-15-S5-S3 |
work_keys_str_mv | AT kimmiran privategenomeanalysisthroughhomomorphicencryption AT lauterkristin privategenomeanalysisthroughhomomorphicencryption |