skip to main content
10.1145/2517840.2517849acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Secure genomic testing with size- and position-hiding private substring matching

Published:04 November 2013Publication History

ABSTRACT

Recent progress in genomics and bioinformatics is bringing complete and on-demand sequencing of human (and other) genomes closer and closer to reality. Despite exciting new opportunities, affordable and ubiquitous genome sequencing prompts some serious privacy and ethical concerns, owing to extreme sensitivity and uniqueness of genomic information. At the same time, new medical applications, such as personalized medicine, require testing genomes for specific markers that themselves represent sensitive (e.g., proprietary) material. This paper focuses on privacy challenges posed by such genetic tests. It presents a secure and efficient protocol called: Size- and Position-Hiding Private Substring Match- ing (SPH-PSM). This protocol allows two parties -- one with a digitized genome and the other with a set of DNA markers -- to conduct a test, such that the result is only learned by the former, and no other information is learned by either party. In particular, the genome owner does not even learn the size or the position of the markers, which makes SPH-PSM the first of its kind. Finally, we report on a prototype of the proposed technique which attests to its practicality.

References

  1. A. Abbott. Special section on human genetics: With your genes' Take one of these, three times a day. Nature, 425(6960), 2003.Google ScholarGoogle Scholar
  2. G. Ateniese, E. De Cristofaro, and G. Tsudik. (If) Size Matters: Size-Hiding Private Set Intersection. In PKC, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. E. Ayday, E. De Cristofaro, J.-P. Hubaux, and G. Tsudik. The Chills and Thrills of Whole Genome Sequencing. ArXiv Report 1306.1264, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  4. E. Ayday, M. Humbert, J. Fellay, P. J. McLaren, J. Rougemont, J. L. Raisaro, A. Telenti, and J.-P. Hubaux. Privacy-Enhancing Technologies for Medical Tests Using Genomic Data. https://documents.epfl.ch/users/a/ay/ayday/www/erman_publications/genomic_privacy.pdf, 2012.Google ScholarGoogle Scholar
  5. P. Baldi, R. Baronio, E. De Cristofaro, P. Gasti, and G. Tsudik. Countering GATTACA: Efficient and Secure Testing of Fully-Sequenced Human Genomes. In CCS, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Baron, K. El Defrawy, K. Minkovich, R. Ostrovsky, and E. Tressler. 5pm: Secure pattern matching. In SCN, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Blanton and M. Aliasgari. Secure outsourcing of dna searching via finite automata. In DBSec, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. E. Blass, R. D. Pietro, R. Molva, and M. Onen. PRISM: Privacy-Preserving Searches in MapReduce. In PETS, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. F. Bruekers, S. Katzenbeisser, K. Kursawe, and P. Tuyls. Privacy-Preserving Matching of DNA Profiles. http://eprint.iacr.org/2008/203, 2008.Google ScholarGoogle Scholar
  10. A. Burke. Foundation Medicine: Personalizing Cancer Drugs. http://is.gd/foundation_medicine, 2012.Google ScholarGoogle Scholar
  11. M. Canim, M. Kantarcioglu, and B. Malin. Secure Management of Biomedical Data With Cryptographic Hardware. IEEE Transactions on Information Technology in Biomedicine, 16(1), 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. B. Carlson. SNPs -- A shortcut to personalized medicine. Genetic Engineering & Biotechnology News, 2008.Google ScholarGoogle Scholar
  13. A. Cavoukian. Privacy by design. 2009. http://www.ontla.on.ca/library/repository/mon/23002/289982.pdf.Google ScholarGoogle Scholar
  14. Y. Chen, B. Peng, X. Wang, and H. Tang. Large-Scale Privacy-Preserving Mapping of Human Genomic Sequences on Hybrid Clouds. In NDSS, 2012.Google ScholarGoogle Scholar
  15. B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. Private information retrieval. In FOCS. IEEE, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. F. Collins and V. McKusick. Implications of the Human Genome Project for medical science. Jama, 285(5), 2001.Google ScholarGoogle Scholar
  17. I. Damgård and M. Jurik. A generalisation, a simplification and some applications of Paillier's probabilistic public-key system. In PKC, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  18. E. De Cristofaro, S. Faber, P. Gasti, and G. Tsudik. GenoDroid: Are Privacy-Preserving Genomic Tests Ready for Prime Time? In WPES, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Y. Desmedt and Y. Frankel. Threshold cryptosystems. In CRYPTO, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE transactions on Information Theory, 31(4), 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. P.-A. Fouque and D. Pointcheval. Threshold cryptosystems secure against chosen-ciphertext attacks. In ASIACRYPT, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. M. Franz, B. Deiseroth, K. Hamacher, S. Jha, S. Katzenbeisser, and H. Schröder. Towards secure bioinformatics services (short paper). Financial Cryptography and Data Security, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. M. Freedman, K. Nissim, and B. Pinkas. Efficient private matching and set intersection. In EUROCRYPT, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  24. R. Gennaro, C. Hazay, and J. Sorensen. Text Search Protocols with Simulation Based Security. In PKC, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Genomics Law Report. Patenting and Personal Genomics: 23andMe Receives its First Patent, and Plenty of Questions. http://preview.tinyurl.com/7ebpft9, 2012.Google ScholarGoogle Scholar
  26. Genomics Law Report. Some Thoughts on Myriad After the Supreme Court Argument. http://preview.tinyurl.com/bqy25wz, 2012.Google ScholarGoogle Scholar
  27. G. Ginsburg and H. Willard. Genomic and personalized medicine: foundations and applications. Translational Research, 154(6), 2009.Google ScholarGoogle Scholar
  28. GMP. http://gmplib.org/.Google ScholarGoogle Scholar
  29. D. Greenbaum, A. Sboner, X. Mu, and M. Gerstein. Genomics and privacy: Implications of the new reality of closed data for the field. PLoS Computational Biology, 7(12), 2011.Google ScholarGoogle Scholar
  30. M. Gymrek, A. L. McGuire, D. Golan, E. Halperin, and Y. Erlich. Identifying personal genomes by surname inference. Science, 339(6117):321--324, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  31. C. Hazay and Y. Lindell. Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In TCC, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. C. Hazay and T. Toft. Computationally secure pattern matching in the presence of malicious adversaries. ASIACRYPT, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  33. N. Homer et al. Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays. PLoS Genetics, 4(8), 2008.Google ScholarGoogle Scholar
  34. L. Hood and D. Galas. P4 Medicine: Personalized, Predictive, Preventive, Participatory A Change of View that Changes Everything. http://www.cra.org/ccc/docs/init/P4_Medicine.pdf, 2009.Google ScholarGoogle Scholar
  35. Y. Ishai and A. Paskin. Evaluating branching programs on encrypted data. In TCC, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. S. Jha, L. Kruger, and V. Shmatikov. Towards practical privacy for genomic computation. In S&P, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. M. Kantarcioglu, W. Jiang, Y. Liu, and B. Malin. A Cryptographic Approach to Securely Share and Query Genomic Sequences. IEEE Transactions on Information Technology in Biomedicine, 12(5):606--617, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. J. Katz and J. Malka. Secure text processing with applications to private dna matching. In CCS, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Y. Lindell, K. Nissim, and C. Orlandi. Hiding the Input-Size in Secure Two-Party Computation. http://eprint.iacr.org/2012/679, 2012.Google ScholarGoogle Scholar
  40. B. Malin. An evaluation of the current state of genomic data privacy protection technology and a roadmap for the future. Journal of the American Medical Informatics Association, 12(1), 2005.Google ScholarGoogle ScholarCross RefCross Ref
  41. T. Mayberry, E.-O. Blass, and A. H. Chan. PIRMAP: Efficient Private information Retrieval for MapReduce. In FC, 2013.Google ScholarGoogle Scholar
  42. National Center for Biotechnology Information (US). Single Nucleotide Polymorphism Database. http://www.ncbi.nlm.nih.gov/projects/SNP/.Google ScholarGoogle Scholar
  43. T. Okamoto and S. Uchiyama. A new public-key cryptosystem as secure as factoring. In EUROCRYPT, 1998.Google ScholarGoogle ScholarCross RefCross Ref
  44. OpenSSL. http://www.openssl.org/.Google ScholarGoogle Scholar
  45. P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. A. Pollack. Justices Consider Whether Patents on Genes Are Valid. http://nyti.ms/XB7Tf9, 2013.Google ScholarGoogle Scholar
  47. A. Prat and J. Baselga. The role of hormonal therapy in the management of hormonal-receptor-positive breast cancer with co-expression of her2. Nature Clinical Practice Oncology, 5(9), 2008.Google ScholarGoogle Scholar
  48. Presidential Commission for the Study of Bioethical Issues. PRIVACY and PROGRESS in Whole Genome Sequencing. http://www.bioethics.gov/cms/sites/default/files/PrivacyProgress508.pdf, 2012.Google ScholarGoogle Scholar
  49. S. Sankararaman, G. Obozinski, M. Jordan, and E. Halperin. Genomic privacy and limits of individual detection in a pool. Nature Genetics, 41(9), 2009.Google ScholarGoogle Scholar
  50. P. Stenson et al. The human gene mutation database: 2008 update. Genome Medicine, 1(1), 2009.Google ScholarGoogle Scholar
  51. J. Troncoso-Pastoriza, S. Katzenbeisser, and M. Celik. Privacy preserving error resilient dna searching through oblivious automata. In CCS, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. O. Ugus, D. Westhoff, R. Laue, A. Shoufan, and S. A. Huss. Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks. arXiv preprint 0903.3900, 2009.Google ScholarGoogle Scholar
  53. R. Wang et al. Learning your identity and disease from research papers: information leaks in Genome Wide Association Study. In CCS, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. R. Wang, X. Wang, Z. Li, H. Tang, M. Reiter, and Z. Dong. Privacy-preserving genomic computation through program specialization. In CCS, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. R. Wolf. Justices rule human genes cannot be patented. http://www.usatoday.com/story/news/nation/2013/06/13/supreme-court-gene-breast-ovarian-cancer-patent/2382053/, 2013.Google ScholarGoogle Scholar
  56. S. Young. Knome Software Makes Sense of the Genome. http://www.technologyreview.com/news/428179/knome-software-makes-sense-of-the-genome/, 2012.Google ScholarGoogle Scholar
  57. X. Zhou, B. Peng, Y. Li, Y. Chen, H. Tang, and X. Wang. To Release Or Not To Release: Evaluating Information Leaks in Aggregate Human-Genome Data. In ESORICS, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Secure genomic testing with size- and position-hiding private substring matching

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      WPES '13: Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
      November 2013
      306 pages
      ISBN:9781450324854
      DOI:10.1145/2517840
      • General Chair:
      • Ahmad-Reza Sadeghi,
      • Program Chair:
      • Sara Foresti

      Copyright © 2013 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 4 November 2013

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      WPES '13 Paper Acceptance Rate30of103submissions,29%Overall Acceptance Rate106of355submissions,30%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader