2015 IEEE Symposium on Security and Privacy 2015
DOI: 10.1109/sp.2015.34
|View full text |Cite
|
Sign up to set email alerts
|

GenoGuard: Protecting Genomic Data against Brute-Force Attacks

Abstract: Abstract-Secure storage of genomic data is of great and increasing importance. The scientific community's improving ability to interpret individuals' genetic materials and the growing size of genetic database populations have been aggravating the potential consequences of data breaches. The prevalent use of passwords to generate encryption keys thus poses an especially serious problem when applied to genetic data. Weak passwords can jeopardize genetic data in the short term, but given the multidecade lifespan … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
32
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 58 publications
(32 citation statements)
references
References 40 publications
(56 reference statements)
0
32
0
Order By: Relevance
“…Recently, Wang et al proposed private edit distance protocols to find similar patients (e.g., across several hospitals) [4]. To provide secure storage and retrieval of genomic data, Ayday et al proposed techniques for the privacy-preserving storage and retrieval of raw-genomic data [5], and Huang et al proposed a scheme that would guarantee long-term security (in an information-theoretical sense) for genomic data [6].…”
Section: Related Workmentioning
confidence: 99%
“…Recently, Wang et al proposed private edit distance protocols to find similar patients (e.g., across several hospitals) [4]. To provide secure storage and retrieval of genomic data, Ayday et al proposed techniques for the privacy-preserving storage and retrieval of raw-genomic data [5], and Huang et al proposed a scheme that would guarantee long-term security (in an information-theoretical sense) for genomic data [6].…”
Section: Related Workmentioning
confidence: 99%
“…24 Finally, Zhicong Huang and his colleagues developed an information-theoretical technique to securely store genomic data. 25 One last line of investigation has explored the use of cryptography-based techniques such as homomorphic encryption, secure hardware, and secure multiparty computation. 26,27 …”
Section: Cryptography-based Solutionsmentioning
confidence: 99%
“…However, genomic data usually has highly nonuniform probability distributions. The GenoGuard mechanism [1] incorporates the honey encryption concept to provide information-theoretic confidentiality guarantees for encrypted genomic data.…”
Section: Related Workmentioning
confidence: 99%
“…In [1,5,11], a fixed distribution-transforming encoder (DTE) is utilised for encryption and decryption, so it is only suitable for binary bit streams or integer sequences, not for images and videos. Yoon et al [12] propose a visual honey encryption concept which employs an adaptive DTE so that the proposed concept can be applied to more complex domains including images and videos.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation