Secure Access DNA Database using Aggregate Queries

Authors

  • Gaddipati Bharathi  Assistent Professor, Department of MCA, St. Mary's Group of Institutions, Guntur, Andhra Pradesh, India
  • Kondeti Bhavani   PG Students, Department of MCA, St. Mary's Group of Institutions, Guntur, Andhra Pradesh, India

Keywords:

DNA Databases, Cloud Security, Secure Outsourcing, Aggregate Query

Abstract

DNA or deoxyribonucleic acid is that the medium of long storage and transmission of genetic data for all trendy living organisms. desoxyribonucleic acid data of a selected person is sensitive thus desoxyribonucleic acid dataset should be secure or desires security on the cloud. High-security systems ar needed to shield information inside the cloud.This paper addresses the matter of sharing person-specific genomic sequences while not violating the privacy of their information subjects to support large-scale medical specialty analysis comes. One improvement is that our theme is settled, with zero chance of a wrong answer (as against an occasional probability). we have a tendency to conjointly give a replacement operative purpose within the coordinate system trade-off, by giving a theme that's doubly as quick as theirs however uses doubly the cupboard space. now is impelled by the very fact that storage is cheaper than computation in current cloud computing valuation plans.Moreover, our cryptography of the info makes it doable for US to handle a richer set of queries than actual matching between the question and every sequence of the info. Also, we have a tendency to use combination queries at the time of desoxyribonucleic acid information looking out on the cloud. There ar four main modules particularly purchasers i.e researchers, hospital, key holder and cloud server. this technique is helpful for purchasers i.e. researchers. Our system offers the most effective performance as compared to alternative states of art systems.

References

  1. M. Kantarcioglu, W. Jiang, Y. Liu, and B. Malin, "A cryptographic approach to securely share and query genomic sequences," Inf. Technol. Biomed. IEEE Trans., vol. 12, no. 5, pp. 606-617, 2008.
  2. B. Malin and L. Sweeney, "How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems," J. Biomed. Inform vol. 37, no. 3, pp. 179-192, 2004.
  3. E. Aguiar, Y. Zhang, and M. Blanton, "An Overview of Issues and Recent Developments in Cloud Computing and Storage Security," in High Performance Cloud Auditing and Applications, 2014, pp. 3-33.
  4. P. Bohannon, M. Jakobsson, and S. Srikwan, "Cryptographic Approaches to Privacy in Forensic DNA Databases," in Public Key Cryptography, vol. 1751, H. Imai and Y. Zheng, Eds. Springer Berlin Heidelberg, 2000, pp. 373-390.
  5. F. Bruekers, S. Katzenbeisser, K. Kursawe, and P. Tuyls, "Privacy-preserving matching of DNA profiles," IACR Cryptol. ePrint Arch., vol. 2008, p. 203, 2008.
  6. M. Blanton and M. Aliasgari, "Secure outsourcing of DNA searching via finite automata," in Data and Applications Security and Privacy XXIV, Springer, 2010, pp. 49-64.
  7. M. J. Atallah and J. Li, "Secure outsourcing of sequence comparisons," Int. J. Inf. Secur., vol. 4, no. 4, pp. 277-287, Mar. 2005.
  8. A. E. Nergiz, C. Clifton, and Q. M. Malluhi, "Updating outsourced anatomized private databases," in Proceedings of the 16th International Conference on Extending Database Technology, 2013, pp. 179-190.
  9. L. Sweeney, A. Abu, and J. Winn, "Identifying Participants in the Personal Genome Project by Name," Available SSRN 2257732, 2013.
  10. F. Esponda, E. S. Ackley, P. Helman, H. Jia, and S. Forrest, "Protecting data privacy through hard-to-reverse negative databases," Int. J. Inf. Secur., vol. 6, no. 6, pp. 403-415, 2007.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Gaddipati Bharathi, Kondeti Bhavani , " Secure Access DNA Database using Aggregate Queries, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.1443-1448, January-February-2018.