My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data

An individual’s genetic information is possibly the most valuable personal information. While knowledge of a person’s DNA sequence can facilitate the diagnosis of several heritable diseases and allow personalized treatment, its exposure comes with significant threats to the patient’s privacy. Curren...

Full description

Bibliographic Details
Main Authors: Deuber Dominic, Egger Christoph, Fech Katharina, Malavolta Giulio, Schröder Dominique, Thyagarajan Sri Aravinda Krishnan, Battke Florian, Durand Claudia
Format: Article
Language:English
Published: Sciendo 2019-01-01
Series:Proceedings on Privacy Enhancing Technologies
Subjects:
Online Access:https://doi.org/10.2478/popets-2019-0007
id doaj-36284d3f895743e8bfa99c5b2d175297
record_format Article
spelling doaj-36284d3f895743e8bfa99c5b2d1752972021-09-05T14:01:09ZengSciendoProceedings on Privacy Enhancing Technologies2299-09842019-01-012019110813210.2478/popets-2019-0007popets-2019-0007My Genome Belongs to Me: Controlling Third Party Computation on Genomic DataDeuber Dominic0Egger Christoph1Fech Katharina2Malavolta Giulio3Schröder Dominique4Thyagarajan Sri Aravinda Krishnan5Battke Florian6Durand Claudia7Friedrich-Alexander-Universität Erlangen-NürnbergFriedrich-Alexander-Universität Erlangen-NürnbergFriedrich-Alexander-Universität Erlangen-NürnbergFriedrich-Alexander-Universität Erlangen-NürnbergFriedrich-Alexander-Universität Erlangen-NürnbergFriedrich-Alexander-Universität Erlangen-NürnbergCeGaT GmbHCeGaT GmbHAn individual’s genetic information is possibly the most valuable personal information. While knowledge of a person’s DNA sequence can facilitate the diagnosis of several heritable diseases and allow personalized treatment, its exposure comes with significant threats to the patient’s privacy. Currently known solutions for privacy-respecting computation require the owner of the DNA to either be heavily involved in the execution of a cryptographic protocol or to completely outsource the access control to a third party. This motivates the demand for cryptographic protocols which enable computation over encrypted genomic data while keeping the owner of the genome in full control. We envision a scenario where data owners can exercise arbitrary and dynamic access policies, depending on the intended use of the analysis results and on the credentials of who is conducting the analysis. At the same time, data owners are not required to maintain a local copy of their entire genetic data and do not need to exhaust their computational resources in an expensive cryptographic protocol.https://doi.org/10.2478/popets-2019-0007secure multi-party computationprotocolsdna securitygenome privacy
collection DOAJ
language English
format Article
sources DOAJ
author Deuber Dominic
Egger Christoph
Fech Katharina
Malavolta Giulio
Schröder Dominique
Thyagarajan Sri Aravinda Krishnan
Battke Florian
Durand Claudia
spellingShingle Deuber Dominic
Egger Christoph
Fech Katharina
Malavolta Giulio
Schröder Dominique
Thyagarajan Sri Aravinda Krishnan
Battke Florian
Durand Claudia
My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data
Proceedings on Privacy Enhancing Technologies
secure multi-party computation
protocols
dna security
genome privacy
author_facet Deuber Dominic
Egger Christoph
Fech Katharina
Malavolta Giulio
Schröder Dominique
Thyagarajan Sri Aravinda Krishnan
Battke Florian
Durand Claudia
author_sort Deuber Dominic
title My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data
title_short My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data
title_full My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data
title_fullStr My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data
title_full_unstemmed My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data
title_sort my genome belongs to me: controlling third party computation on genomic data
publisher Sciendo
series Proceedings on Privacy Enhancing Technologies
issn 2299-0984
publishDate 2019-01-01
description An individual’s genetic information is possibly the most valuable personal information. While knowledge of a person’s DNA sequence can facilitate the diagnosis of several heritable diseases and allow personalized treatment, its exposure comes with significant threats to the patient’s privacy. Currently known solutions for privacy-respecting computation require the owner of the DNA to either be heavily involved in the execution of a cryptographic protocol or to completely outsource the access control to a third party. This motivates the demand for cryptographic protocols which enable computation over encrypted genomic data while keeping the owner of the genome in full control. We envision a scenario where data owners can exercise arbitrary and dynamic access policies, depending on the intended use of the analysis results and on the credentials of who is conducting the analysis. At the same time, data owners are not required to maintain a local copy of their entire genetic data and do not need to exhaust their computational resources in an expensive cryptographic protocol.
topic secure multi-party computation
protocols
dna security
genome privacy
url https://doi.org/10.2478/popets-2019-0007
work_keys_str_mv AT deuberdominic mygenomebelongstomecontrollingthirdpartycomputationongenomicdata
AT eggerchristoph mygenomebelongstomecontrollingthirdpartycomputationongenomicdata
AT fechkatharina mygenomebelongstomecontrollingthirdpartycomputationongenomicdata
AT malavoltagiulio mygenomebelongstomecontrollingthirdpartycomputationongenomicdata
AT schroderdominique mygenomebelongstomecontrollingthirdpartycomputationongenomicdata
AT thyagarajansriaravindakrishnan mygenomebelongstomecontrollingthirdpartycomputationongenomicdata
AT battkeflorian mygenomebelongstomecontrollingthirdpartycomputationongenomicdata
AT durandclaudia mygenomebelongstomecontrollingthirdpartycomputationongenomicdata
_version_ 1717810685289693184