Eindhoven University of Technology MASTER Privacy - preserving DNA sequence alignment
نویسنده
چکیده
A significant increase in Big Data has triggered the need for joint computation, where people or organizations cooperatively exchange private inputs in order to conduct various computational tasks. These tasks can vary in wide range and occur between untrusted entities. As an example, case of competitor organizations working together for some project with need to jointly share some private database information can be shown. In order to protect organizations’ valuable and private assets jointly invested computations should be held securely. Nowadays, in order to carry out such computations usually at least one trusted entity should be chosen and informed about private inputs of the both parties. However, if entities are mutually untrusted and there is no party that can be trusted to perform a computation, they need a cryptographic trusted protocol which ensures privacy entirely. In the literature, above explained problem is solved with secure Multi-Party Computation(MPC ) which has a prime importance in cryptography. MPC performs computation in such a way that, output is ensured to be correct and cheating parties will not be able to reveal any information about the inputs of the honest parties. Even though problem of the MPC has been introduced and solved almost 35 years ago, practical real-world applications have been discovered in various research fields and computation domains only in recent years. One of the most sensitive application fields for MPC is the privacy-preserving database queries in healthcare sector. The problem is to investigate if some private search query exists in a database which has private contents(e.g. DNA sequences) need to be kept secret except query result that can be derived. Solving string matching problem has been widely researched in the literature, both with and without MPC techniques. However, solving approximate string matching problem under tight privacy concerns is not a trivial task to do. We have used a particular algorithm, namely BWT transform to research the problem of sequence comparison and applied MPC techniques in order to investigate applicability of the method and produce privacy-preserving DNA sequence alignment algorithms. We have implemented our protocols in Python using specific framework VIFF supporting MPC, where underlying protocols are based on Shamir secret sharing. Due to a judicious use of the secret indexing and masking techniques, we were able to implement the protocols in a recursive manner as in original implementation. In particular, we have identified and analyzed two different models for implemented inexact string matching problem: one model with private search query intended to be searched within public reference string and another model with both private search query and private reference string. For example, in real-world use case private search query can be DNA mutations representing particular illness and reference string can be a human genome. In order to highlight the importance of MPC, both models have been verified and ensured to protect obliviousness entirely. Additionally, one of the major goals of this study is to introduce and analyze a concrete approach to oblivious verification of the inexact string matching. In particular, approach has been achieved by application of the specific cryptographic concept(i.e. zk-SNARK, namely zero-knowledge succinct non-interactive argument of knowledge) which ensures perfect security due to the zero-knowledge proof. This verifiable computation guarantees correctness proof of the computation and provides full protection against private information disclosure by adversarial verifier even with infinite computational power. Privacy-Preserving DNA Sequence Alignment iii
منابع مشابه
MASTER Privacy - preserving DNA sequence alignment
A significant increase in Big Data has triggered the need for joint computation, where people or organizations cooperatively exchange private inputs in order to conduct various computational tasks. These tasks can vary in wide range and occur between untrusted entities. As an example, case of competitor organizations working together for some project with need to jointly share some private data...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملgpALIGNER: A Fast Algorithm for Global Pairwise Alignment of DNA Sequences
Bioinformatics, through the sequencing of the full genomes for many species, is increasingly relying on efficient global alignment tools exhibiting both high sensitivity and specificity. Many computational algorithms have been applied for solving the sequence alignment problem. Dynamic programming, statistical methods, approximation and heuristic algorithms are the most common methods appli...
متن کاملSecure Multiparty Computation for Privacy Preserving Data Mining
Acknowledgments This thesis is the result of my internship at Erasmus University Rotterdam, as part of the the EU-FP7 project CASSANDRA. I would like to thank professor Hennie Daniels for giving such an opportunity to perform an interesting and challenging master's thesis project. I am very grateful to my supervisor Berry Schoenmakers at Eindhoven University of Technology , for the guidance, qu...
متن کاملTowards Privacy Preserving of Forensic Dna Databases
Towards Privacy Preserving of Forensic DNA Databases. (December 2011) Sanmin Liu, B.S., Huazhong University of Science & Technology; M.E., Huazhong University of Science & Technology Chair of Advisory Committee: Dr. Jyh-Charn Liu Protecting privacy of individuals is critical for forensic genetics. In a kinship/identity testing, related DNA profiles between user’s query and the DNA database need...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2018