Proceedings ArticleDOI
Privacy-preserving pattern matching over encrypted genetic data in cloud computing
Bing Wang,Wei Song,Wenjing Lou,Y. Thomas Hou +3 more
- pp 1-9
Reads0
Chats0
TLDR
This paper starts from a practical system model of the personalize medicine and presents a solution for the secure DNA sequence matching problem in cloud computing and proves that the scheme is secure under the well-defined cryptographic assumption, i.e., the sub-group decision assumption over a bilinear group.Abstract:
Personalized medicine performs diagnoses and treatments according to the DNA information of the patients. The new paradigm will change the health care model in the future. A doctor will perform the DNA sequence matching instead of the regular clinical laboratory tests to diagnose and medicate the diseases. Additionally, with the help of the affordable personal genomics services such as 23andMe, personalized medicine will be applied to a great population. Cloud computing will be the perfect computing model as the volume of the DNA data and the computation over it are often immense. However, due to the sensitivity, the DNA data should be encrypted before being outsourced into the cloud. In this paper, we start from a practical system model of the personalize medicine and present a solution for the secure DNA sequence matching problem in cloud computing. Comparing with the existing solutions, our scheme protects the DNA data privacy as well as the search pattern to provide a better privacy guarantee. We have proved that our scheme is secure under the well-defined cryptographic assumption, i.e., the sub-group decision assumption over a bilinear group. Unlike the existing interactive schemes, our scheme requires only one round of communication, which is critical in practical application scenarios. We also carry out a simulation study using the real-world DNA data to evaluate the performance of our scheme. The simulation results show that the computation overhead for real world problems is practical, and the communication cost is small. Furthermore, our scheme is not limited to the genome matching problem but it applies to general privacy preserving pattern matching problems which is widely used in real world.read more
Citations
More filters
Journal ArticleDOI
Privacy-Preserving Tensor Decomposition Over Encrypted Data in a Federated Cloud Environment
TL;DR: This paper presents a novel privacy-preserving tensor decomposition approach over semantically secure encrypted big data and presents the first secure integer division and integer square root schemes over encrypted data.
Journal ArticleDOI
Joint Resource Allocation for Software-Defined Networking, Caching, and Computing
TL;DR: A distributed algorithm is proposed to solve the formulated problem, based on recent advances in alternating direction method of multipliers (ADMM), in which different network nodes only need to solve their own problems without exchange of caching/computing decisions with fast convergence rate.
Journal ArticleDOI
Enabling Trusted and Privacy-Preserving Healthcare Services in Social Media Health Networks
Wenjuan Tang,Ju Ren,Yaoxue Zhang +2 more
TL;DR: This paper proposes a personalized and trusted healthcare service approach to enable trusted and privacy-preserving healthcare services in social media health networks, which can improve the trustiness between patients and caregivers through authentic ratings toward caregivers and guarantee the patients’ privacy.
Journal ArticleDOI
PPMR: A Privacy-Preserving Online Medical Service Recommendation Scheme in eHealthcare System
TL;DR: This paper proposes two concrete algorithms to compute the similarity and the reputation scores in a privacy-preserving way based on the modified Paillier cryptosystem, truth discovery technology, and the Dirichlet distribution.
Journal ArticleDOI
Blockchain-Enabled Trustworthy Group Communications in UAV Networks
TL;DR: A novel blockchain-based technique to support multi-party authentication to facilitate trustworthy group communications and secure P2P wireless communications and trusted group communication management for UAV networks, while ensuring service efficiency.
References
More filters
Journal ArticleDOI
MapReduce: simplified data processing on large clusters
Jeffrey Dean,Sanjay Ghemawat +1 more
TL;DR: This paper presents the implementation of MapReduce, a programming model and an associated implementation for processing and generating large data sets that runs on a large cluster of commodity machines and is highly scalable.
Journal ArticleDOI
MapReduce: simplified data processing on large clusters
Jeffrey Dean,Sanjay Ghemawat +1 more
TL;DR: This presentation explains how the underlying runtime system automatically parallelizes the computation across large-scale clusters of machines, handles machine failures, and schedules inter-machine communication to make efficient use of the network and disks.
Book ChapterDOI
Public-key cryptosystems based on composite degree residuosity classes
TL;DR: A new trapdoor mechanism is proposed and three encryption schemes are derived : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA, which are provably secure under appropriate assumptions in the standard model.
Proceedings ArticleDOI
Fully homomorphic encryption using ideal lattices
TL;DR: This work proposes a fully homomorphic encryption scheme that allows one to evaluate circuits over encrypted data without being able to decrypt, and describes a public key encryption scheme using ideal lattices that is almost bootstrappable.
Proceedings ArticleDOI
Practical techniques for searches on encrypted data
TL;DR: This work describes the cryptographic schemes for the problem of searching on encrypted data and provides proofs of security for the resulting crypto systems, and presents simple, fast, and practical algorithms that are practical to use today.