Cryptographic solutions for credibility and liability issues of genomic data
dc.citation.epage | 43 | en_US |
dc.citation.issueNumber | 1 | en_US |
dc.citation.spage | 33 | en_US |
dc.citation.volumeNumber | 16 | en_US |
dc.contributor.author | Ayday, E. | en_US |
dc.contributor.author | Tang, Q. | en_US |
dc.contributor.author | Yilmaz, A. | en_US |
dc.date.accessioned | 2019-02-11T12:26:41Z | |
dc.date.available | 2019-02-11T12:26:41Z | |
dc.date.issued | 2019 | en_US |
dc.department | Department of Computer Engineering | en_US |
dc.description.abstract | In this work, we consider a scenario that includes an individual sharing his genomic data (or results obtained from his genomic data) with a service provider. In this scenario, (i) the service provider wants to make sure that received genomic data (or results) in fact belongs to the corresponding individual (and computed correctly), (ii) the individual wants to provide a digital consent along with his data specifying whether the service provider is allowed to further share his data, and (iii) if his data is shared without his consent, the individual wants to determine the service provider that is responsible for this leakage. We propose two schemes based on homomorphic signature and aggregate signature that links the information about the legitimacy of the data to the consent and the phenotype of the individual. Thus, to verify the data, each party also needs to use the correct consent and phenotype of the individual who owns the data. | en_US |
dc.description.provenance | Submitted by Türkan Cesur (cturkan@bilkent.edu.tr) on 2019-02-11T12:26:41Z No. of bitstreams: 1 Cryptographic_olutions_for_credibility_and_liability_issues_of_genomic_data.pdf: 1100840 bytes, checksum: ecf4523dcf35cd23b28c25960bea4a6d (MD5) | en |
dc.description.provenance | Made available in DSpace on 2019-02-11T12:26:41Z (GMT). No. of bitstreams: 1 Cryptographic_olutions_for_credibility_and_liability_issues_of_genomic_data.pdf: 1100840 bytes, checksum: ecf4523dcf35cd23b28c25960bea4a6d (MD5) Previous issue date: 2019 | en |
dc.identifier.doi | 10.1109/TDSC.2017.2690422 | en_US |
dc.identifier.eissn | 1941-0018 | |
dc.identifier.issn | 1545-5971 | |
dc.identifier.uri | http://hdl.handle.net/11693/49249 | |
dc.language.iso | English | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers | en_US |
dc.relation.isversionof | https://doi.org/10.1109/TDSC.2017.2690422 | en_US |
dc.source.title | IEEE Transactions on Dependable and Secure Computing | en_US |
dc.subject | Privacy | en_US |
dc.subject | Security | en_US |
dc.subject | Genomic privacy | en_US |
dc.subject | Liability | en_US |
dc.subject | Credibility | en_US |
dc.title | Cryptographic solutions for credibility and liability issues of genomic data | en_US |
dc.type | Article | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Cryptographic_olutions_for_credibility_and_liability_issues_of_genomic_data.pdf
- Size:
- 1.05 MB
- Format:
- Adobe Portable Document Format
- Description:
- Full printable version
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description: