Show simple item record

dc.contributor.advisorAyday, Erman
dc.contributor.authorSav, Sinem
dc.date.accessioned2018-08-03T13:42:49Z
dc.date.available2018-08-03T13:42:49Z
dc.date.copyright2018-07
dc.date.issued2018-08
dc.date.submitted2018-08-02
dc.identifier.urihttp://hdl.handle.net/11693/47725
dc.descriptionCataloged from PDF version of article.en_US
dc.descriptionThesis (M.S.): Bilkent University, Department of Computer Engineering, İhsan Doğramacı Bilkent University, 2018.en_US
dc.descriptionIncludes bibliographical references (leaves 51-57).en_US
dc.description.abstractHealth and genomic data is sensitive in terms of carrying private information about individuals. One can infer inherited/genetic disorders, their occurrence probabilities, information about race, and kinship by analyzing an individual's genomic data. Furthermore, health data which is mostly collected by hospitals or other health institutions carries private information about individuals including the diseases they have at present or indicators of future diseases/disorders. While protecting such data, it is important to show that its utility is preserved and maximized since the data is used in researches. Regarding these facts, homomorphic encryption-based scheme (using Paillier cryptosystem) for the protection of health data and a novel watermarking scheme based on belief propagation algorithm for the genomic data is proposed in this work. Homomorphic encryption is used for the health data to show the ability of performing mathematical operations on the encrypted data without decrypting it with a real-life use-case. We show its practicality with the correctness and performance results. In the second part of this thesis, a watermarking scheme for genomic data is proposed to overcome the liability issues due to unauthorized sharing by service providers (SPs). Robust-watermarking techniques ensure the detection of malicious parties with a high probability and we show the probabilistic limits of this detection with di erent experimental setups and evaluation metrics. Lastly, this scheme guarantees the following with a high probability: (i) the utility is preserved, (ii) it is robust against single or colluding SP attacks, and (iii) watermark addition is compatible with the nature of the data as the proposed method considers auxiliary information that a malicious SP may use in order to remove/modify watermarked points before leaking the data.en_US
dc.description.statementofresponsibilityby Sinem Sav.en_US
dc.format.extentxii, 63 leaves : charts, graphics ; 30 cm.en_US
dc.language.isoen_USen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectWatermarkingen_US
dc.subjectPrivacyen_US
dc.subjectHomomorphic Eencryptionen_US
dc.subjectGenomic Dataen_US
dc.titlePrivacy-preserving computation and robust watermarking techniques for healthcare dataen_US
dc.title.alternativeSağlık verileri için gizliliği koruyan hesaplama ve güçlü filigran tekniklerien_US
dc.typeThesisen_US
dc.departmentDepartment of Computer Engineeringen_US
dc.publisherBilkent Universityen_US
dc.description.degreeM.S.en_US
dc.identifier.itemidB158752
dc.embargo.release2021-08-02


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record