Skip to main content

Design of Searchable Algorithm for Biological Databased on Homomorphic Encryption

  • Conference paper
  • First Online:
Human Centered Computing (HCC 2019)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11956))

Included in the following conference series:

  • 1408 Accesses

Abstract

With the rapid development of biotechnology, researchers are able to obtain large number of genome data sets. However, biological data often involves high privacy and data security issues. Thus when storing, transferring or analyzing these data, a safe and effective method is highly needed. This paper aims to propose a practical scheme using searchable homomorphic encryption. We combined the inverted index mechanism with the interactive operation on the homomorphic encrypted ciphertext data files, so as to realize the management and protection of biological data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Humbert, M., et al.: Addressing the concerns of the lacks family: quantification of kin genomic privacy. In: ACM SIGSAC Conference on Computer & Communications Security (2013)

    Google Scholar 

  2. Yaniv, E., Arvind, N.: Routes for breaching and protecting genetic privacy. Nat. Rev. Genet. 15(6), 409–421 (2014)

    Article  Google Scholar 

  3. Naveed, M., et al.: Privacy in the Genomic Era. ACM Comput. Surv. 48(1), 1–44 (2015)

    Article  MathSciNet  Google Scholar 

  4. Melissa, G., et al.: Identifying personal genomes by surname inference. Science 339(6117), 321–324 (2013)

    Article  Google Scholar 

  5. Malin, B., Sweeney, L.: How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems. J. Biomed. Inform. 37(3), 179–192 (2004)

    Article  Google Scholar 

  6. Yasuda, M., et al.: Secure pattern matching using somewhat homomorphic encryption. In: ACM Workshop on Cloud Computing Security Workshop (2013)

    Google Scholar 

  7. Naehrig, M., Lauter, K., Vaikuntanathan, V.: Can homomorphic encryption be practical? In: ACM Cloud Computing Security Workshop (2011)

    Google Scholar 

  8. Cheon, J.H., Kim, M., Lauter, K.: Homomorphic computation of edit distance. In: Brenner, M., Christin, N., Johnson, B., Rohloff, K. (eds.) FC 2015. LNCS, vol. 8976. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-48051-9_15

    Chapter  Google Scholar 

  9. Miran, K., Kristin, L.: Private genome analysis through homomorphic encryption. BMC Med. Inform. Decis. Mak. 15(Suppl 5), S3 (2015)

    Google Scholar 

  10. Rivest, R., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 26(2), 96–99 (1978)

    MathSciNet  MATH  Google Scholar 

  11. Gentry, C.: A fully homomorphic encryption scheme (2009)

    Google Scholar 

  12. Gentry, C., Halevi, S., Smart, Nigel P.: Homomorphic evaluation of the AES circuit. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 850–867. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32009-5_49

    Chapter  Google Scholar 

  13. Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE Symposium on Security & Privacy (2002)

    Google Scholar 

  14. Lu, W., Yamada, Y., Sakuma, J.: Efficient secure outsourcing of genome-wide association studies. In: Security & Privacy Workshops (2015)

    Google Scholar 

  15. Ayday, E., Raisaro, J.L., Hengartner, U., Molyneaux, A., Hubaux, J.P.: Privacy-preserving processing of raw genomic data. In: Garcia-Alfaro, J., Lioudakis, G., Cuppens-Boulahia, N., Foley, S., Fitzgerald, W. (eds.) DPM 2013, SETOP 2013. LNCS, vol. 8247. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-54568-9_9

    Chapter  Google Scholar 

  16. Riazi, M.S., et al.: GenMatch: secure DNA compatibility testing. In: IEEE International Symposium on Hardware Oriented Security & Trust (2016)

    Google Scholar 

  17. Simmons, S., Berger, B.: Realizing privacy preserving genome-wide association studies. Bioinformatics 32(9), 1293–1300 (2016)

    Article  Google Scholar 

  18. Bing, W., et al.: Privacy-preserving pattern matching over encrypted genetic data in cloud computing. In: IEEE INFOCOM - IEEE Conference on Computer Communications (2017)

    Google Scholar 

  19. Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442–455. Springer, Heidelberg (2005). https://doi.org/10.1007/11496137_30

    Chapter  Google Scholar 

  20. Curtmola, R., et al.: Searchable symmetric encryption: improved definitions and efficient constructions. In: ACM Conference on Computer & Communications Security (2006)

    Google Scholar 

  21. Lyubashevsky, V., Peikert, C., Regev, O.: On ideal lattices and learning with errors over rings. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13190-5_1

    Chapter  Google Scholar 

  22. Ning, C., et al.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: INFOCOM. IEEE (2011)

    Google Scholar 

  23. Bing, W., et al.: Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: INFOCOM. IEEE (2014)

    Google Scholar 

Download references

Acknowledgments

The research of this article is supported by the national key research and development program “biological information security and efficient transmission” project, project No.2017YFC1201204.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Minglang Yang , Yi Man , Ningning Liu , Yixin Zhang or Xiao Xing .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yang, M., Man, Y., Liu, N., Zhang, Y., Xing, X. (2019). Design of Searchable Algorithm for Biological Databased on Homomorphic Encryption. In: Milošević, D., Tang, Y., Zu, Q. (eds) Human Centered Computing. HCC 2019. Lecture Notes in Computer Science(), vol 11956. Springer, Cham. https://doi.org/10.1007/978-3-030-37429-7_54

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37429-7_54

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37428-0

  • Online ISBN: 978-3-030-37429-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics