Privacy-Preserving Search for a Similar Genomic Makeup in the Cloud

نویسندگان

چکیده

Increasing affordability of genome sequencing and, as a consequence, widespread availability genomic data opens up new opportunities for the field medicine, also evident from emergence popular cloud-based offerings in this area, such Google Genomics [1]. To utilize more efficiently, it is crucial that different entities share their with each other. However, sharing risky mainly due to privacy concerns. In article, we attempt provide privacy-preserving and efficient solution “similar patient search” problem among several parties (e.g., hospitals) by addressing shortcomings previous attempts. We consider scenario which hospital has its own dataset goal physician (or researcher) search similar given one (based on makeup) all hospitals system. enable search, propose hierarchical index structure hospital’s low memory requirement. Furthermore, develop novel merging mechanism generates common individual indices significantly improve efficiency. storage medical information associated diagnosis treatment). allow access via fine-grained control policy through combination standard symmetric encryption ciphertext attribute-based encryption. Using mechanism, can patients obtain about matching records if holds. conduct experiments large-scale show high efficiency proposed scheme.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy-Preserving Search of Similar Patients in Genomic Data

The growing availability of genomic data holds great promise for advancing medicine and research, but unlocking its full potential requires adequate methods for protecting the privacy of individuals whose genome data we use. One example of this tension is running Similar Patient Query on remote genomic data: In this setting a doctor that holds the genome of his/her patient may try to find other...

متن کامل

the search for the self in becketts theatre: waiting for godot and endgame

this thesis is based upon the works of samuel beckett. one of the greatest writers of contemporary literature. here, i have tried to focus on one of the main themes in becketts works: the search for the real "me" or the real self, which is not only a problem to be solved for beckett man but also for each of us. i have tried to show becketts techniques in approaching this unattainable goal, base...

15 صفحه اول

Privacy-preserving Logarithmic-time Search on Encrypted Data in Cloud

Ideally, a privacy-preserving database-in-the-cloud environment would allow a database owner to outsource its encrypted database to a cloud server. The owner would retain control over what records can be queried and by whom, by granting each authorized user a search token and a decryption key. A user would then present this token to cloud server who would use it to find encrypted matching recor...

متن کامل

Privacy-Preserving Keyword Search Over Encrypted Data in Cloud Computing

Search over encrypted data is a technique of great interest in the cloud computing era, because many believe that sensitive data has to be encrypted before outsourcing to the cloud servers in order to ensure user data privacy. Devising an efficient and secure search scheme over encrypted data involves techniques from multiple domains – information retrieval for index representation, algorithms ...

متن کامل

A centralized privacy-preserving framework for online social networks

There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing

سال: 2022

ISSN: ['1941-0018', '1545-5971', '2160-9209']

DOI: https://doi.org/10.1109/tdsc.2021.3074327