scispace - formally typeset
Proceedings ArticleDOI

Privacy-preserving pattern matching over encrypted genetic data in cloud computing

Reads0
Chats0
TLDR
This paper starts from a practical system model of the personalize medicine and presents a solution for the secure DNA sequence matching problem in cloud computing and proves that the scheme is secure under the well-defined cryptographic assumption, i.e., the sub-group decision assumption over a bilinear group.
Abstract
Personalized medicine performs diagnoses and treatments according to the DNA information of the patients. The new paradigm will change the health care model in the future. A doctor will perform the DNA sequence matching instead of the regular clinical laboratory tests to diagnose and medicate the diseases. Additionally, with the help of the affordable personal genomics services such as 23andMe, personalized medicine will be applied to a great population. Cloud computing will be the perfect computing model as the volume of the DNA data and the computation over it are often immense. However, due to the sensitivity, the DNA data should be encrypted before being outsourced into the cloud. In this paper, we start from a practical system model of the personalize medicine and present a solution for the secure DNA sequence matching problem in cloud computing. Comparing with the existing solutions, our scheme protects the DNA data privacy as well as the search pattern to provide a better privacy guarantee. We have proved that our scheme is secure under the well-defined cryptographic assumption, i.e., the sub-group decision assumption over a bilinear group. Unlike the existing interactive schemes, our scheme requires only one round of communication, which is critical in practical application scenarios. We also carry out a simulation study using the real-world DNA data to evaluate the performance of our scheme. The simulation results show that the computation overhead for real world problems is practical, and the communication cost is small. Furthermore, our scheme is not limited to the genome matching problem but it applies to general privacy preserving pattern matching problems which is widely used in real world.

read more

Citations
More filters
Journal ArticleDOI

Privacy-Preserving Tensor Decomposition Over Encrypted Data in a Federated Cloud Environment

TL;DR: This paper presents a novel privacy-preserving tensor decomposition approach over semantically secure encrypted big data and presents the first secure integer division and integer square root schemes over encrypted data.
Journal ArticleDOI

Joint Resource Allocation for Software-Defined Networking, Caching, and Computing

TL;DR: A distributed algorithm is proposed to solve the formulated problem, based on recent advances in alternating direction method of multipliers (ADMM), in which different network nodes only need to solve their own problems without exchange of caching/computing decisions with fast convergence rate.
Journal ArticleDOI

Enabling Trusted and Privacy-Preserving Healthcare Services in Social Media Health Networks

TL;DR: This paper proposes a personalized and trusted healthcare service approach to enable trusted and privacy-preserving healthcare services in social media health networks, which can improve the trustiness between patients and caregivers through authentic ratings toward caregivers and guarantee the patients’ privacy.
Journal ArticleDOI

PPMR: A Privacy-Preserving Online Medical Service Recommendation Scheme in eHealthcare System

TL;DR: This paper proposes two concrete algorithms to compute the similarity and the reputation scores in a privacy-preserving way based on the modified Paillier cryptosystem, truth discovery technology, and the Dirichlet distribution.
Journal ArticleDOI

Blockchain-Enabled Trustworthy Group Communications in UAV Networks

TL;DR: A novel blockchain-based technique to support multi-party authentication to facilitate trustworthy group communications and secure P2P wireless communications and trusted group communication management for UAV networks, while ensuring service efficiency.
References
More filters
Journal ArticleDOI

MapReduce: simplified data processing on large clusters

TL;DR: This paper presents the implementation of MapReduce, a programming model and an associated implementation for processing and generating large data sets that runs on a large cluster of commodity machines and is highly scalable.
Journal ArticleDOI

MapReduce: simplified data processing on large clusters

TL;DR: This presentation explains how the underlying runtime system automatically parallelizes the computation across large-scale clusters of machines, handles machine failures, and schedules inter-machine communication to make efficient use of the network and disks.
Book ChapterDOI

Public-key cryptosystems based on composite degree residuosity classes

TL;DR: A new trapdoor mechanism is proposed and three encryption schemes are derived : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA, which are provably secure under appropriate assumptions in the standard model.
Proceedings ArticleDOI

Fully homomorphic encryption using ideal lattices

TL;DR: This work proposes a fully homomorphic encryption scheme that allows one to evaluate circuits over encrypted data without being able to decrypt, and describes a public key encryption scheme using ideal lattices that is almost bootstrappable.
Proceedings ArticleDOI

Practical techniques for searches on encrypted data

TL;DR: This work describes the cryptographic schemes for the problem of searching on encrypted data and provides proofs of security for the resulting crypto systems, and presents simple, fast, and practical algorithms that are practical to use today.
Related Papers (5)