My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data
An individual’s genetic information is possibly the most valuable personal information. While knowledge of a person’s DNA sequence can facilitate the diagnosis of several heritable diseases and allow personalized treatment, its exposure comes with significant threats to the patient’s privacy. Curren...
Main Authors: | , , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Sciendo
2019-01-01
|
Series: | Proceedings on Privacy Enhancing Technologies |
Subjects: | |
Online Access: | https://doi.org/10.2478/popets-2019-0007 |
id |
doaj-36284d3f895743e8bfa99c5b2d175297 |
---|---|
record_format |
Article |
spelling |
doaj-36284d3f895743e8bfa99c5b2d1752972021-09-05T14:01:09ZengSciendoProceedings on Privacy Enhancing Technologies2299-09842019-01-012019110813210.2478/popets-2019-0007popets-2019-0007My Genome Belongs to Me: Controlling Third Party Computation on Genomic DataDeuber Dominic0Egger Christoph1Fech Katharina2Malavolta Giulio3Schröder Dominique4Thyagarajan Sri Aravinda Krishnan5Battke Florian6Durand Claudia7Friedrich-Alexander-Universität Erlangen-NürnbergFriedrich-Alexander-Universität Erlangen-NürnbergFriedrich-Alexander-Universität Erlangen-NürnbergFriedrich-Alexander-Universität Erlangen-NürnbergFriedrich-Alexander-Universität Erlangen-NürnbergFriedrich-Alexander-Universität Erlangen-NürnbergCeGaT GmbHCeGaT GmbHAn individual’s genetic information is possibly the most valuable personal information. While knowledge of a person’s DNA sequence can facilitate the diagnosis of several heritable diseases and allow personalized treatment, its exposure comes with significant threats to the patient’s privacy. Currently known solutions for privacy-respecting computation require the owner of the DNA to either be heavily involved in the execution of a cryptographic protocol or to completely outsource the access control to a third party. This motivates the demand for cryptographic protocols which enable computation over encrypted genomic data while keeping the owner of the genome in full control. We envision a scenario where data owners can exercise arbitrary and dynamic access policies, depending on the intended use of the analysis results and on the credentials of who is conducting the analysis. At the same time, data owners are not required to maintain a local copy of their entire genetic data and do not need to exhaust their computational resources in an expensive cryptographic protocol.https://doi.org/10.2478/popets-2019-0007secure multi-party computationprotocolsdna securitygenome privacy |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Deuber Dominic Egger Christoph Fech Katharina Malavolta Giulio Schröder Dominique Thyagarajan Sri Aravinda Krishnan Battke Florian Durand Claudia |
spellingShingle |
Deuber Dominic Egger Christoph Fech Katharina Malavolta Giulio Schröder Dominique Thyagarajan Sri Aravinda Krishnan Battke Florian Durand Claudia My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data Proceedings on Privacy Enhancing Technologies secure multi-party computation protocols dna security genome privacy |
author_facet |
Deuber Dominic Egger Christoph Fech Katharina Malavolta Giulio Schröder Dominique Thyagarajan Sri Aravinda Krishnan Battke Florian Durand Claudia |
author_sort |
Deuber Dominic |
title |
My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data |
title_short |
My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data |
title_full |
My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data |
title_fullStr |
My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data |
title_full_unstemmed |
My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data |
title_sort |
my genome belongs to me: controlling third party computation on genomic data |
publisher |
Sciendo |
series |
Proceedings on Privacy Enhancing Technologies |
issn |
2299-0984 |
publishDate |
2019-01-01 |
description |
An individual’s genetic information is possibly the most valuable personal information. While knowledge of a person’s DNA sequence can facilitate the diagnosis of several heritable diseases and allow personalized treatment, its exposure comes with significant threats to the patient’s privacy. Currently known solutions for privacy-respecting computation require the owner of the DNA to either be heavily involved in the execution of a cryptographic protocol or to completely outsource the access control to a third party. This motivates the demand for cryptographic protocols which enable computation over encrypted genomic data while keeping the owner of the genome in full control. We envision a scenario where data owners can exercise arbitrary and dynamic access policies, depending on the intended use of the analysis results and on the credentials of who is conducting the analysis. At the same time, data owners are not required to maintain a local copy of their entire genetic data and do not need to exhaust their computational resources in an expensive cryptographic protocol. |
topic |
secure multi-party computation protocols dna security genome privacy |
url |
https://doi.org/10.2478/popets-2019-0007 |
work_keys_str_mv |
AT deuberdominic mygenomebelongstomecontrollingthirdpartycomputationongenomicdata AT eggerchristoph mygenomebelongstomecontrollingthirdpartycomputationongenomicdata AT fechkatharina mygenomebelongstomecontrollingthirdpartycomputationongenomicdata AT malavoltagiulio mygenomebelongstomecontrollingthirdpartycomputationongenomicdata AT schroderdominique mygenomebelongstomecontrollingthirdpartycomputationongenomicdata AT thyagarajansriaravindakrishnan mygenomebelongstomecontrollingthirdpartycomputationongenomicdata AT battkeflorian mygenomebelongstomecontrollingthirdpartycomputationongenomicdata AT durandclaudia mygenomebelongstomecontrollingthirdpartycomputationongenomicdata |
_version_ |
1717810685289693184 |