Secure Access DNA Database using Aggregate Queries
Keywords:
DNA Databases, Cloud Security, Secure Outsourcing, Aggregate QueryAbstract
DNA or deoxyribonucleic acid is that the medium of long storage and transmission of genetic data for all trendy living organisms. desoxyribonucleic acid data of a selected person is sensitive thus desoxyribonucleic acid dataset should be secure or desires security on the cloud. High-security systems ar needed to shield information inside the cloud.This paper addresses the matter of sharing person-specific genomic sequences while not violating the privacy of their information subjects to support large-scale medical specialty analysis comes. One improvement is that our theme is settled, with zero chance of a wrong answer (as against an occasional probability). we have a tendency to conjointly give a replacement operative purpose within the coordinate system trade-off, by giving a theme that's doubly as quick as theirs however uses doubly the cupboard space. now is impelled by the very fact that storage is cheaper than computation in current cloud computing valuation plans.Moreover, our cryptography of the info makes it doable for US to handle a richer set of queries than actual matching between the question and every sequence of the info. Also, we have a tendency to use combination queries at the time of desoxyribonucleic acid information looking out on the cloud. There ar four main modules particularly purchasers i.e researchers, hospital, key holder and cloud server. this technique is helpful for purchasers i.e. researchers. Our system offers the most effective performance as compared to alternative states of art systems.
References
- M. Kantarcioglu, W. Jiang, Y. Liu, and B. Malin, "A cryptographic approach to securely share and query genomic sequences," Inf. Technol. Biomed. IEEE Trans., vol. 12, no. 5, pp. 606-617, 2008.
- B. Malin and L. Sweeney, "How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems," J. Biomed. Inform vol. 37, no. 3, pp. 179-192, 2004.
- E. Aguiar, Y. Zhang, and M. Blanton, "An Overview of Issues and Recent Developments in Cloud Computing and Storage Security," in High Performance Cloud Auditing and Applications, 2014, pp. 3-33.
- P. Bohannon, M. Jakobsson, and S. Srikwan, "Cryptographic Approaches to Privacy in Forensic DNA Databases," in Public Key Cryptography, vol. 1751, H. Imai and Y. Zheng, Eds. Springer Berlin Heidelberg, 2000, pp. 373-390.
- F. Bruekers, S. Katzenbeisser, K. Kursawe, and P. Tuyls, "Privacy-preserving matching of DNA profiles," IACR Cryptol. ePrint Arch., vol. 2008, p. 203, 2008.
- M. Blanton and M. Aliasgari, "Secure outsourcing of DNA searching via finite automata," in Data and Applications Security and Privacy XXIV, Springer, 2010, pp. 49-64.
- M. J. Atallah and J. Li, "Secure outsourcing of sequence comparisons," Int. J. Inf. Secur., vol. 4, no. 4, pp. 277-287, Mar. 2005.
- A. E. Nergiz, C. Clifton, and Q. M. Malluhi, "Updating outsourced anatomized private databases," in Proceedings of the 16th International Conference on Extending Database Technology, 2013, pp. 179-190.
- L. Sweeney, A. Abu, and J. Winn, "Identifying Participants in the Personal Genome Project by Name," Available SSRN 2257732, 2013.
- F. Esponda, E. S. Ackley, P. Helman, H. Jia, and S. Forrest, "Protecting data privacy through hard-to-reverse negative databases," Int. J. Inf. Secur., vol. 6, no. 6, pp. 403-415, 2007.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.