P2GT: Fine-Grained Genomic Data Access Control With Privacy-Preserving Testing in Cloud Computing

被引:3
|
作者
Huang, Qinlong [1 ]
Yue, Wei [1 ]
Yang, Yixian [1 ]
Chen, Lixuan [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
基金
中国国家自然科学基金;
关键词
Genomics; Bioinformatics; Genetics; Testing; Cloud computing; Cryptography; Encryption; Genomic privacy; genetic test; access control; attribute-based encryption; equality test; identity-based encryption; IDENTITY-BASED ENCRYPTION; EQUALITY TEST; CP-ABE; SECRET KEYS; CIPHERTEXTS; EFFICIENT; DEVICES; SCHEME;
D O I
10.1109/TCBB.2021.3063388
中图分类号
Q5 [生物化学];
学科分类号
071010 ; 081704 ;
摘要
With the rapid development of bioinformatics and the availability of genetic sequencing technologies, genomic data has been used to facilitate personalized medicine. Cloud computing, features as low cost, rich storage and rapid processing can precisely respond to the challenges brought by the emergence of massive genomic data. Considering the security of cloud platform and the privacy of genomic data, we first introduce P2GT which utilizes key-policy attribute-based encryption to realize genomic data access control with unbounded attributes, and employs equality test algorithm to achieve personalized medicine test by matching digitized single nucleotide polymorphisms (SNPs) directly on the users' ciphertext without encrypting multiple times. We then propose an enhanced scheme P2GT+, which adopts identity-based encryption with equality test supporting flexible joint authorization to realize privacy-preserving paternity test, genetic compatibility test and disease susceptibility test over the encrypted SNPs with P2GT. We prove the security of proposed schemes and conduct extensive experiments with the 1,000 Genomes dataset. The results show that P2GT and P2GT+ are practical and scalable enough to meet the privacy-preserving and authorized genetic testing requirements in cloud computing.
引用
收藏
页码:2385 / 2398
页数:14
相关论文
共 50 条
  • [41] Fine-grained k-anonymity for privacy preserving in cloud
    Arava, Karuna
    Lingamgunta, Sumalatha
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2019, 23 (04) : 241 - 247
  • [42] Trust-Based and Privacy-Preserving Fine-Grained Data Retrieval Scheme For MSNs
    Oriero, Enahoro
    Rabieh, Khaled
    Mahmoud, Mohamed
    Ismail, Muhammad
    Serpedin, Erchin
    Qaraqe, Khalid
    2016 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, 2016,
  • [43] A fine-grained and lightweight data access control scheme for WSN-integrated cloud computing
    Heng He
    Ji Zhang
    Jinguang Gu
    Yan Hu
    Fangfang Xu
    Cluster Computing, 2017, 20 : 1457 - 1472
  • [44] A fine-grained and lightweight data access control scheme for WSN-integrated cloud computing
    He, Heng
    Zhang, Ji
    Gu, Jinguang
    Hu, Yan
    Xu, Fangfang
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (02): : 1457 - 1472
  • [45] Secure, Efficient and Fine-Grained Data Access Control Mechanism for P2P Storage Cloud
    He, Heng
    Li, Ruixuan
    Dong, Xinhua
    Zhang, Zhao
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2014, 2 (04) : 471 - 484
  • [46] Verifiable and privacy-preserving fine-grained data management in vehicular fog computing: A game theory-based approach
    Zahra Seyedi
    Farhad Rahmati
    Mohammad Ali
    Ximeng Liu
    Peer-to-Peer Networking and Applications, 2024, 17 : 410 - 431
  • [47] PriGenX: Privacy-Preserving Query With Anonymous Access Control for Genomic Data
    Yang, Yaxi
    Weng, Jian
    Tong, Yao
    Liu, Jia-Nan
    Wu, Zhenghao
    Zhang, Leo Yu
    Yang, Anjia
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (02) : 961 - 974
  • [48] Towards a fine-grained access control for Cloud
    Msahli, Mounira
    Chen, Xiuzhen
    Serhrouchni, Ahmed
    2014 IEEE 11TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2014, : 286 - 291
  • [49] Verifiable and privacy-preserving fine-grained data management in vehicular fog computing: A game theory-based approach
    Seyedi, Zahra
    Rahmati, Farhad
    Ali, Mohammad
    Liu, Ximeng
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (01) : 410 - 431
  • [50] Enabling Privacy-Preserving Data Sharing with Bilateral Access Control for Cloud
    Wu, Tong
    Ma, Xiaochen
    Yan, Hailun
    ELECTRONICS, 2023, 12 (23)