• About
  • Policies
  • What is open access
  • Library
  • Contact
Advanced search
      View Item 
      •   BUIR Home
      • Scholarly Publications
      • Faculty of Engineering
      • Department of Computer Engineering
      • View Item
      •   BUIR Home
      • Scholarly Publications
      • Faculty of Engineering
      • Department of Computer Engineering
      • View Item
      JavaScript is disabled for your browser. Some features of this site may not work without it.

      Cryptographic solutions for credibility and liability issues of genomic data

      Thumbnail
      View / Download
      1.0 Mb
      Author(s)
      Ayday, E.
      Tang, Q.
      Yilmaz, A.
      Date
      2019
      Source Title
      IEEE Transactions on Dependable and Secure Computing
      Print ISSN
      1545-5971
      Electronic ISSN
      1941-0018
      Publisher
      Institute of Electrical and Electronics Engineers
      Volume
      16
      Issue
      1
      Pages
      33 - 43
      Language
      English
      Type
      Article
      Item Usage Stats
      195
      views
      205
      downloads
      Abstract
      In this work, we consider a scenario that includes an individual sharing his genomic data (or results obtained from his genomic data) with a service provider. In this scenario, (i) the service provider wants to make sure that received genomic data (or results) in fact belongs to the corresponding individual (and computed correctly), (ii) the individual wants to provide a digital consent along with his data specifying whether the service provider is allowed to further share his data, and (iii) if his data is shared without his consent, the individual wants to determine the service provider that is responsible for this leakage. We propose two schemes based on homomorphic signature and aggregate signature that links the information about the legitimacy of the data to the consent and the phenotype of the individual. Thus, to verify the data, each party also needs to use the correct consent and phenotype of the individual who owns the data.
      Keywords
      Privacy
      Security
      Genomic privacy
      Liability
      Credibility
      Permalink
      http://hdl.handle.net/11693/49249
      Published Version (Please cite this version)
      https://doi.org/10.1109/TDSC.2017.2690422
      Collections
      • Department of Computer Engineering 1561
      Show full item record

      Browse

      All of BUIRCommunities & CollectionsTitlesAuthorsAdvisorsBy Issue DateKeywordsTypeDepartmentsCoursesThis CollectionTitlesAuthorsAdvisorsBy Issue DateKeywordsTypeDepartmentsCourses

      My Account

      Login

      Statistics

      View Usage StatisticsView Google Analytics Statistics

      Bilkent University

      If you have trouble accessing this page and need to request an alternate format, contact the site administrator. Phone: (312) 290 2976
      © Bilkent University - Library IT

      Contact Us | Send Feedback | Off-Campus Access | Admin | Privacy