skip to main content
10.1145/2517840.2517843acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Protecting and evaluating genomic privacy in medical tests and personalized medicine

Published:04 November 2013Publication History

ABSTRACT

In this paper, we propose privacy-enhancing technologies for medical tests and personalized medicine methods that use patients' genomic data. Focusing on genetic disease-susceptibility tests, we develop a new architecture (between the patient and the medical unit) and propose a "privacy-preserving disease susceptibility test" (PDS) by using homomorphic encryption and proxy re-encryption. Assuming the whole genome sequencing to be done by a certified institution, we propose to store patients' genomic data encrypted by their public keys at a "storage and processing unit" (SPU). Our proposed solution lets the medical unit retrieve the encrypted genomic data from the SPU and process it for medical tests and personalized medicine methods, while preserving the privacy of patients' genomic data. We also quantify the genomic privacy of a patient (from the medical unit's point of view) and show how a patient's genomic privacy decreases with the genetic tests he undergoes due to (i) the nature of the genetic test, and (ii) the characteristics of the genomic data. Furthermore, we show how basic policies and obfuscation methods help to keep the genomic privacy of a patient at a high level. We also implement and show, via a complexity analysis, the practicality of PDS.

References

  1. http://articles.washingtonpost.com/2012-06-02/national/35462326_1_data-breaches-medical-data-social-security-numbers.Google ScholarGoogle Scholar
  2. http://www.eupedia.com/genetics/medical_dna_test.shtml.Google ScholarGoogle Scholar
  3. http://www.ncbi.nlm.nih.gov/projects/SNP/.Google ScholarGoogle Scholar
  4. http://www.ncbi.nlm.nih.gov/projects/SNP/snp_ind.cgi?ind_id=10.Google ScholarGoogle Scholar
  5. E. Ashley, A. Butte, M. Wheeler, R.Chen, and T. Klein. Clinical assessment incorporating a personal genome. The Lancet, 375(9725):1525--1535, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  6. G. Ateniese, K. Fu, M. Green, and S. Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Transactions on Information and System Security, 9:1--30, Feb. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. E. Ayday, E. D. Cristofaro, G. Tsudik, and J. P. Hubaux. The chills and thrills of whole genome sequencing. arXiv:1306.1264, 2013.Google ScholarGoogle Scholar
  8. E. Ayday, J. L. Raisaro, U. Hengartner, A. Molyneaux, and J. P. Hubaux. Privacy-preserving processing of raw genomic data. Proceedings of DPM International Workshop on Data Privacy Management, 2013.Google ScholarGoogle Scholar
  9. E. Ayday, J. L. Raisaro, P. J. McLaren, J. Fellay, and J. P. Hubaux. Privacy-preserving computation of disease risk by using genomic, clinical, and environmental data. Proceedings of USENIX Security Workshop on Health Information Technologies, 2013.Google ScholarGoogle Scholar
  10. P. Baldi, R. Baronio, E. De Cristofaro, P. Gasti, and G. Tsudik. Countering GATTACA: Efficient and secure testing of fully-sequenced human genomes. Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. Barrett, B. Fry, J. Maller, and M. Daly. Haploview: Analysis and visualization of LD and haplotype maps. Bioinformatics 21, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. Blanton and M. Aliasgari. Secure outsourcing of DNA searching via finite automata. Proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, pages 49--64, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. E. Bresson, D. Catalano, and D. Pointcheval. A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications. Proceedings of Asiacrypt, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  14. F. Bruekers, S. Katzenbeisser, K. Kursawe, and P. Tuyls. Privacy-preserving matching of DNA profiles. Technical report, 2008.Google ScholarGoogle Scholar
  15. M. Canim, M. Kantarcioglu, and B. Malin. Secure management of biomedical data with cryptographic hardware. IEEE Transactions on Information Technology in Biomedicine, 16(1), 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. Cavoukian. Privacy by design. 2009. http://www.ontla.on.ca/library/repository/mon/23002/289982.pdf.Google ScholarGoogle Scholar
  17. Y. Chen, B. Peng, X. Wang, and H. Tang. Large-scale privacy-preserving mapping of human genomic sequences on hybrid clouds. Proceeding of the 19th Network and Distributed System Security Symposium, 2012.Google ScholarGoogle Scholar
  18. Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, I. Lagendijk, and T. Toft. Privacy-preserving face recognition. Proceedings of the 9th International Symposium on Privacy Enhancing Technologies, pages 235--253, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. D. S. Falconer and T. F. Mackay. Introduction to Quantitative Genetics (4th Edition). Addison Wesley Longman, Harlow, Essex, UK, 1996.Google ScholarGoogle Scholar
  20. S. E. Fienberg, A. Slavkovic, and C. Uhler. Privacy preserving GWAS data sharing. Proceedings of the IEEE 11th International Conference on Data Mining Workshops, Dec. 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. Gymrek, A. L. McGuire, D. Golan, E. Halperin, and Y. Erlich. Identifying personal genomes by surname inference. Science: 339 (6117), pages 321--324, Jan. 2013.Google ScholarGoogle Scholar
  22. N. Homer, S. Szelinger, M. Redman, D. Duggan, and W. Tembe. Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays. PLoS Genetics, 4, Aug. 2008.Google ScholarGoogle ScholarCross RefCross Ref
  23. S. Jha, L. Kruger, and V. Shmatikov. Towards practical privacy for genomic computation. Proceedings of the 2008 IEEE Symposium on Security and Privacy, pages 216--230, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. A. Johnson, R. Handsaker, S. Pulit, M. Nizzari, C. O'Donnell, and P. de Bakker. SNAP: A web-based tool for identification and annotation of proxy SNPs using HapMap. Bioinformatics 24(24):2938--2939, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. A. D. Johnson and C. J. O'Donnell. An open access database of genome-wide association results. BMC Medical Genetics 10:6, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  26. M. Kantarcioglu, W. Jiang, Y. Liu, and B. Malin. A cryptographic approach to securely share and query genomic sequences. IEEE Transactions on Information Technology in Biomedicine, 12(5):606--617, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. S. Kathiresan, O. Melander, D. Anevski, C. Guiducci, and N. Burtt. Polymorphisms associated with cholesterol and risk of cardiovascular events. The New England Journal of Medicine, 358:1240--1249, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  28. B. Malin and L. Sweeney. How (not) to protect genomic data privacy in a distributed network: Using trail re-identification to evaluate and design anonymity protection systems. Journal of Biomedical Informatics, 37:179--192, Jun. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. S. Marcellin, D. Zighed, and G. Ritschard. An asymmetric entropy measure for decision trees. Proceedings of International Conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems, pages 1292--1299, 2006.Google ScholarGoogle Scholar
  30. M. Rotger and phet al. Contribution of genetic background, traditional risk factors and HIV-related factors to coronary artery disease events in HIV-positive persons. Clinical Infectious Diseases, Mar. 2013.Google ScholarGoogle Scholar
  31. A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. Proceedings of Privacy Enhancing Technologies Symposium, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. J. R. Troncoso-Pastoriza, S. Katzenbeisser, and M. Celik. Privacy preserving error resilient DNA searching through oblivious automata. Proceedings of the 14th ACM Conference on Computer and Communications Security, pages 519--528, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. R. Wang, Y. F. Li, X. Wang, H. Tang, and X. Zhou. Learning your identity and disease from research papers: Information leaks in genome wide association study. Proceedings of the 16th ACM Conference on Computer and Communications Security, pages 534--544, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. R. Wang, X. Wang, Z. Li, H. Tang, M. K. Reiter, and Z. Dong. Privacy-preserving genomic computation through program specialization. Proceedings of the 16th ACM Conference on Computer and Communications Security, pages 338--347, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. X. Zhou, B. Peng, Y. F. Li, Y. Chen, H. Tang, and X. Wang. To release or not to release: Evaluating information leaks in aggregate human-genome data. Proceedings of the 16th European Conference on Research in Computer Security, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Protecting and evaluating genomic privacy in medical tests and personalized medicine

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            WPES '13: Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
            November 2013
            306 pages
            ISBN:9781450324854
            DOI:10.1145/2517840
            • General Chair:
            • Ahmad-Reza Sadeghi,
            • Program Chair:
            • Sara Foresti

            Copyright © 2013 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 4 November 2013

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            WPES '13 Paper Acceptance Rate30of103submissions,29%Overall Acceptance Rate106of355submissions,30%

            Upcoming Conference

            CCS '24
            ACM SIGSAC Conference on Computer and Communications Security
            October 14 - 18, 2024
            Salt Lake City , UT , USA

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader