Secure Outsourcing of DNA Searching via Finite Automata
نویسندگان
چکیده
This work treats the problem of error-resilient DNA searching via oblivious evaluation of finite automata, formulated as follows: a client has a DNA sequence, and a service provider has a pattern that corresponds to a genetic test. Error-resilient searching can be achieved by representing the pattern as a finite automata and evaluating it on the DNA sequence, which is treated as the input to the automaton, where privacy of both the pattern and the DNA sequence must be preserved. Interactive solutions to this problem already exist, but can be a burden on the participating parties. Thus, in this work we propose techniques for secure outsourcing of oblivious evaluation of finite automata to computational servers, such that the servers do not learn any information. Our techniques are applicable to any type of finite automata, but the optimizations are tailored to the setting of DNA searching (i.e., when the alphabet size is small, etc.).
منابع مشابه
Automata Based Access Control Privacy Preserving in PPIB
At present many outsourcing organizations need sharing of the information via on-demand access. Information Brokering System (IBS) have been already proposed to connect large-scale loosely-federated data sources via brokering overlay. But there are some attacks with these traditional IBS, namely attribute-correlation attack and inference attack. To overcome these attacks here we are proposing t...
متن کاملIntegrating the Functional Encryption and Proxy Re-cryptography to Secure DRM Scheme
The current Digital Rights Management (DRM) systems use attribute-based encryption (ABE) and proxy re-encryption (PRE) to achieve fine-grained access control in cloud computing. However, these schemes have some limitations particularly in terms of security, functionality and also higher decryption time which grows linearly with the complexity of access policies. In this paper, we propose a nove...
متن کاملUniversally composable privacy preserving finite automata execution with low online and offline complexity
In this paper, we propose efficient protocols to obliviously execute non-deterministic and deterministic finite automata (NFA and DFA) in the arithmetic black box (ABB) model. In contrast to previous approaches, our protocols do not use expensive public-key operations, relying instead only on computation with secret-shared values. Additionally, the complexity of our protocols is largely offline...
متن کاملPractical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation
In [18] it was shown that the ability to perform oblivious automata evaluation was useful for performing DNA searching and matching. By oblivious automata evaluation we mean that one participant has a finite state machine and the other participant has a sequence, and at the end of the protocol the sequence owner learns whether the machine accepts the sequence. A protocol was given in [18], but ...
متن کاملSeparating indexes from data: a distributed scheme for secure database outsourcing
Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010