Abstract
Advances in DNA sequencing create new opportunities for the use of DNA data in healthcare for diagnostic and treatment purposes, but also in many other health and well-being services. This brings new challenges with regard to the protection and use of this sensitive data. Thus, special technical means of protection should safeguard critical DNA data and create trust for patients and consumers of lifestyle services. In particular an interesting research challenge is to design secure operations on DNA sequences in the encrypted domain that allow a person to engage into a DNA-based service and obtain required (medical) answers without revealing his/her DNA. We focus in this paper on this topic and present a solution to a particular problem of privacy-preserving matching of DNA sequences which can be used in clinical trials or other DNA services.
This work has been partially funded by the EC via grant agreement no. 611659 for the AU2EU project.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Bjones, R.: Architecture serving complex Identity Infrastructures. Trust in Digital Life, p.21 (2012)
Camenisch, J., Krontiris, I., Lehmann, A., Neven, G., Paquin, C., Rannenberg, K., Zwingelberg, H.: Architecture for Attribute-based Credential Technologies, ABC4Trust, https://abc4trust.eu/index.php/pub/results/107-d21architecturev1
Rissanen, E.: eXtensible Access Control Markup Language (XACML) Version 3.0., OASIS standard (2010), http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-cs-01-en.pdf
IBM Research Zurich, Specification of the Identity Mixer Cryptographic Library Version 2.3.1 (2010)
Fontaine, C., Galand, F.: A Survey of Homomorphic Encryption for Nonspecialists. EURASIP Journal on Information Security (2007)
Damgård, I., Pastro, V., Smart, N., Zakarias, S.: Multiparty Computation from Somewhat Homomorphic Encryption. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 643–662. Springer, Heidelberg (2012)
Finiasz, M., Sendrier, N.: Security Bounds for the Design of Code-Based Cryptosystems. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 88–105. Springer, Heidelberg (2009)
Willems, F.M.J., Shtarkov, Y.M., Tjalkens, T.J.: The Context-Tree Weighting Method: Basic Properties. IEEE Trans. on Information Theory 41(3), 653–664 (1995)
Matsumoto, T., Sadakane, K., Imai, H.: Biological Sequence Compression Algorithms. Genome Informatics Workshop 11, 43–52 (2000)
Troncoso-Pastoriza, J.R., Katzenbeisser, S., Celik, M.: Privacy Preserving Error Resilient DNA Searching Through Oblivious Automata. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007), pp. 519–528. ACM, New York (2007)
Jha, S., Kruger, L., Shmatikov, V.: Towards Practical Privacy for Genomic Computation. In: The 2008 IEEE Symposium on Security and Privacy, May 18-21, pp. 216–230 (2008)
Bruekers, F., Katzenbeisser, S., Kursawe, K., Tuyls, P.: Privacy-Preserving Matching of DNA Profiles, IACR Cryptology ePrint Archive (2008)
Eppstein, D., Goodrich, M.T., Baldi, P.: Privacy-Enhanced Methods for Comparing Compressed DNA Sequences, CoRR abs/1107.3593 (2011)
Adami, C.: Information Theory in Molecular Biology. Physics of Life Reviews 1(1), 3–22 (2004)
Cilibrasi, R., Vitanyi, P.: Clustering by Compression. IEEE Trans. on Information Theory 51(4), 1523–1545 (2005)
Chimpanzee Sequencing and Analysis Consortium, “Initial Sequence of The Chimpanzee Genome and Comparison with the Human Genome”. Nature 437(7055), pp.69–87
De Cristofaro, E., Faber, S., Gasti, P., Tsudik, G.: Genodroid: Are Privacy-Preserving Genomic Tests Ready For Prime Time? In: WPES 2012, pp. 97–108 (2012)
Willems, F.M.J., Nowbahkt-Irani, A., Volf, P.A.J.: Maximum a-Posteriori Tree Models. In: ITG 2002, Berlin, Germany (February 2002)
Cover, T.M., Thomas, J.A.: Elements of Information Theory. 2nd edn. John Wiley and Sons Inc., New York (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 IFIP International Federation for Information Processing
About this paper
Cite this paper
Ignatenko, T., Petković, M. (2014). AU2EU: Privacy-Preserving Matching of DNA Sequences. In: Naccache, D., Sauveron, D. (eds) Information Security Theory and Practice. Securing the Internet of Things. WISTP 2014. Lecture Notes in Computer Science, vol 8501. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43826-8_14
Download citation
DOI: https://doi.org/10.1007/978-3-662-43826-8_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-43825-1
Online ISBN: 978-3-662-43826-8
eBook Packages: Computer ScienceComputer Science (R0)