Yıl 2020,
Cilt: 6 Sayı: 2, 72 - 88, 31.12.2020
Işıl Karabey
Ahmet Fırat Yelkuvan
,
Fuat Akal
Kaynakça
- [1]. M. Alser, N. Almadhoun, A. Nouri, C. Alkan, and E. Ayday, "Can you really anonymize the donors of genomic data in today’s digital world?," in Data Privacy Management, and Security Assurance: Springer, 2015, pp. 237-244.
- [2]. M. M. A. Aziz et al., "Privacy-preserving techniques of genomic data—a survey," Briefings in bioinformatics, vol. 20, no. 3, pp. 887-895, 2019.
- [3]. B. Wang, "Search over Encrypted Data in Cloud Computing," PhD., Virginia Polytechnic Institute and State University, 2016.
- [4]. M. Naveed et al., "Privacy in the genomic era," ACM Computing Surveys (CSUR), vol. 48, no. 1, pp. 1-44, 2015.
- [5]. X. Qiu et al., "Cloud technologies for bioinformatics applications," in Proceedings of the 2nd Workshop on Many-Task Computing on Grids and Supercomputers, 2009, pp. 1-10.
- [6]. W.J. Lu, Y. Yamada, and J. Sakuma, "Privacy-preserving genome-wide association studies on cloud environment using fully homomorphic encryption," in BMC medical informatics and decision making, 2015, vol. 15, no. S5: Springer, p. S1.
- [7]. M. Beck et al., "Genecloud: Secure cloud computing for biomedical research," in Trusted Cloud Computing: Springer, 2014, pp. 3-14.
- [8]. M. Kantarcioglu, W. Jiang, Y. Liu, and B. Malin, "A cryptographic approach to securely share and query genomic sequences," IEEE Transactions on information technology in biomedicine, vol. 12, no. 5, pp. 606-617, 2008.
- [9]. B. Schneier, Applied cryptography: protocols, algorithms, and source code in C. john wiley & sons, 2007.
- [10]. NIH. "Guidance for Institutions Submitting Grant Applications and Contract Proposals under the NIH Genomic Data Sharing Policy for Human and Non-Human Data." https://gds.nih.gov/pdf/GDS_Policy_Guidance_Grant_App_Contract_Proposals.pdf (accessed April 28, 2019.
- [11]. M. Akgün, A. O. Bayrak, B. Ozer, and M. Ş. Sağıroğlu, "Privacy preserving processing of genomic data: A survey," Journal of biomedical informatics, vol. 56, pp. 103-111, 2015.
- [12]. E. Ayday, E. De Cristofaro, J.-P. Hubaux, and G. Tsudik, "The chills and thrills of whole genome sequencing," Computer, 2013.
- [13]. L. Bonomi, Y. Huang, and L. Ohno-Machado, "Privacy challenges and research opportunities for genomic data sharing," Nature Genetics, pp. 1-9, 2020.
- [14]. NCBI. https://www.ncbi.nlm.nih.gov/projects/SNP/ (accessed February 02, 2020, 2019).
- [15]. M. J. Atallah, F. Kerschbaum, and W. Du, "Secure and private sequence comparisons," in Proceedings of the 2003 ACM workshop on Privacy in the electronic society, 2003, pp. 39-44.
- [16]. Y. Chen, B. Peng, X. Wang, and H. Tang, "Large-Scale Privacy-Preserving Mapping of Human Genomic Sequences on Hybrid Clouds," in NDSS, 2012.
- [17]. A. M. Ileri, H. I. Ozercan, A. Gundogdu, A. K. Senol, M. Y. Ozkaya, and C. Alkan, "Coinami: a cryptocurrency with DNA sequence alignment as proof-of-work," arXiv preprint arXiv:1602.03031, 2016.
- [18]. Y. Zhao, X. Wang, and H. Tang, "A Secure Alignment Algorithm for Mapping Short Reads to Human Genome," Journal of Computational Biology, vol. 25, no. 6, pp. 529-540, 2018.
- [19]. M. Blanton and M. Aliasgari, "Secure outsourcing of DNA searching via finite automata," in IFIP Annual Conference on Data and Applications Security and Privacy, 2010: Springer, pp. 49-64.
- [20]. M. Canim, M. Kantarcioglu, and B. Malin, "Secure management of biomedical data with cryptographic hardware," IEEE Transactions on Information Technology in Biomedicine, vol. 16, no. 1, pp. 166-175, 2011.
- [21]. H. Perl, Y. Mohammed, M. Brenner, and M. Smith, "Fast confidential search for bio-medical data using bloom filters and homomorphic cryptography," in 2012 IEEE 8th International Conference on E-Science, 2012: IEEE, pp. 1-8.
- [22]. H. Perl, Y. Mohammed, M. Brenner, and M. Smith, "Privacy/performance trade-off in private search on bio-medical data," Future Generation Computer Systems, vol. 36, pp. 441-452, 2014.
- [23]. M. Franz, B. Deiseroth, K. Hamacher, S. Jha, S. Katzenbeisser, and H. Schröder, "Towards secure bioinformatics services (short paper)," in International Conference on Financial Cryptography and Data Security, 2011: Springer, pp. 276-283.
- [24]. X. Lei, X. Zhu, H. Chi, and S. Jiang, "Privacy-preserving use of genomic data on mobile devices," in 2015 IEEE/CIC International Conference on Communications in China (ICCC), 2015: IEEE, pp. 1-6.
- [25]. X. Zhu, E. Ayday, R. Vitenberg, and N. R. Veeraragavan, "Privacy-Preserving Search for a Similar Genomic Makeup in the Cloud," arXiv preprint arXiv:1912.02045, 2019.
- [26]. L. Sweeney, A. Abu, and J. Winn, "Identifying participants in the personal genome project by name (a re-identification experiment)," arXiv preprint arXiv:1304.7605, 2013.
- [27]. L. Sweeney, "Weaving technology and policy together to maintain confidentiality," The Journal of Law, Medicine & Ethics, vol. 25, no. 2-3, pp. 98-110, 1997.
- [28]. L. Sweeney, "k-anonymity: A model for protecting privacy," International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 05, pp. 557-570, 2002.
- [29]. S. R. Savage, "Characterizing the risks and harms of linking genomic information to individuals," IEEE Security & Privacy, vol. 15, no. 5, pp. 14-19, 2017.
- [30]. A. Das, "Approaches in Genomic Privacy," Computer Science & Center for Computational Molecular Biology (CCMB), Brown University, 2018.
- [31]. Y. Erlich and A. Narayanan, "Routes for breaching and protecting genetic privacy," Nature Reviews Genetics, vol. 15, no. 6, pp. 409-421, 2014.
- [32]. M. Humbert, E. Ayday, J.-P. Hubaux, and A. Telenti, "Reconciling utility with privacy in genomics," in Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014, pp. 11-20.
- [33]. M. Humbert, E. Ayday, J.-P. Hubaux, and A. Telenti, "Addressing the concerns of the lacks family: quantification of kin genomic privacy," in Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, 2013, pp. 1141-1152.
- [34]. B. Malin and L. Sweeney, "How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems," Journal of biomedical informatics, vol. 37, no. 3, pp. 179-192, 2004.
BULUT BİLİŞİM VE GENOMİK VERİLERİN GİZLİLİĞİ
Yıl 2020,
Cilt: 6 Sayı: 2, 72 - 88, 31.12.2020
Işıl Karabey
Ahmet Fırat Yelkuvan
,
Fuat Akal
Öz
Genomik araştırmalardan elde edilen, tıbbi veritabanları ve biyobankalar gibi elektronik ortamda saklanan veriler, araştırmacılar tarafından sorgulanmakta ve işlenmektedir. Son yıllarda genomik verilere ortak bir erişim alanı sunmak, erişimi kolaylaştırmak ve depolama birimlerini etkin bir biçimde kullanmak için bulut bilişimden yararlanılmaktadır. Genomik verilerin bulut üzerinden işlenmesinin dış kaynaklardan temin edilmesi bazı gizlilik ve güvenlik tehditlerini de beraberinde getirmektedir. Bulut bilişim sistemlerinin kullanımı bireylerin mahremiyetini tehlikeye atmadan etkin bir şekilde sağlanmalıdır. Dışa aktarılan veriler, iletim sırasında taşıma katmanı güvenliği sayesinde kolaylıkla korunurken, verilerin işlenmesi sırasında bir takım problemler meydana gelmektedir. Verinin bulutta açık bir şekilde depolanması veri sızıntısına yol açabilmektedir. Özel Bilgi Erişim (Private Information Retrieval-PIR) şemaları kullanılarak verinin şifreli bir şekilde saklanması da sorgulama sırasında sistemin yavaşlamasına sebep olmakta ve böylece PIR şemaları, gerçek dünya kullanımında etkinliğini yitirmektedir. Bu çalışmada genomik verilerin bulut ortamlarında saklanması ve sorgulanması sırasında karşılaşılacak gizlilik ve güvenlik problemleri ve bu problemlere yönelik literatürde bulunan çözümler derlenmiştir. Genomik verilere yapılan saldırılar ve bu saldırılara yönelik çözüm önerileri de bu çalışma kapsamında bir araya getirilmiştir. Aynı zamanda önerilen çözümlere rağmen hala devam eden bazı açık sorunlar da okuyucuya aktarılmıştır.
Kaynakça
- [1]. M. Alser, N. Almadhoun, A. Nouri, C. Alkan, and E. Ayday, "Can you really anonymize the donors of genomic data in today’s digital world?," in Data Privacy Management, and Security Assurance: Springer, 2015, pp. 237-244.
- [2]. M. M. A. Aziz et al., "Privacy-preserving techniques of genomic data—a survey," Briefings in bioinformatics, vol. 20, no. 3, pp. 887-895, 2019.
- [3]. B. Wang, "Search over Encrypted Data in Cloud Computing," PhD., Virginia Polytechnic Institute and State University, 2016.
- [4]. M. Naveed et al., "Privacy in the genomic era," ACM Computing Surveys (CSUR), vol. 48, no. 1, pp. 1-44, 2015.
- [5]. X. Qiu et al., "Cloud technologies for bioinformatics applications," in Proceedings of the 2nd Workshop on Many-Task Computing on Grids and Supercomputers, 2009, pp. 1-10.
- [6]. W.J. Lu, Y. Yamada, and J. Sakuma, "Privacy-preserving genome-wide association studies on cloud environment using fully homomorphic encryption," in BMC medical informatics and decision making, 2015, vol. 15, no. S5: Springer, p. S1.
- [7]. M. Beck et al., "Genecloud: Secure cloud computing for biomedical research," in Trusted Cloud Computing: Springer, 2014, pp. 3-14.
- [8]. M. Kantarcioglu, W. Jiang, Y. Liu, and B. Malin, "A cryptographic approach to securely share and query genomic sequences," IEEE Transactions on information technology in biomedicine, vol. 12, no. 5, pp. 606-617, 2008.
- [9]. B. Schneier, Applied cryptography: protocols, algorithms, and source code in C. john wiley & sons, 2007.
- [10]. NIH. "Guidance for Institutions Submitting Grant Applications and Contract Proposals under the NIH Genomic Data Sharing Policy for Human and Non-Human Data." https://gds.nih.gov/pdf/GDS_Policy_Guidance_Grant_App_Contract_Proposals.pdf (accessed April 28, 2019.
- [11]. M. Akgün, A. O. Bayrak, B. Ozer, and M. Ş. Sağıroğlu, "Privacy preserving processing of genomic data: A survey," Journal of biomedical informatics, vol. 56, pp. 103-111, 2015.
- [12]. E. Ayday, E. De Cristofaro, J.-P. Hubaux, and G. Tsudik, "The chills and thrills of whole genome sequencing," Computer, 2013.
- [13]. L. Bonomi, Y. Huang, and L. Ohno-Machado, "Privacy challenges and research opportunities for genomic data sharing," Nature Genetics, pp. 1-9, 2020.
- [14]. NCBI. https://www.ncbi.nlm.nih.gov/projects/SNP/ (accessed February 02, 2020, 2019).
- [15]. M. J. Atallah, F. Kerschbaum, and W. Du, "Secure and private sequence comparisons," in Proceedings of the 2003 ACM workshop on Privacy in the electronic society, 2003, pp. 39-44.
- [16]. Y. Chen, B. Peng, X. Wang, and H. Tang, "Large-Scale Privacy-Preserving Mapping of Human Genomic Sequences on Hybrid Clouds," in NDSS, 2012.
- [17]. A. M. Ileri, H. I. Ozercan, A. Gundogdu, A. K. Senol, M. Y. Ozkaya, and C. Alkan, "Coinami: a cryptocurrency with DNA sequence alignment as proof-of-work," arXiv preprint arXiv:1602.03031, 2016.
- [18]. Y. Zhao, X. Wang, and H. Tang, "A Secure Alignment Algorithm for Mapping Short Reads to Human Genome," Journal of Computational Biology, vol. 25, no. 6, pp. 529-540, 2018.
- [19]. M. Blanton and M. Aliasgari, "Secure outsourcing of DNA searching via finite automata," in IFIP Annual Conference on Data and Applications Security and Privacy, 2010: Springer, pp. 49-64.
- [20]. M. Canim, M. Kantarcioglu, and B. Malin, "Secure management of biomedical data with cryptographic hardware," IEEE Transactions on Information Technology in Biomedicine, vol. 16, no. 1, pp. 166-175, 2011.
- [21]. H. Perl, Y. Mohammed, M. Brenner, and M. Smith, "Fast confidential search for bio-medical data using bloom filters and homomorphic cryptography," in 2012 IEEE 8th International Conference on E-Science, 2012: IEEE, pp. 1-8.
- [22]. H. Perl, Y. Mohammed, M. Brenner, and M. Smith, "Privacy/performance trade-off in private search on bio-medical data," Future Generation Computer Systems, vol. 36, pp. 441-452, 2014.
- [23]. M. Franz, B. Deiseroth, K. Hamacher, S. Jha, S. Katzenbeisser, and H. Schröder, "Towards secure bioinformatics services (short paper)," in International Conference on Financial Cryptography and Data Security, 2011: Springer, pp. 276-283.
- [24]. X. Lei, X. Zhu, H. Chi, and S. Jiang, "Privacy-preserving use of genomic data on mobile devices," in 2015 IEEE/CIC International Conference on Communications in China (ICCC), 2015: IEEE, pp. 1-6.
- [25]. X. Zhu, E. Ayday, R. Vitenberg, and N. R. Veeraragavan, "Privacy-Preserving Search for a Similar Genomic Makeup in the Cloud," arXiv preprint arXiv:1912.02045, 2019.
- [26]. L. Sweeney, A. Abu, and J. Winn, "Identifying participants in the personal genome project by name (a re-identification experiment)," arXiv preprint arXiv:1304.7605, 2013.
- [27]. L. Sweeney, "Weaving technology and policy together to maintain confidentiality," The Journal of Law, Medicine & Ethics, vol. 25, no. 2-3, pp. 98-110, 1997.
- [28]. L. Sweeney, "k-anonymity: A model for protecting privacy," International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 05, pp. 557-570, 2002.
- [29]. S. R. Savage, "Characterizing the risks and harms of linking genomic information to individuals," IEEE Security & Privacy, vol. 15, no. 5, pp. 14-19, 2017.
- [30]. A. Das, "Approaches in Genomic Privacy," Computer Science & Center for Computational Molecular Biology (CCMB), Brown University, 2018.
- [31]. Y. Erlich and A. Narayanan, "Routes for breaching and protecting genetic privacy," Nature Reviews Genetics, vol. 15, no. 6, pp. 409-421, 2014.
- [32]. M. Humbert, E. Ayday, J.-P. Hubaux, and A. Telenti, "Reconciling utility with privacy in genomics," in Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014, pp. 11-20.
- [33]. M. Humbert, E. Ayday, J.-P. Hubaux, and A. Telenti, "Addressing the concerns of the lacks family: quantification of kin genomic privacy," in Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, 2013, pp. 1141-1152.
- [34]. B. Malin and L. Sweeney, "How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems," Journal of biomedical informatics, vol. 37, no. 3, pp. 179-192, 2004.