P2GT: Fine-Grained Genomic Data Access Control With Privacy-Preserving Testing in Cloud Computing

被引:3
|
作者
Huang, Qinlong [1 ]
Yue, Wei [1 ]
Yang, Yixian [1 ]
Chen, Lixuan [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
基金
中国国家自然科学基金;
关键词
Genomics; Bioinformatics; Genetics; Testing; Cloud computing; Cryptography; Encryption; Genomic privacy; genetic test; access control; attribute-based encryption; equality test; identity-based encryption; IDENTITY-BASED ENCRYPTION; EQUALITY TEST; CP-ABE; SECRET KEYS; CIPHERTEXTS; EFFICIENT; DEVICES; SCHEME;
D O I
10.1109/TCBB.2021.3063388
中图分类号
Q5 [生物化学];
学科分类号
071010 ; 081704 ;
摘要
With the rapid development of bioinformatics and the availability of genetic sequencing technologies, genomic data has been used to facilitate personalized medicine. Cloud computing, features as low cost, rich storage and rapid processing can precisely respond to the challenges brought by the emergence of massive genomic data. Considering the security of cloud platform and the privacy of genomic data, we first introduce P2GT which utilizes key-policy attribute-based encryption to realize genomic data access control with unbounded attributes, and employs equality test algorithm to achieve personalized medicine test by matching digitized single nucleotide polymorphisms (SNPs) directly on the users' ciphertext without encrypting multiple times. We then propose an enhanced scheme P2GT+, which adopts identity-based encryption with equality test supporting flexible joint authorization to realize privacy-preserving paternity test, genetic compatibility test and disease susceptibility test over the encrypted SNPs with P2GT. We prove the security of proposed schemes and conduct extensive experiments with the 1,000 Genomes dataset. The results show that P2GT and P2GT+ are practical and scalable enough to meet the privacy-preserving and authorized genetic testing requirements in cloud computing.
引用
收藏
页码:2385 / 2398
页数:14
相关论文
共 50 条
  • [31] Privacy-Preserving Access Control Model for Big Data Cloud
    Fugkeaw, Somchart
    Sato, Hiroyuki
    2015 INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC), 2015, : 130 - 135
  • [32] Privacy-Preserving Data Sharing in Cloud Computing
    王慧
    JournalofComputerScience&Technology, 2010, 25 (03) : 401 - 414
  • [33] Privacy-Preserving Data Sharing in Cloud Computing
    Wang, Hui
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2010, 25 (03) : 401 - 414
  • [34] Privacy-Preserving Data Sharing in Cloud Computing
    Hui Wang
    Journal of Computer Science and Technology, 2010, 25 : 401 - 414
  • [35] Fine-Grained Access Control in the Era of Cloud Computing: An Analytical Review
    Albulayhi, Khalid
    Abuhussein, Abdullah
    Alsubaei, Faisal
    Sheldon, Frederick T.
    2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2020, : 748 - 755
  • [36] Cloud Computing: Preserving Data Privacy and Managing Access Control
    Giweli, Nabil
    Shahrestani, Seyed
    Cheung, Hon
    INNOVATION VISION 2020: SUSTAINABLE GROWTH, ENTREPRENEURSHIP, AND ECONOMIC DEVELOPMENT, VOLS 1-4, 2012, : 1742 - 1748
  • [37] Fine-grained Access Control for Personal Health Records in Cloud Computing
    Li, Wei
    Ni, Wei
    Liu, Dongxi
    Liu, Ren Ping
    Wang, Peishun
    Luo, Shoushan
    2017 IEEE 85TH VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2017,
  • [38] Privacy-Preserving Access to Big Data in the Cloud
    Li, Peng
    Guo, Song
    Miyazaki, Toshiaki
    Xie, Miao
    Hu, Jiankun
    Zhuang, Weihua
    IEEE CLOUD COMPUTING, 2016, 3 (05): : 34 - 42
  • [39] Cloud Data Security Access with Privacy-Preserving
    Wang, Jingyu
    Gu, Ruichun
    2014 5TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2014, : 268 - 271
  • [40] Privacy-Preserving Access Control in Cloud Federations
    Alansari, Shorouq
    Paci, Federica
    Margheri, Andrea
    Sassone, Vladimiro
    2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2017, : 757 - 760