메뉴 건너뛰기




Volumn 56, Issue , 2015, Pages 103-111

Privacy preserving processing of genomic data: A survey

Author keywords

Genomics; Privacy; Security

Indexed keywords

GENES;

EID: 84938567282     PISSN: 15320464     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jbi.2015.05.022     Document Type: Review
Times cited : (68)

References (51)
  • 1
    • 0042360195 scopus 로고    scopus 로고
    • Welcome to the genomic era
    • pMID: 12954750
    • Guttmacher A.E., Collins F.S. Welcome to the genomic era. N. Engl. J. Med. 2003, 349(10):996-998. pMID: 12954750. 10.1056/NEJMe038132.
    • (2003) N. Engl. J. Med. , vol.349 , Issue.10 , pp. 996-998
    • Guttmacher, A.E.1    Collins, F.S.2
  • 2
    • 84889059821 scopus 로고    scopus 로고
    • Identifying participants in the personal genome project by name (A re-identification experiment)
    • CoRR abs/1304.7605
    • L. Sweeney, A. Abu, J. Winn, Identifying participants in the personal genome project by name (A re-identification experiment), CoRR abs/1304.7605, 2013.
    • (2013)
    • Sweeney, L.1    Abu, A.2    Winn, J.3
  • 3
    • 84872459720 scopus 로고    scopus 로고
    • Identifying personal genomes by surname inference
    • Gymrek M., McGuire A.L., Golan D., Halperin E., Erlich Y. Identifying personal genomes by surname inference. Science 2013, 339(6117):321-324.
    • (2013) Science , vol.339 , Issue.6117 , pp. 321-324
    • Gymrek, M.1    McGuire, A.L.2    Golan, D.3    Halperin, E.4    Erlich, Y.5
  • 4
    • 11144348715 scopus 로고    scopus 로고
    • Technical evaluation: an evaluation of the current state of genomic data privacy protection technology and a roadmap for the future
    • Malin B.A. Technical evaluation: an evaluation of the current state of genomic data privacy protection technology and a roadmap for the future. JAMIA 2005, 12(1):28-34.
    • (2005) JAMIA , vol.12 , Issue.1 , pp. 28-34
    • Malin, B.A.1
  • 5
    • 84901005679 scopus 로고    scopus 로고
    • Routes for breaching and protecting genetic privacy
    • Erlich Y., Narayanan A. Routes for breaching and protecting genetic privacy. Nat. Rev. Genet. 2014.
    • (2014) Nat. Rev. Genet.
    • Erlich, Y.1    Narayanan, A.2
  • 9
    • 84867119898 scopus 로고    scopus 로고
    • Integrative genomics viewer (IGV): high-performance genomics data visualization and exploration
    • Thorvaldsdóttir H., Robinson J.T., Mesirov J.P. Integrative genomics viewer (IGV): high-performance genomics data visualization and exploration. Briefings Bioinform. 2012.
    • (2012) Briefings Bioinform.
    • Thorvaldsdóttir, H.1    Robinson, J.T.2    Mesirov, J.P.3
  • 10
  • 11
    • 84938669384 scopus 로고    scopus 로고
    • Large-scale privacy-preserving mapping of human genomic sequences on hybrid clouds
    • in: NDSS
    • Y. Chen, B. Peng, X. Wang, H. Tang, Large-scale privacy-preserving mapping of human genomic sequences on hybrid clouds, in: NDSS, 2012.
    • (2012)
    • Chen, Y.1    Peng, B.2    Wang, X.3    Tang, H.4
  • 12
    • 0042960934 scopus 로고    scopus 로고
    • Fast and practical approximate string matching
    • Baeza-Yates R.A., Perleberg C.H. Fast and practical approximate string matching. Inf. Process. Lett. 1996, 59(1):21-27.
    • (1996) Inf. Process. Lett. , vol.59 , Issue.1 , pp. 21-27
    • Baeza-Yates, R.A.1    Perleberg, C.H.2
  • 13
    • 84902319149 scopus 로고    scopus 로고
    • Privacy-Enhancing Technologies for Medical Tests Using Genomic Data
    • E. Ayday, J.L. Raisaro, J.-P. Hubaux, Privacy-Enhancing Technologies for Medical Tests Using Genomic Data, Tech. rep., 2012.
    • (2012) Tech. rep
    • Ayday, E.1    Raisaro, J.L.2    Hubaux, J.-P.3
  • 14
    • 85025126688 scopus 로고    scopus 로고
    • Privacy-preserving computation of disease risk by using genomic, clinical, and environmental data
    • in: Proceedings of USENIX Security Workshop on Health Information Technologies (HealthTech '13)
    • E. Ayday, J.L. Raisaro, M. Laren, P. Jack, J. Fellay, J.-P. Hubaux, Privacy-preserving computation of disease risk by using genomic, clinical, and environmental data, in: Proceedings of USENIX Security Workshop on Health Information Technologies (HealthTech '13), 2013.
    • (2013)
    • Ayday, E.1    Raisaro, J.L.2    Laren, M.3    Jack, P.4    Fellay, J.5    Hubaux, J.-P.6
  • 15
    • 85184289761 scopus 로고    scopus 로고
    • Personal use of the genomic data: privacy vs. storage cost
    • in: IEEE Global Communications Conference, Exhibition and Industry Forum GLOBECOM
    • E. Ayday, J.L. Raisaro, J.-P. Hubaux, Personal use of the genomic data: privacy vs. storage cost, in: IEEE Global Communications Conference, Exhibition and Industry Forum GLOBECOM, 2013.
    • (2013)
    • Ayday, E.1    Raisaro, J.L.2    Hubaux, J.-P.3
  • 16
    • 70449627419 scopus 로고    scopus 로고
    • The mastermind attack on genomic data
    • in: 30th IEEE Symposium on Security and Privacy
    • M. Goodrich, The mastermind attack on genomic data, in: 30th IEEE Symposium on Security and Privacy, 2009, pp. 204-218.
    • (2009) , pp. 204-218
    • Goodrich, M.1
  • 17
    • 1642327704 scopus 로고    scopus 로고
    • Secure and private sequence comparisons
    • ACM, New York, NY, USA, Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society
    • Atallah M.J., Kerschbaum F., Du W. Secure and private sequence comparisons. WPES '03 2003, 39-44. ACM, New York, NY, USA. 10.1145/1005140.1005147.
    • (2003) WPES '03 , pp. 39-44
    • Atallah, M.J.1    Kerschbaum, F.2    Du, W.3
  • 18
    • 50249177701 scopus 로고    scopus 로고
    • Towards practical privacy for genomic computation
    • in: IEEE Symposium on Security and Privacy, 2008, SP 2008
    • S. Jha, L. Kruger, V. Shmatikov, Towards practical privacy for genomic computation, in: IEEE Symposium on Security and Privacy, 2008, SP 2008, 2008, pp. 216-230. doi:10.1109/SP.2008.34.
    • (2008) , pp. 216-230
    • Jha, S.1    Kruger, L.2    Shmatikov, V.3
  • 19
    • 85129493630 scopus 로고    scopus 로고
    • Toward a practical data privacy scheme for a distributed implementation of the smith-waterman genome sequence comparison algorithm
    • in: Proceedings of the Network and Distributed System Security Symposium, NDSS 2006, San Diego, California, USA
    • D. Szajda, M. Pohl, J. Owen, B.G. Lawson, Toward a practical data privacy scheme for a distributed implementation of the smith-waterman genome sequence comparison algorithm, in: Proceedings of the Network and Distributed System Security Symposium, NDSS 2006, San Diego, California, USA, 2006.
    • (2006)
    • Szajda, D.1    Pohl, M.2    Owen, J.3    Lawson, B.G.4
  • 20
    • 74049087814 scopus 로고    scopus 로고
    • Privacy-preserving genomic computation through program specialization
    • ACM, New York, NY, USA, Proceedings of the 16th ACM Conference on Computer and Communications Security
    • Wang R., Wang X., Li Z., Tang H., Reiter M.K., Dong Z. Privacy-preserving genomic computation through program specialization. CCS '09 2009, 338-347. ACM, New York, NY, USA.
    • (2009) CCS '09 , pp. 338-347
    • Wang, R.1    Wang, X.2    Li, Z.3    Tang, H.4    Reiter, M.K.5    Dong, Z.6
  • 21
    • 57049083569 scopus 로고    scopus 로고
    • Privacy preserving error resilient dna searching through oblivious automata
    • ACM, New York, NY, USA, Proceedings of the 14th ACM Conference on Computer and Communications Security
    • Troncoso-Pastoriza J.R., Katzenbeisser S., Celik M. Privacy preserving error resilient dna searching through oblivious automata. CCS '07 2007, 519-528. ACM, New York, NY, USA.
    • (2007) CCS '07 , pp. 519-528
    • Troncoso-Pastoriza, J.R.1    Katzenbeisser, S.2    Celik, M.3
  • 22
    • 77958487669 scopus 로고    scopus 로고
    • Secure outsourcing of dna searching via finite automata
    • Springer-Verlag, Berlin, Heidelberg, Proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy
    • Blanton M., Aliasgari M. Secure outsourcing of dna searching via finite automata. DBSec'10 2010, 49-64. Springer-Verlag, Berlin, Heidelberg.
    • (2010) DBSec'10 , pp. 49-64
    • Blanton, M.1    Aliasgari, M.2
  • 23
    • 77958496068 scopus 로고    scopus 로고
    • Privacy-Preserving Matching of DNA Profiles
    • Cryptology ePrint Archive, Report 2008/203
    • F. Bruekers, S. Katzenbeisser, K. Kursawe, P. Tuyls, Privacy-Preserving Matching of DNA Profiles, Cryptology ePrint Archive, Report 2008/203, 2008.
    • (2008)
    • Bruekers, F.1    Katzenbeisser, S.2    Kursawe, K.3    Tuyls, P.4
  • 24
    • 84893299015 scopus 로고    scopus 로고
    • Privacy-enhanced methods for comparing compressed dna sequences
    • CoRR abs/1107.3593
    • D. Eppstein, M.T. Goodrich, P. Baldi, Privacy-enhanced methods for comparing compressed dna sequences, CoRR abs/1107.3593, 2011.
    • (2011)
    • Eppstein, D.1    Goodrich, M.T.2    Baldi, P.3
  • 25
    • 78650575522 scopus 로고    scopus 로고
    • Straggler identification in round-trip data streams via newton's identities and invertible bloom filters
    • Eppstein D., Goodrich M.T. Straggler identification in round-trip data streams via newton's identities and invertible bloom filters. IEEE Trans. Knowl. Data Eng. 2011, 23(2):297-306.
    • (2011) IEEE Trans. Knowl. Data Eng. , vol.23 , Issue.2 , pp. 297-306
    • Eppstein, D.1    Goodrich, M.T.2
  • 26
    • 84857084485 scopus 로고    scopus 로고
    • Towards secure bioinformatics services (short paper)
    • Springer-Verlag, Berlin, Heidelberg, Proceedings of the 15th International Conference on Financial Cryptography and Data Security
    • Franz M., Deiseroth B., Hamacher K., Jha S., Katzenbeisser S., Schröder H. Towards secure bioinformatics services (short paper). FC'11 2012, 276-283. Springer-Verlag, Berlin, Heidelberg.
    • (2012) FC'11 , pp. 276-283
    • Franz, M.1    Deiseroth, B.2    Hamacher, K.3    Jha, S.4    Katzenbeisser, S.5    Schröder, H.6
  • 27
    • 0031743421 scopus 로고    scopus 로고
    • Profile hidden Markov models
    • Eddy S.R. Profile hidden Markov models. Bioinformatics 1998, 14(9):755-763.
    • (1998) Bioinformatics , vol.14 , Issue.9 , pp. 755-763
    • Eddy, S.R.1
  • 28
    • 80755143980 scopus 로고    scopus 로고
    • Countering Gattaca: efficient and secure testing of fully-sequenced human genomes
    • ACM, New York, NY, USA, Proceedings of the 18th ACM Conference on Computer and Communications Security
    • Baldi P., Baronio R., De Cristofaro E., Gasti P., Tsudik G. Countering Gattaca: efficient and secure testing of fully-sequenced human genomes. CCS '11 2011, 691-702. ACM, New York, NY, USA.
    • (2011) CCS '11 , pp. 691-702
    • Baldi, P.1    Baronio, R.2    De Cristofaro, E.3    Gasti, P.4    Tsudik, G.5
  • 29
    • 84869161106 scopus 로고    scopus 로고
    • GenoDroid: are privacy-preserving genomic tests ready for prime time?
    • ACM, New York, NY, USA, Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society
    • De Cristofaro E., Faber S., Gasti P., Tsudik G. GenoDroid: are privacy-preserving genomic tests ready for prime time?. WPES '12 2012, 97-108. ACM, New York, NY, USA.
    • (2012) WPES '12 , pp. 97-108
    • De Cristofaro, E.1    Faber, S.2    Gasti, P.3    Tsudik, G.4
  • 30
    • 84889057699 scopus 로고    scopus 로고
    • Secure genomic testing with size- and position-hiding private substring matching
    • ACM, New York, NY, USA, Proceedings of the 12th ACM Workshop on Privacy in the Electronic Society
    • De Cristofaro E., Faber S., Tsudik G. Secure genomic testing with size- and position-hiding private substring matching. WPES '13 2013, 107-118. ACM, New York, NY, USA.
    • (2013) WPES '13 , pp. 107-118
    • De Cristofaro, E.1    Faber, S.2    Tsudik, G.3
  • 31
    • 84938669388 scopus 로고    scopus 로고
    • Inference control for privacy-preserving genome matching
    • CoRR abs/1405.0205
    • F. Kerschbaum, M. Beck, D. Schönfeld, Inference control for privacy-preserving genome matching, CoRR abs/1405.0205, 2014.
    • (2014)
    • Kerschbaum, F.1    Beck, M.2    Schönfeld, D.3
  • 32
    • 80955157888 scopus 로고    scopus 로고
    • Can homomorphic encryption be practical?
    • ACM, New York, NY, USA, Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop
    • Naehrig M., Lauter K., Vaikuntanathan V. Can homomorphic encryption be practical?. CCSW '11 2011, 113-124. ACM, New York, NY, USA. 10.1145/2046660.2046682.
    • (2011) CCSW '11 , pp. 113-124
    • Naehrig, M.1    Lauter, K.2    Vaikuntanathan, V.3
  • 33
    • 84856847778 scopus 로고    scopus 로고
    • Secure management of biomedical data with cryptographic hardware
    • Canim M., Kantarcioglu M., Malin B. Secure management of biomedical data with cryptographic hardware. Trans. Info. Tech. Biomed. 2012, 16(1):166-175.
    • (2012) Trans. Info. Tech. Biomed. , vol.16 , Issue.1 , pp. 166-175
    • Canim, M.1    Kantarcioglu, M.2    Malin, B.3
  • 34
    • 84904122785 scopus 로고    scopus 로고
    • AU2EU: privacy-preserving matching of DNA sequences
    • in: D. Naccache, D. Sauveron (Eds.), Information Security Theory and Practice, Securing the Internet of Things, Lecture Notes in Computer Science
    • T. Ignatenko, M. Petkovic, AU2EU: privacy-preserving matching of DNA sequences, in: D. Naccache, D. Sauveron (Eds.), Information Security Theory and Practice, Securing the Internet of Things, Lecture Notes in Computer Science, vol. 8501, 2014, pp. 180-189.
    • (2014) , vol.8501 , pp. 180-189
    • Ignatenko, T.1    Petkovic, M.2
  • 35
    • 0029307102 scopus 로고
    • The context-tree weighting method: basic properties
    • Willems F.M.J., Shtarkov Y., Tjalkens T. The context-tree weighting method: basic properties. IEEE Trans. Inf. Theory 1995, 41(3):653-664. 10.1109/18.382012.
    • (1995) IEEE Trans. Inf. Theory , vol.41 , Issue.3 , pp. 653-664
    • Willems, F.M.J.1    Shtarkov, Y.2    Tjalkens, T.3
  • 36
    • 84905233012 scopus 로고    scopus 로고
    • Scalable privacy-preserving data sharing methodology for genome-wide association studies
    • Yu F., Fienberg S.E., Slavkovic A.B., Uhler C. Scalable privacy-preserving data sharing methodology for genome-wide association studies. J. Biomed. Inform. 2014, (0).
    • (2014) J. Biomed. Inform.
    • Yu, F.1    Fienberg, S.E.2    Slavkovic, A.B.3    Uhler, C.4
  • 38
    • 69349086735 scopus 로고    scopus 로고
    • Genomic privacy and limits of individual detection in a pool
    • Sankararaman S., Obozinski G., Jordan M.I., Halperin E. Genomic privacy and limits of individual detection in a pool. Nat. Genet. 2009, 41(9):965-967. 10.1038/ng.436.
    • (2009) Nat. Genet. , vol.41 , Issue.9 , pp. 965-967
    • Sankararaman, S.1    Obozinski, G.2    Jordan, M.I.3    Halperin, E.4
  • 40
    • 73449105071 scopus 로고    scopus 로고
    • The limits of individual identification from sample allele frequencies: theory and statistical analysis
    • Visscher P.M., Hill W.G. The limits of individual identification from sample allele frequencies: theory and statistical analysis. PLoS Genet. 2009, 5(10):e1000628. 10.1371/journal.pgen.1000628.
    • (2009) PLoS Genet. , vol.5 , Issue.10 , pp. e1000628
    • Visscher, P.M.1    Hill, W.G.2
  • 41
    • 74049130896 scopus 로고    scopus 로고
    • Learning your identity and disease from research papers: information leaks in genome wide association study
    • ACM, New York, NY, USA, Proceedings of the 16th Springer Conference on Computer and Communications Security
    • Wang R., Li Y.F., Wang X., Tang H., Zhou X. Learning your identity and disease from research papers: information leaks in genome wide association study. CCS '09 2009, 534-544. ACM, New York, NY, USA. 10.1145/1653662.1653726.
    • (2009) CCS '09 , pp. 534-544
    • Wang, R.1    Li, Y.F.2    Wang, X.3    Tang, H.4    Zhou, X.5
  • 42
    • 80052975332 scopus 로고    scopus 로고
    • To release or not to release: evaluating information leaks in aggregate human-genome data
    • Springer, Berlin, Heidelberg, V. Atluri, C. Diaz (Eds.) Computer Security - ESORICS 2011
    • Zhou X., Peng B., Li Y., Chen Y., Tang H., Wang X. To release or not to release: evaluating information leaks in aggregate human-genome data. Lecture Notes in Computer Science 2011, vol. 6879:607-627. Springer, Berlin, Heidelberg. 10.1007/978-3-642-23822-2-33. V. Atluri, C. Diaz (Eds.).
    • (2011) Lecture Notes in Computer Science , vol.6879 , pp. 607-627
    • Zhou, X.1    Peng, B.2    Li, Y.3    Chen, Y.4    Tang, H.5    Wang, X.6
  • 44
    • 33746335051 scopus 로고    scopus 로고
    • Differential privacy
    • Springer, Berlin, Heidelberg, M. Bugliesi, B. Preneel, V. Sassone, I. Wegener (Eds.) Automata, Languages and Programming
    • Dwork C. Differential privacy. Lecture Notes in Computer Science 2006, vol. 4052:1-12. Springer, Berlin, Heidelberg. M. Bugliesi, B. Preneel, V. Sassone, I. Wegener (Eds.).
    • (2006) Lecture Notes in Computer Science , vol.4052 , pp. 1-12
    • Dwork, C.1
  • 45
    • 84905192776 scopus 로고    scopus 로고
    • Privacy-preserving data sharing for genome-wide association studies
    • Uhler C., Slavkovic A.B., Fienberg S.E. Privacy-preserving data sharing for genome-wide association studies. J. Privacy Confidentiality 2013, 5(1):137-166.
    • (2013) J. Privacy Confidentiality , vol.5 , Issue.1 , pp. 137-166
    • Uhler, C.1    Slavkovic, A.B.2    Fienberg, S.E.3
  • 46
    • 84995401548 scopus 로고    scopus 로고
    • Privacy-preserving data exploration in genome-wide association studies
    • ACM, New York, NY, USA, Proceedings of the 19th Springer SIGKDD International Conference on Knowledge Discovery and Data Mining
    • Johnson A., Shmatikov V. Privacy-preserving data exploration in genome-wide association studies. KDD '13 2013, 1079-1087. ACM, New York, NY, USA. 10.1145/2487575.2487687.
    • (2013) KDD '13 , pp. 1079-1087
    • Johnson, A.1    Shmatikov, V.2
  • 47
    • 84964313111 scopus 로고    scopus 로고
    • Scalable privacy-preserving data sharing methodology for genome-wide association studies: an application to iDASH healthcare privacy protection challenge
    • Yu F., Ji Z. Scalable privacy-preserving data sharing methodology for genome-wide association studies: an application to iDASH healthcare privacy protection challenge. BMC Med. Inf. Decis. Making 2014, 14(S-1):S3. 10.1186/1472-6947-14-S1-S3.
    • (2014) BMC Med. Inf. Decis. Making , vol.14 , Issue.S 1 , pp. S3
    • Yu, F.1    Ji, Z.2
  • 49
    • 84938572122 scopus 로고    scopus 로고
    • Choosing blindly but wisely: differentially private solicitation of dna datasets for disease marker discovery
    • Zhao Y., Wang X., Jiang X., Ohno-Machado L., Tang H. Choosing blindly but wisely: differentially private solicitation of dna datasets for disease marker discovery. J. Am. Med. Inform. Assoc. 2015, 22(1):100-108. 10.1136/amiajnl-2014-003043.
    • (2015) J. Am. Med. Inform. Assoc. , vol.22 , Issue.1 , pp. 100-108
    • Zhao, Y.1    Wang, X.2    Jiang, X.3    Ohno-Machado, L.4    Tang, H.5
  • 50
    • 85013889444 scopus 로고    scopus 로고
    • Privacy-preserving processing of raw genomic data
    • in: 8th Data Privacy Management (DPM 2013) International Workshop (in conjunction with ESORICS 2013)
    • E. Ayday, J.L. Raisaro, U. Hengartner, A. Molyneaux, J.-P. Hubaux, Privacy-preserving processing of raw genomic data, in: 8th Data Privacy Management (DPM 2013) International Workshop (in conjunction with ESORICS 2013), 2013.
    • (2013)
    • Ayday, E.1    Raisaro, J.L.2    Hengartner, U.3    Molyneaux, A.4    Hubaux, J.-P.5
  • 51
    • 33746639153 scopus 로고    scopus 로고
    • Scalable management of personal genomic data
    • Adida B., Kohane I., secure Geneping: scalable management of personal genomic data. BMC Genomics 2006, 7(1):1-10.
    • (2006) BMC Genomics , vol.7 , Issue.1 , pp. 1-10
    • Adida, B.1    Kohane, I.2    secure, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.