Skip to main content

Secure Outsourcing of Sequence Comparisons

  • Conference paper
Privacy Enhancing Technologies (PET 2004)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3424))

Included in the following conference series:

Abstract

Large-scale problems in the physical and life sciences are being revolutionized by Internet computing technologies, like grid computing, that make possible the massive cooperative sharing of computational power, bandwidth, storage, and data. A weak computational device, once connected to such a grid, is no longer limited by its slow speed, small amounts of local storage, and limited bandwidth: It can avail itself of the abundance of these resources that is available elsewhere on the network. An impediment to the use of “computational outsourcing” is that the data in question is often sensitive, e.g., of national security importance, or proprietary and containing commercial secrets, or to be kept private for legal requirements such as the HIPAA legislation, Gramm-Leach-Bliley, or similar laws. This motivates the design of techniques for computational outsourcing in a privacy-preserving manner, i.e., without revealing to the remote agents whose computational power is being used, either one’s data or the outcome of the computation on the data. This paper investigates such secure outsourcing for widely applicable sequence comparison problems, and gives an efficient protocol for a customer to securely outsource sequence comparisons to two remote agents, such that the agents learn nothing about the customer’s two private sequences or the result of the comparison. The local computations done by the customer are linear in the size of the sequences, and the computational cost and amount of communication done by the external agents are close to the time complexity of the best known algorithm for solving the problem on a single machine (i.e., quadratic, which is a huge computational burden for the kinds of massive data on which such comparisons are made). The sequence comparison problem considered arises in a large number of applications, including speech recognition, machine vision, and molecular sequence comparisons. In addition, essentially the same protocol can solve a larger class of problems whose standard dynamic programming solutions are similar in structure to the recurrence that subtends the sequence comparison algorithm.

Portions of this work were supported by Grants IIS-0325345, IIS-0219560, IIS-0312357, and IIS-0242421 from the National Science Foundation, Contract N00014-02-1-0364 from the Office of Naval Research, by sponsors of the Center for Education and Research in Information Assurance and Security, and by Purdue Discovery Park’s e-enterprise Center.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Aho, A.V., Hirschberg, D.S., Ullman, J.D.: Bounds on the Complexity of the Longest Common Subsequence Problem. Journal of the ACM 23(1), 1–12 (1976)

    Article  MATH  MathSciNet  Google Scholar 

  2. Atallah, M.J., Kerschbaum, F., Du, W.: Secure and Private Sequence Comparisons. In: Proceedings of 2nd ACM Workshop on Privacy in Electronic Society (2003)

    Google Scholar 

  3. Atallah, M.J., Pantazopoulos, K.N., Rice, J., Spafford, E.H.: Secure Outsourcing of Scientific Computations. Advances in Computers 54(6), 215–272 (2001)

    Google Scholar 

  4. Beguin, P., Quisquater, J.J.: Fast Server-Aided RSA Signatures Secure Against Active Attacks. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 57–69. Springer, Heidelberg (1995)

    Google Scholar 

  5. Cachin, C.: Efficient Private Bidding and Auctions with an Oblivious Third Party. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, pp. 120–127 (1999)

    Google Scholar 

  6. Du, W., Atallah, M.J.: Protocols for Secure Remote Database Access with Approximate Matching. In: Proceedings of the 1st ACM Workshop on Security and Privacy in E-Commerce (2000)

    Google Scholar 

  7. Fischlin, M.: A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 457–471. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  8. Foster, I., Kesselman, C. (eds.): The Grid: Blueprint for a New Computing Infrastructure. Morgan Kaufmann Publishers, San Francisco (1999)

    Google Scholar 

  9. Goldreich, O.: Secure Multi-party Computation (working draft) (2001), Available at http://www.wisdom.weizmann.ac.il/home/oded/public_html/pp.html

  10. Kawamura, S.I., Shimbo, A.: Fast Server-Aided Secret Computation Protocols for Modular Exponentiation. IEEE Journal on Selected Areas in Communications 11(5), 778–784 (1993)

    Article  Google Scholar 

  11. Landau, G., Vishkin, U.: Introducing Efficient Parallelism into Approximate String Matching and a new Serial Algorithm. In: Proceedings of the 18-th ACM STOC, pp. 220–230 (1986)

    Google Scholar 

  12. Lim, C.H., Lee, P.J.: Security and Performance of Server-Aided RSA Computation Protocols. In: CRYPT0 1995, pp. 70–83 (1995)

    Google Scholar 

  13. Martinez, H.M. (ed.): Mathematical and Computational Problems in the Analysis of Molecular Sequences. Bulletin of Mathematical Biology (Special Issue Honoring M. O. Dayhoff), vol. 46(4) (1984)

    Google Scholar 

  14. Masek, W.J., Paterson, M.S.: A Faster Algorithm Computing String Edit Distances. Journal of Computer and System Science 20, 18–31 (1980)

    Article  MATH  MathSciNet  Google Scholar 

  15. Matsumoto, T., Kato, K., Imai, H.: Speeding Up Secret Computations with Insecure Auxiliary Devices. In: CRYPT0 1988, pp. 497–506 (1988)

    Google Scholar 

  16. Naccache, D., Stern, J.: A New Cryptosystem based on Higher Residues. In: Proceedings of the ACM Conference on Computer and Communications Security, vol. 5, pp. 59–66 (1998)

    Google Scholar 

  17. Needleman, S.B., Wunsch, C.D.: A General Method Applicable to the Search for Similarities in the Amino-acid Sequence of Two Proteins. Journal of Molecular Biology 48, 443–453 (1973)

    Article  Google Scholar 

  18. Okamoto, T., Uchiyama, S.: A New Public-Key Cryptosystem as Secure as Factoring. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 308–318. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  19. Pfitzmann, B., Waidner, M.: Attacks on Protocols for Server-Aided RSA Computations. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 153–162. Springer, Heidelberg (1993)

    Chapter  Google Scholar 

  20. Rivest, R.L., Adleman, L., Dertouzos, M.L.: On Data Banks and Privacy Homomorphisms. In: DeMillo, R.A. (ed.) Foundations of Secure Computation, pp. 169–177. Academic Press, London (1978)

    Google Scholar 

  21. Sankoff, D.: Matching Sequences Under Deletion-insertion Constraints. Proceedings of the National Academy of Sciences of the U.S.A. 69, 4–6 (1972)

    Article  MATH  MathSciNet  Google Scholar 

  22. Sankoff, D., Kruskal, J.B. (eds.): Time Warps, String Edits and Macromolecules: The Theory and Practice of Sequence Comparison. Addison-Wesley, Reading (1983)

    Google Scholar 

  23. Schneier, B.: Applied cryptography: protocols, algorithms, and source code in C, 2nd edn. John Wiley & Sons, Inc, Chichester (1995)

    Google Scholar 

  24. Sellers, P.H.: An Algorithm for the Distance between two Finite Sequences. Journal of Combinatorial Theory 16, 253–258 (1974)

    Article  MATH  MathSciNet  Google Scholar 

  25. Sellers, P.H.: The Theory and Computation of Evolutionary Distance: Pattern Recognition. Journal of Algorithms 1, 359–373 (1980)

    Article  MATH  MathSciNet  Google Scholar 

  26. Ukkonen, E.: Finding Approximate Patterns in Strings. Journal of Algorithms 6, 132–137 (1985)

    Article  MATH  MathSciNet  Google Scholar 

  27. Wagner, R.A., Fischer, M.J.: The String to String Correction Problem. Journal of the ACM 21(1), 168–173 (1974)

    Article  MATH  MathSciNet  Google Scholar 

  28. Wong, C.K., Chandra, A.K.: Bounds for the String Editing Problem. Journal of the ACM 23(1), 13–16 (1976)

    Article  MATH  MathSciNet  Google Scholar 

  29. Yao, A.: Protocols for Secure Computations. Proceedings of the Annual IEEE Symposium on Foundations of Computer Science 23, 160–164 (1982)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Atallah, M.J., Li, J. (2005). Secure Outsourcing of Sequence Comparisons. In: Martin, D., Serjantov, A. (eds) Privacy Enhancing Technologies. PET 2004. Lecture Notes in Computer Science, vol 3424. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11423409_5

Download citation

  • DOI: https://doi.org/10.1007/11423409_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-26203-9

  • Online ISBN: 978-3-540-31960-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics