Protecting genomic data analytics in the cloud: state of the art and opportunities

被引:0
|
作者
Haixu Tang
Xiaoqian Jiang
Xiaofeng Wang
Shuang Wang
Heidi Sofia
Dov Fox
Kristin Lauter
Bradley Malin
Amalio Telenti
Li Xiong
Lucila Ohno-Machado
机构
[1] Indiana University,School of Informatics and Computing
[2] University of California San Diego,Department of Biomedical Informatics
[3] National Human Genome Research Institute,School of Law
[4] University of San Diego,Department of Biomedical Informatics, School of Medicine
[5] Microsoft Research,Department of Mathematics and Computer Science
[6] Vanderbilt University,undefined
[7] The J. Craig Venter Institute,undefined
[8] Emory University,undefined
来源
关键词
Edit Distance; Data Owner; Public Cloud; Cryptographic Protocol; Homomorphic Encryption;
D O I
暂无
中图分类号
学科分类号
摘要
The outsourcing of genomic data into public cloud computing settings raises concerns over privacy and security. Significant advancements in secure computation methods have emerged over the past several years, but such techniques need to be rigorously evaluated for their ability to support the analysis of human genomic data in an efficient and cost-effective manner. With respect to public cloud environments, there are concerns about the inadvertent exposure of human genomic data to unauthorized users. In analyses involving multiple institutions, there is additional concern about data being used beyond agreed research scope and being prcoessed in untrused computational environments, which may not satisfy institutional policies. To systematically investigate these issues, the NIH-funded National Center for Biomedical Computing iDASH (integrating Data for Analysis, ‘anonymization’ and SHaring) hosted the second Critical Assessment of Data Privacy and Protection competition to assess the capacity of cryptographic technologies for protecting computation over human genomes in the cloud and promoting cross-institutional collaboration. Data scientists were challenged to design and engineer practical algorithms for secure outsourcing of genome computation tasks in working software, whereby analyses are performed only on encrypted data. They were also challenged to develop approaches to enable secure collaboration on data from genomic studies generated by multiple organizations (e.g., medical centers) to jointly compute aggregate statistics without sharing individual-level records. The results of the competition indicated that secure computation techniques can enable comparative analysis of human genomes, but greater efficiency (in terms of compute time and memory utilization) are needed before they are sufficiently practical for real world environments.
引用
收藏
相关论文
共 50 条
  • [21] Security in Cloud Computing: State-of-the-Art, Key Features, Challenges, and Opportunities
    Tubaishat, Abdallah
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 311 - 315
  • [22] Data Analytics Opportunities in a Smarter Planet
    Dietrich, Brenda
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2012, 5 (12): : 1697 - 1697
  • [23] Data analytics in auditing: Opportunities and challenges
    Earley, Christine E.
    BUSINESS HORIZONS, 2015, 58 (05) : 493 - 500
  • [24] Video Big Data Analytics in the Cloud: A Reference Architecture, Survey, Opportunities, and Open Research Issues
    Alam, Aftab
    Ullah, Irfan
    Lee, Young-Koo
    IEEE ACCESS, 2020, 8 : 152377 - 152422
  • [25] Big Data Analytics for Genomic Medicine
    He, Karen Y.
    Ge, Dongliang
    He, Max M.
    INTERNATIONAL JOURNAL OF MOLECULAR SCIENCES, 2017, 18 (02)
  • [26] Efficient Data Analytics Over Cloud
    Gupta, Rajeev
    Gupta, Himanshu
    Mohania, Mukesh
    ADVANCES IN COMPUTERS, VOL 90: CONNECTED COMPUTING ENVIRONMENT, 2013, 90 : 367 - 401
  • [27] Data analytics and cloud computing technologies
    Hart's E and P, 2021, 96 (04): : 48 - 49
  • [28] Serverless Data Analytics in the IBM Cloud
    Sampe, Josep
    Vernik, Gil
    Sanchez-Artigas, Marc
    Garcia-Lopez, Pedro
    MIDDLEWARE INDUSTRY'18: PROCEEDINGS OF THE 2018 ACM/IFIP/USENIX MIDDLEWARE CONFERENCE (INDUSTRIAL TRACK), 2018, : 1 - 8
  • [29] Protecting data in an age of cloud and virtualisation
    Preston W.C.
    Computer Fraud and Security, 2019, 2019 (03): : 14 - 15
  • [30] Data Stream Analytics and Mining in the Cloud
    Ari, Ismail
    Olmezogullari, Erdi
    Celebi, Omer Faruk
    2012 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2012,