Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security 2019
DOI: 10.1145/3321705.3329800
|View full text |Cite
|
Sign up to set email alerts
|

EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs

Abstract: Nowadays, genomic sequencing has become much more affordable for many people and, thus, many people own their genomic data in a digital format. Having paid for genomic sequencing, they want to make use of their data for different tasks that are possible only using genomics, and they share their data with third parties to achieve these tasks, e.g., to find their relatives in a genomic database. As a consequence, more genomic data get collected worldwide. The upside of the data collection is that unique analyses… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
30
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 38 publications
(30 citation statements)
references
References 37 publications
(95 reference statements)
0
30
0
Order By: Relevance
“…Our threat model is consistent with previous work [19,24]. Client, hospital(s), and the CSP are assumed to be semi-honest, that is, they honestly follow the protocol while trying to learn extra information during the protocol.…”
Section: Threat Modelmentioning
confidence: 97%
See 1 more Smart Citation
“…Our threat model is consistent with previous work [19,24]. Client, hospital(s), and the CSP are assumed to be semi-honest, that is, they honestly follow the protocol while trying to learn extra information during the protocol.…”
Section: Threat Modelmentioning
confidence: 97%
“…Moreover, the encryption algorithm supports identification of case and control groups efficiently, without information leakage. Furthermore, the identification process requires less communication compared with secure multi-party computation-based approaches [24] and less computation compared to homomorphic encryption-based approaches [4]. In general, the execution of privacy-preserving identification of target group of patients can be divided into seven phases: data preprocessing, initialization, key generation, data encryption, client authorization, query generation, identification of case and control groups.…”
Section: Overviewmentioning
confidence: 99%
“…In this setting, each two-party has a string (e.g., genome string) and computes the edit distance between these two strings. There are many research results on approximate edit distance computation (e.g., [30], [69]) since we need costly dynamic programming for exact edit distance computation. We also have results on the extended edit distance computation like weighted edit distance and Needleman-Wunsch distance [70].…”
Section: 2 Privacy-preserving Data Analysismentioning
confidence: 99%
“…It is important to note that by using the outsourcing setting we achieve practical PPIL with security against malicious PPIL clients and malicious PPIL servers, whereas in the client/server setting even solutions with substantially weaker security against a semihonest client currently have impractical runtimes and communication. Furthermore, the outsourcing model with multiple STTPs is widely adopted not only in recent academic papers, e.g., for private machine learning [70,71], and genomic privacy [72,73,74,75,76,77], to name just a few, but also deployed in industrial products, see [78] for a few examples.…”
Section: A Outsourcing Schemementioning
confidence: 99%