BUIR logo
Communities & Collections
All of BUIR
  • English
  • Türkçe
Log In
Please note that log in via username/password is only available to Repository staff.
Have you forgotten your password?
  1. Home
  2. Browse by Subject

Browsing by Subject "Genomic Data"

Filter results by typing the first few letters
Now showing 1 - 1 of 1
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    ItemOpen Access
    Privacy-preserving computation and robust watermarking techniques for healthcare data
    (2018-07) Sav, Sinem
    Health and genomic data is sensitive in terms of carrying private information about individuals. One can infer inherited/genetic disorders, their occurrence probabilities, information about race, and kinship by analyzing an individual's genomic data. Furthermore, health data which is mostly collected by hospitals or other health institutions carries private information about individuals including the diseases they have at present or indicators of future diseases/disorders. While protecting such data, it is important to show that its utility is preserved and maximized since the data is used in researches. Regarding these facts, homomorphic encryption-based scheme (using Paillier cryptosystem) for the protection of health data and a novel watermarking scheme based on belief propagation algorithm for the genomic data is proposed in this work. Homomorphic encryption is used for the health data to show the ability of performing mathematical operations on the encrypted data without decrypting it with a real-life use-case. We show its practicality with the correctness and performance results. In the second part of this thesis, a watermarking scheme for genomic data is proposed to overcome the liability issues due to unauthorized sharing by service providers (SPs). Robust-watermarking techniques ensure the detection of malicious parties with a high probability and we show the probabilistic limits of this detection with di erent experimental setups and evaluation metrics. Lastly, this scheme guarantees the following with a high probability: (i) the utility is preserved, (ii) it is robust against single or colluding SP attacks, and (iii) watermark addition is compatible with the nature of the data as the proposed method considers auxiliary information that a malicious SP may use in order to remove/modify watermarked points before leaking the data.

About the University

  • Academics
  • Research
  • Library
  • Students
  • Stars
  • Moodle
  • WebMail

Using the Library

  • Collections overview
  • Borrow, renew, return
  • Connect from off campus
  • Interlibrary loan
  • Hours
  • Plan
  • Intranet (Staff Only)

Research Tools

  • EndNote
  • Grammarly
  • iThenticate
  • Mango Languages
  • Mendeley
  • Turnitin
  • Show more ..

Contact

  • Bilkent University
  • Main Campus Library
  • Phone: +90(312) 290-1298
  • Email: dspace@bilkent.edu.tr

Bilkent University Library © 2015-2025 BUIR

  • Privacy policy
  • Send Feedback