메뉴 건너뛰기




Volumn 12, Issue 5, 2008, Pages 606-617

A cryptographic approach to securely share and query genomic sequences

Author keywords

Databases; Genomics; Homomorphic encryption; Privacy; Security

Indexed keywords

COMPUTER NETWORKS; DECISION SUPPORT SYSTEMS; INFORMATION MANAGEMENT; NUCLEIC ACIDS;

EID: 51749089052     PISSN: 10897771     EISSN: None     Source Type: Journal    
DOI: 10.1109/TITB.2007.908465     Document Type: Article
Times cited : (113)

References (46)
  • 1
    • 33745145845 scopus 로고    scopus 로고
    • Embracing the complexity of genomic data for personalized medicine
    • May
    • M. West, G. Ginsburg, A. Huang, and J. Nevins, "Embracing the complexity of genomic data for personalized medicine," Genome Res. vol. 16, pp. 559-566, May 2006.
    • (2006) Genome Res , vol.16 , pp. 559-566
    • West, M.1    Ginsburg, G.2    Huang, A.3    Nevins, J.4
  • 2
    • 0033569516 scopus 로고    scopus 로고
    • Pharmacogenomics: Translating functional genomics into rational therapeutics
    • W. Evans and M. Relling, "Pharmacogenomics: Translating functional genomics into rational therapeutics," Science, vol. 286, pp. 487-491, 1999.
    • (1999) Science , vol.286 , pp. 487-491
    • Evans, W.1    Relling, M.2
  • 3
    • 0033760287 scopus 로고    scopus 로고
    • Pharmacogenetics and pharmacogenomics in the discovery and development of medicines
    • A. Roses, "Pharmacogenetics and pharmacogenomics in the discovery and development of medicines," Nature, vol. 38, pp. 815-818, 2000.
    • (2000) Nature , vol.38 , pp. 815-818
    • Roses, A.1
  • 5
    • 25144511843 scopus 로고    scopus 로고
    • Integration of genomic data in electronic health records - Opportunities and dilemmas
    • U. Sax and S. Schmidt, "Integration of genomic data in electronic health records - Opportunities and dilemmas," Methods Inf. Med., vol. 44, pp. 546-550, 2005.
    • (2005) Methods Inf. Med , vol.44 , pp. 546-550
    • Sax, U.1    Schmidt, S.2
  • 6
    • 33644853781 scopus 로고    scopus 로고
    • A call for the creation of personalized medicine databases
    • D. Gurwitz, J. Lunshof, and R. Altman, "A call for the creation of personalized medicine databases," Nature Rev. Drug Discov., vol. 5, no. 1, pp. 23-26, 2006.
    • (2006) Nature Rev. Drug Discov , vol.5 , Issue.1 , pp. 23-26
    • Gurwitz, D.1    Lunshof, J.2    Altman, R.3
  • 7
    • 29144481745 scopus 로고    scopus 로고
    • Medicine's new central bankers
    • Dec, Anonymous
    • Anonymous, "Medicine's new central bankers," The Economist, vol. 377, no. 8456, pp. 28-30, Dec. 2005.
    • (2005) The Economist , vol.377 , Issue.8456 , pp. 28-30
  • 8
    • 36049013728 scopus 로고    scopus 로고
    • Conor (cohort norway) - En oversikt over en unik forskningsdatabank
    • A. Engeland and A. Søgaard, "Conor (cohort norway) - En oversikt over en unik forskningsdatabank," Norsk Epidemiologi, vol. 13, pp. 73-77, 2003.
    • (2003) Norsk Epidemiologi , vol.13 , pp. 73-77
    • Engeland, A.1    Søgaard, A.2
  • 9
    • 0037986737 scopus 로고    scopus 로고
    • UK Biobank: A project in search of a protocol?
    • V. Barbour, "UK Biobank: A project in search of a protocol?," Lancet, vol. 361, pp. 1734-1738, 2003.
    • (2003) Lancet , vol.361 , pp. 1734-1738
    • Barbour, V.1
  • 10
    • 0042855876 scopus 로고    scopus 로고
    • Ethical, legal, and social implications of genomic medicine
    • E. Clayton, "Ethical, legal, and social implications of genomic medicine," New England J. Med., vol. 349, pp. 562-569, 2003.
    • (2003) New England J. Med , vol.349 , pp. 562-569
    • Clayton, E.1
  • 11
    • 0035286694 scopus 로고    scopus 로고
    • Ethical and legal implications of pharmacogenomics
    • M. Rothstein and P. Epps, "Ethical and legal implications of pharmacogenomics," Nature Rev. Genetics, vol. 2, pp. 228-231, 2001.
    • (2001) Nature Rev. Genetics , vol.2 , pp. 228-231
    • Rothstein, M.1    Epps, P.2
  • 12
    • 51749093881 scopus 로고    scopus 로고
    • National Institutes of Health, Request for information (RFI): Proposed policy for sharing of data obtained in NIH supported or conducted genome-wide association studies (GWAS), National Institutes of Health, Bethesda, MD, no. NOT-OD-06-94, Aug. 2006.
    • National Institutes of Health, "Request for information (RFI): Proposed policy for sharing of data obtained in NIH supported or conducted genome-wide association studies (GWAS)," National Institutes of Health, Bethesda, MD, no. NOT-OD-06-94, Aug. 2006.
  • 13
    • 0042734800 scopus 로고    scopus 로고
    • The 'GeneTrustee': A universal identification system that ensures privacy and confidentiality for human genetic databases
    • May
    • L. Burnett, K. Barlow-Stewart, A. Proos, and H. Aizenberg, "The 'GeneTrustee': A universal identification system that ensures privacy and confidentiality for human genetic databases," J. Law Med., vol. 10, no. 4, pp. 506-513, May 2003.
    • (2003) J. Law Med , vol.10 , Issue.4 , pp. 506-513
    • Burnett, L.1    Barlow-Stewart, K.2    Proos, A.3    Aizenberg, H.4
  • 14
    • 0037768626 scopus 로고    scopus 로고
    • Privacy enhancing techniques - The key to secure communication and management of clinical and genomic data
    • G. de Moor, B. Claerhout, and F. de Meyer, "Privacy enhancing techniques - The key to secure communication and management of clinical and genomic data," Methods Inf. Med., vol. 42, no. 2, pp. 148-153, 2003.
    • (2003) Methods Inf. Med , vol.42 , Issue.2 , pp. 148-153
    • de Moor, G.1    Claerhout, B.2    de Meyer, F.3
  • 15
    • 0032966625 scopus 로고    scopus 로고
    • Procedure to protect confidentiality of familial data in community genetics and genomic research
    • D. Gaudet, S. Arsenault, C. Belanger, T. Hudson, P. Perron, M. Bernard, and P. Hamet, "Procedure to protect confidentiality of familial data in community genetics and genomic research," Clin. Genetics, vol. 55, pp. 259-264, 1999.
    • (1999) Clin. Genetics , vol.55 , pp. 259-264
    • Gaudet, D.1    Arsenault, S.2    Belanger, C.3    Hudson, T.4    Perron, P.5    Bernard, M.6    Hamet, P.7
  • 16
    • 0033772930 scopus 로고    scopus 로고
    • Protection of privacy by third-party encryption in genetic research in iceland
    • J. Gulcher, K. Kristjansson, H. Gudbjartsson, and K. Stefansson, "Protection of privacy by third-party encryption in genetic research in iceland," Eur. J. Human Genetics, vol. 8, no. 10, pp. 739-42, 2000.
    • (2000) Eur. J. Human Genetics , vol.8 , Issue.10 , pp. 739-742
    • Gulcher, J.1    Kristjansson, K.2    Gudbjartsson, H.3    Stefansson, K.4
  • 17
  • 18
    • 11144348715 scopus 로고    scopus 로고
    • An evaluation of the current state of genomic data privacy protection technology and a roadmap for the future
    • B. Malin, "An evaluation of the current state of genomic data privacy protection technology and a roadmap for the future," J. Amer. Med. Inf. Assoc., vol. 12, no. 1, pp. 28-34, 2005.
    • (2005) J. Amer. Med. Inf. Assoc , vol.12 , Issue.1 , pp. 28-34
    • Malin, B.1
  • 19
    • 3042849144 scopus 로고    scopus 로고
    • Genomic research and human subject privacy
    • Z. Lin, A. Owen, and R. Altman, "Genomic research and human subject privacy," Science, vol. 305, no. 5681, p. 183, 2004.
    • (2004) Science , vol.305 , Issue.5681 , pp. 183
    • Lin, Z.1    Owen, A.2    Altman, R.3
  • 20
    • 0036357125 scopus 로고    scopus 로고
    • Using binning to maintain confidentiality of medical data
    • San Antonio, TX
    • Z. Lin, M. Hewitt, and R. Altman, "Using binning to maintain confidentiality of medical data," in Proc. Amer. Med. Inf. Assoc. Ann. Symp., San Antonio, TX, 2002, pp. 454-458.
    • (2002) Proc. Amer. Med. Inf. Assoc. Ann. Symp , pp. 454-458
    • Lin, Z.1    Hewitt, M.2    Altman, R.3
  • 21
    • 29244467725 scopus 로고    scopus 로고
    • Protecting genomic sequence anonymity with generalization lattices
    • B. Malin, "Protecting genomic sequence anonymity with generalization lattices," Methods Inf. Med., vol. 44, no. 5, pp. 687-692, 2005.
    • (2005) Methods Inf. Med , vol.44 , Issue.5 , pp. 687-692
    • Malin, B.1
  • 22
    • 0024914229 scopus 로고    scopus 로고
    • N. R. Adam and J. C. Wortmann. (1989, Dec.). Security-control methods for statistical databases: A comparative study. ACM Comput. Surveys [Online]. 21(4), pp. 515-556. Available: http://doi.acm.org/10.1145/76894.76895
    • N. R. Adam and J. C. Wortmann. (1989, Dec.). Security-control methods for statistical databases: A comparative study. ACM Comput. Surveys [Online]. 21(4), pp. 515-556. Available: http://doi.acm.org/10.1145/76894.76895
  • 23
    • 26444497804 scopus 로고    scopus 로고
    • General cryptographic protocols
    • Cambridge, U.K, Cambridge Univ. Press [Online, 2. Available
    • O. Goldreich. (2004). General cryptographic protocols. The Foundations of Cryptography. Cambridge, U.K.: Cambridge Univ. Press [Online]. 2. Available: http://www.wisdom.weizmann.ac.il/oded/PSBookFrag/ prot.ps
    • (2004) The Foundations of Cryptography
    • Goldreich, O.1
  • 25
    • 85034837254 scopus 로고    scopus 로고
    • J. C. Benaloh, Secret sharing homomorphisms: Keeping shares of a secret secret, in Advances in Cryptography, CRYPTO'86: Proceedings (Lecture Notes in Computer Science), 263, A. Odlyzko, Ed. New York: Springer-Verlag, 1986, pp. 251-260.
    • J. C. Benaloh, "Secret sharing homomorphisms: Keeping shares of a secret secret," in Advances in Cryptography, CRYPTO'86: Proceedings (Lecture Notes in Computer Science), vol. 263, A. Odlyzko, Ed. New York: Springer-Verlag, 1986, pp. 251-260.
  • 26
    • 0032218237 scopus 로고    scopus 로고
    • A new public key cryptosystem based on higher residues
    • San Francisco, CA ACM
    • D. Naccache and J. Stern, "A new public key cryptosystem based on higher residues," in Proc. 5th ACM Conf. Comput. Commun. Security San Francisco, CA ACM, 1998, pp. 59-66.
    • (1998) Proc. 5th ACM Conf. Comput. Commun. Security , pp. 59-66
    • Naccache, D.1    Stern, J.2
  • 27
    • 84956852274 scopus 로고    scopus 로고
    • A new public-key cryptosystem as secure as factoring
    • Advances in Cryptology, Eurocrypt '98, New York: Springer-Verlag
    • T. Okamoto and S. Uchiyama, "A new public-key cryptosystem as secure as factoring," in Advances in Cryptology - Eurocrypt '98 (Lecture Notes in Computer Science 1403). New York: Springer-Verlag, 1998, pp. 308-318.
    • (1998) Lecture Notes in Computer Science , vol.1403 , pp. 308-318
    • Okamoto, T.1    Uchiyama, S.2
  • 28
    • 84942550998 scopus 로고    scopus 로고
    • Public key cryptosystems based on composite degree residuosity classes
    • Advances in Cryptology, Proceedings Eurocrypt '99, New York: Springer-Verlag
    • P. Paillier, "Public key cryptosystems based on composite degree residuosity classes," in Advances in Cryptology - Proceedings Eurocrypt '99 (Lecture Notes in Computer Science, no. 1592). New York: Springer-Verlag, 1999, pp. 223-238.
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 29
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Available
    • R. L. Rivest, A. Shamir L. Adleman. (1978). A method for obtaining digital signatures and public-key cryptosystems. CACM [Online]. 21(2), pp. 120-126. Available: http://doi.acm.org/10.1145/ 359340.359342.
    • (1978) CACM [Online] , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 30
    • 51749088711 scopus 로고
    • Data encryption standard (DES)
    • Jan. 22, National Institutes of Standards and Technology, 46-2 [Online, Available
    • Data encryption standard (DES). (1988, Jan. 22). National Institutes of Standards and Technology, Tech. Rep. FIPS PUB 46-2 [Online]. Available: http://www.itl.nist.gov/fipspubs/fip46-2.htm
    • (1988) Tech. Rep. FIPS PUB
  • 31
    • 0003508558 scopus 로고    scopus 로고
    • Advanced encryption standard (AES). National Institute of Standards and Technology
    • Tech. Rep. NIST Special Publication FIPS-197 [Online, Available
    • NIST. (2001). Advanced encryption standard (AES). National Institute of Standards and Technology, Tech. Rep. NIST Special Publication FIPS-197 [Online]. Available: http://csrc.rtist.gov/publications/fips/fips197/ fips-197.pdf.
    • (2001)
  • 32
    • 84976834054 scopus 로고
    • Authentication in distributed systems: Theory and practice
    • B. Lampson, M. Abadi, M. Burrows, and E. Wobber, "Authentication in distributed systems: Theory and practice," ACM Trans. Comput. Syst. vol. 10, pp. 265-310, 1992.
    • (1992) ACM Trans. Comput. Syst , vol.10 , pp. 265-310
    • Lampson, B.1    Abadi, M.2    Burrows, M.3    Wobber, E.4
  • 33
    • 0043067949 scopus 로고    scopus 로고
    • Healthcare teams over the Internet: Programming a certificate-based approach
    • C. Georgiadis, I. Mavridis, and G. Pangalos, "Healthcare teams over the Internet: Programming a certificate-based approach," Int. J. Med. Inf., vol. 70, pp. 161-171, 2003.
    • (2003) Int. J. Med. Inf , vol.70 , pp. 161-171
    • Georgiadis, C.1    Mavridis, I.2    Pangalos, G.3
  • 34
    • 34047125188 scopus 로고    scopus 로고
    • End-to-end security in telemedical networks - A practical guideline
    • F. Wozak, T. Schabetsberger, and E. Ammenwerth, "End-to-end security in telemedical networks - A practical guideline," Int. J. Med. Inf., vol. 76, pp. 484-490, 2007.
    • (2007) Int. J. Med. Inf , vol.76 , pp. 484-490
    • Wozak, F.1    Schabetsberger, T.2    Ammenwerth, E.3
  • 35
    • 33646048350 scopus 로고    scopus 로고
    • Association of polymorphisms in the angiotensin-converting enzyme gene with Alzheimer disease in an Israeli Arab community
    • Y. Meng, C. Baldwin, A. Bowirrat, K. Waraska, R. Inzelberg, R. Friedland, and L. Farrer, "Association of polymorphisms in the angiotensin-converting enzyme gene with Alzheimer disease in an Israeli Arab community," Amer. J. Human Genetics, vol. 78, pp. 871-877, 2006.
    • (2006) Amer. J. Human Genetics , vol.78 , pp. 871-877
    • Meng, Y.1    Baldwin, C.2    Bowirrat, A.3    Waraska, K.4    Inzelberg, R.5    Friedland, R.6    Farrer, L.7
  • 36
    • 0036682101 scopus 로고    scopus 로고
    • Survey and summary: Single nucleotide polymorphism seeking long term association with complex disease
    • B. Kirk, M. Feinsod, R. Favis, R. Kliman, and F. Barany, "Survey and summary: Single nucleotide polymorphism seeking long term association with complex disease," Nucleic Acids Res., vol. 30, pp. 3295-3311, 2002.
    • (2002) Nucleic Acids Res , vol.30 , pp. 3295-3311
    • Kirk, B.1    Feinsod, M.2    Favis, R.3    Kliman, R.4    Barany, F.5
  • 41
    • 0036594903 scopus 로고    scopus 로고
    • New generation pharmacogenomic tools: A SNP linkage disequilibrium map, validated SNP assay resource, and high-throughput instrumentation system for large-scale genetic studies
    • F. de la Vega, D. Dailey, J. Ziegle, J. Williams, D. Madden, and D. Gilbert, "New generation pharmacogenomic tools: A SNP linkage disequilibrium map, validated SNP assay resource, and high-throughput instrumentation system for large-scale genetic studies," Biotechniques, vol. 32, pp. 48-50, 2002.
    • (2002) Biotechniques , vol.32 , pp. 48-50
    • de la Vega, F.1    Dailey, D.2    Ziegle, J.3    Williams, J.4    Madden, D.5    Gilbert, D.6
  • 43
    • 84947403595 scopus 로고
    • Probability inequalities for sums of bounded random variables
    • W. Hoeffding, "Probability inequalities for sums of bounded random variables," J. Amer. Statist. Assoc., vol. 58, pp. 13-30, 1963.
    • (1963) J. Amer. Statist. Assoc , vol.58 , pp. 13-30
    • Hoeffding, W.1
  • 44
    • 84945124606 scopus 로고    scopus 로고
    • Multiparty computation from threshold homomorphic encryption
    • Available
    • R. Cramer, I. Damgård, and J. B. Nielsen. (2001). Multiparty computation from threshold homomorphic encryption. Lecture Notes in Computer Science [Online]. 2045 p. 280 Available: citeseer.ist.psu.edu/article/cramer00multiparty.html
    • (2001) Lecture Notes in Computer Science [Online]. 2045 , pp. 280
    • Cramer, R.1    Damgård, I.2    Nielsen, J.B.3
  • 46
    • 51749114781 scopus 로고
    • Algebraic techniques
    • Cambridge, UX, Cambridge Univ. Press
    • R. Motwani and P. Raghavan, "Algebraic techniques," in Randomized Algorithms. Cambridge, UX.: Cambridge Univ. Press, 1995.
    • (1995) Randomized Algorithms
    • Motwani, R.1    Raghavan, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.