skip to main content
10.1145/3603287.3651215acmconferencesArticle/Chapter ViewAbstractPublication Pagesacm-seConference Proceedingsconference-collections
research-article
Open Access

Genomics Cybersecurity Concerns, Challenges, and a Modular Test Lab

Published:27 April 2024Publication History

ABSTRACT

Genomic data has very high value and presents its own cybersecurity challenges and concerns due to its characteristics. In order to effectively secure this valuable genomic data, it is important to understand the life cycle that creates the data, the hardware and software used, the users involved, and the challenges and concerns involved in securing genomic data. Building off of previous work done by the National Institute of Standards and Technology on NIST IR 8432, our team undertook a research review to further understand the state of cybersecurity research in the field. Then, we performed a field study by interviewing specialists and touring facilities at the HudsonAlpha Institute for Biotechnology to gain a further understanding of cybersecurity in practice for real-world genomics labs. Based on our research review and field study with HudsonAlpha, a high-level theoretical biocybersecurity test lab for genomics was designed that mimics a functional genomics lab to allow for cybersecurity testing of new tools and techniques used to protect genomic data, secure devices, and maintain the integrity of genomic data throughout its life cycle. This research can impact cybersecurity for genomic data by providing a research review, a field study, and a high-level biocybersecurity lab design in one place for future work to build off of. This work constitutes a step in taking the challenges presented by cybersecurity for genomics and creating a cybersecurity test lab that can address them.

References

  1. Azenta Life Sciences Blog. 2018. Azenta Life Sciences Blog. Azenta US, Inc. https://www.azenta.com/blog/safe-storage-temperatures-biological-materialsGoogle ScholarGoogle Scholar
  2. Monya Baker. 2015. Irreproducible Biology Research Costs Put at $28 Billion Per Year. Nature (2015). https://doi.org/10.1038/nature.2015.17711Google ScholarGoogle ScholarCross RefCross Ref
  3. CVE1517. 2022. CVE-2022-1517. National Institute of Standards and Technology. https://nvd.nist.gov/vuln/detail/CVE-2022-1517Google ScholarGoogle Scholar
  4. CVE1518. 2022. CVE-2022-1518. National Institute of Standards and Technology. https://nvd.nist.gov/vuln/detail/CVE-2022-1518Google ScholarGoogle Scholar
  5. CVE1519. 2022. CVE-2022-1519. National Institute of Standards and Technology. https://nvd.nist.gov/vuln/detail/CVE-2022-1519Google ScholarGoogle Scholar
  6. CVE1521. 2022. CVE-2022-1521. National Institute of Standards and Technology. https://nvd.nist.gov/vuln/detail/CVE-2022-1521Google ScholarGoogle Scholar
  7. CVE1524. 2022. CVE-2022-1524. National Institute of Standards and Technology. https://nvd.nist.gov/vuln/detail/CVE-2022-1524Google ScholarGoogle Scholar
  8. CVE1966. 2023. CVE-2023-1966. National Institute of Standards and Technology. https://nvd.nist.gov/vuln/detail/CVE-2023-1966Google ScholarGoogle Scholar
  9. CVE1968. 2023. CVE-2023-1968. National Institute of Standards and Technology. https://nvd.nist.gov/vuln/detail/CVE-2023-1968Google ScholarGoogle Scholar
  10. Existing Workflow Systems. 2023. Existing Workflow Systems. Common Workflow Language. https://github.com/common-workflow-language/common-workflow-language/wiki/Existing-Workflow-systemsGoogle ScholarGoogle Scholar
  11. Genomic Data Science Fact Sheet. 2022. Genomic Data Science Fact Sheet. National Institutes of Health National Human Genome Research Institute. https://www.genome.gov/about-genomics/fact-sheets/Genomic-Data-ScienceGoogle ScholarGoogle Scholar
  12. Genomic Data Sharing Expectations by NIH Institute and Center. 2023. Genomic Data Sharing Expectations by NIH Institute and Center. National Institutes of Health. https://sharing.nih.gov/genomic-data-sharing-policy/about-genomic-data-sharing/gds-policy-expectations-by-nih-institute-and-centerGoogle ScholarGoogle Scholar
  13. Ben Langmead and Abhinav Nellore. 2018. Cloud Computing for Genomic Data Analysis and Collaboration. Nature Reviews Genetics 19, 4 (2018), 208--219. https://doi.org/10.1038/nrg.2017.113Google ScholarGoogle ScholarCross RefCross Ref
  14. National Vulnerability Database. [n.d.]. National Vulnerability Database. National Institute of Standards and Technology. https://nvd.nist.gov/vuln/searchGoogle ScholarGoogle Scholar
  15. Peter Ney, Karl Koscher, Lee Organick, Luis Ceze, and Tadayoshi Kohno. 2017. Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and More. In Proceedings of the 26th USENIX Conference on Security Symposium (SEC'17). USENIX Association, Vancouver, Canada, 765--779.Google ScholarGoogle Scholar
  16. NIH NHGRI Data Sharing Policies and Expectations. 2023. NIH NHGRI Data Sharing Policies and Expectations. National Institutes of Health National Human Genome Research Institute. https://www.genome.gov/about-nhgri/Policies-Guidance/Data-Sharing-Policies-and-ExpectationsGoogle ScholarGoogle Scholar
  17. Privacy in Genomics. 2021. Privacy in Genomics. National Institutes of Health National Human Genome Research Institute. https://www.genome.gov/about-genomics/policy-issues/PrivacyGoogle ScholarGoogle Scholar
  18. Ronald Pulivarti, Natalia Martin, Fred Byers, Justin Wagner, Justin Zook, Samantha Maragh, Kevin Wilson, Martin Wojtyniak, Brett Kreider, Ann-Marie France, Sallie Edwards, Tommy Morris, Jared Sheldon, Scott Ross, and Phillip Whitlow. 2023. Cybersecurity of Genomic Data. Technical Report NIST Internal Report (IR) 8432. National Institute of Standards and Technology, Gaithersburg, MD. https://doi.org/10.6028/NIST.IR.8432Google ScholarGoogle Scholar
  19. Keerthi Rangan. 2022. Why Data Erasure Is Crucial to Protect Sensitive Information. G2. www.g2.com/articles/data-erasureGoogle ScholarGoogle Scholar
  20. Garret Schumacher, Sterling Sawaya, Demetrius Nelson, and Aaron Hansen. 2020. Genetic Information Insecurity as State of the Art. Frontiers in Bioengeering and Biotechnology 8 (2020). https://doi.org/10.3389/fbioe.2020.591980Google ScholarGoogle ScholarCross RefCross Ref
  21. Tomoya Tanjo, Yosuke Kawai, Katsushi Tokunaga, Osamu Ogasawara, and Masao Nagasaki. 2021. Practical Guide for Managing Large-Scale Human Genome Data in Research. Journal of Human Genetics 66 (2021), 39--52. https://doi.org/10.1038/s10038-020-00862-1Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Genomics Cybersecurity Concerns, Challenges, and a Modular Test Lab

                  Recommendations

                  Comments

                  Login options

                  Check if you have access through your login credentials or your institution to get full access on this article.

                  Sign in
                  • Published in

                    cover image ACM Conferences
                    ACM SE '24: Proceedings of the 2024 ACM Southeast Conference
                    April 2024
                    337 pages
                    ISBN:9798400702372
                    DOI:10.1145/3603287

                    Copyright © 2024 Owner/Author

                    This work is licensed under a Creative Commons Attribution International 4.0 License.

                    Publisher

                    Association for Computing Machinery

                    New York, NY, United States

                    Publication History

                    • Published: 27 April 2024

                    Check for updates

                    Qualifiers

                    • research-article
                    • Research
                    • Refereed limited

                    Acceptance Rates

                    ACM SE '24 Paper Acceptance Rate44of137submissions,32%Overall Acceptance Rate178of377submissions,47%
                  • Article Metrics

                    • Downloads (Last 12 months)38
                    • Downloads (Last 6 weeks)38

                    Other Metrics

                  PDF Format

                  View or Download as a PDF file.

                  PDF

                  eReader

                  View online with eReader.

                  eReader