Skip to main navigation Skip to search Skip to main content

Secure distributed genome analysis for GWAS and sequence comparison computation

Research output: Contribution to journalArticlepeer-review

32 Scopus citations

Abstract

Background: The rapid increase in the availability and volume of genomic data makes significant advances in biomedical research possible, but sharing of genomic data poses challenges due to the highly sensitive nature of such data. To address the challenges, a competition for secure distributed processing of genomic data was organized by the iDASH research center. Methods: In this work we propose techniques for securing computation with real-life genomic data for minor allele frequency and chi-squared statistics computation, as well as distance computation between two genomic sequences, as specified by the iDASH competition tasks. We put forward novel optimizations, including a generalization of a version of mergesort, which might be of independent interest. Results: We provide implementation results of our techniques based on secret sharing that demonstrate practicality of the suggested protocols and also report on performance improvements due to our optimization techniques. Conclusions: This work describes our techniques, findings, and experimental results developed and obtained as part of iDASH 2015 research competition to secure real-life genomic computations and shows feasibility of securely computing with genomic data in practice.

Original languageEnglish
Article numberS4
JournalBMC Medical Informatics and Decision Making
Volume15
Issue number5
DOIs
StatePublished - Dec 21 2015

Keywords

  • GWAS computation
  • Hamming distance
  • iDASH competition
  • oblivious merge
  • oblivious sorting
  • secret sharing
  • secure genome analysis

Fingerprint

Dive into the research topics of 'Secure distributed genome analysis for GWAS and sequence comparison computation'. Together they form a unique fingerprint.

Cite this