Skip to main content

Privacy-preserving genomic computation through program specialization

Publication ,  Conference
Wang, R; Wang, XF; Li, Z; Tang, H; Reiter, MK; Dong, Z
Published in: Proceedings of the ACM Conference on Computer and Communications Security
December 1, 2009

In this paper, we present a new approach to performing important classes of genomic computations (e.g., search for homologous genes) that makes a significant step towards privacy protection in this domain. Our approach leverages a key property of the human genome, namely that the vast majority of it is shared across humans (and hence public), and consequently relatively little of it is sensitive. Based on this observation, we propose a privacy-protection framework that partitions a genomic computation, distributing the part on sensitive data to the data provider and the part on the pubic data to the user of the data. Such a partition is achieved through program specialization that enables a biocomputing program to perform a concrete execution on public data and a symbolic execution on sensitive data. As a result, the program is simplified into an efficient query program that takes only sensitive genetic data as inputs. We prove the effectiveness of our techniques on a set of dynamic programming algorithms common in genomic computing. We develop a program transformation tool that automatically instruments a legacy program for specialization operations. We also demonstrate that our techniques can greatly facilitate secure multi-party computations on large biocomputing problems. Copyright 2009 ACM.

Duke Scholars

Altmetric Attention Stats
Dimensions Citation Stats

Published In

Proceedings of the ACM Conference on Computer and Communications Security

DOI

ISSN

1543-7221

Publication Date

December 1, 2009

Start / End Page

338 / 347
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Wang, R., Wang, X. F., Li, Z., Tang, H., Reiter, M. K., & Dong, Z. (2009). Privacy-preserving genomic computation through program specialization. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 338–347). https://doi.org/10.1145/1653662.1653703
Wang, R., X. F. Wang, Z. Li, H. Tang, M. K. Reiter, and Z. Dong. “Privacy-preserving genomic computation through program specialization.” In Proceedings of the ACM Conference on Computer and Communications Security, 338–47, 2009. https://doi.org/10.1145/1653662.1653703.
Wang R, Wang XF, Li Z, Tang H, Reiter MK, Dong Z. Privacy-preserving genomic computation through program specialization. In: Proceedings of the ACM Conference on Computer and Communications Security. 2009. p. 338–47.
Wang, R., et al. “Privacy-preserving genomic computation through program specialization.” Proceedings of the ACM Conference on Computer and Communications Security, 2009, pp. 338–47. Scopus, doi:10.1145/1653662.1653703.
Wang R, Wang XF, Li Z, Tang H, Reiter MK, Dong Z. Privacy-preserving genomic computation through program specialization. Proceedings of the ACM Conference on Computer and Communications Security. 2009. p. 338–347.

Published In

Proceedings of the ACM Conference on Computer and Communications Security

DOI

ISSN

1543-7221

Publication Date

December 1, 2009

Start / End Page

338 / 347