GenoGuard: Protecting Genomic Data against Brute-Force Attacks Zhicong Huang, Erman Ayday, Jacques Fellay, Jean-Pierre Hubaux, Ari Juels Presented by Chuong.

Slides:



Advertisements
Similar presentations
Cheat-Proof Playout for Centralized and Distributed Online Games IEEE InfoCom’01 Paper by Nathaniel E. Baughman and Brian Neil Levine CPSC 538A Presentation:
Advertisements

1 Pascal URIEN, IETF 61th, Washington DC, 10th November 2004 “draft-urien-eap-smartcard-type-00.txt” EAP Smart Card Protocol (EAP-SC)
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing.
1 Network Security Ola Flygt Växjö University
1) Linkage means A) Alleles at different loci are independent B) Alleles at different loci are physically close to each other and on the same chromosome.
Ferdinand van ’t Hooft Cardiovascular Genetics and Genomics Group Karolinska Institutet, Stockholm, Sweden Genome-Wide Association Study GWAS
Kerberos Jean-Anne Fitzpatrick Jennifer English. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open.
Office hours Wednesday 3-4pm 304A Stanley Hall. Fig Association mapping (qualitative)
Secure Shell – SSH Tam Ngo Steve Licking cs265. Overview Introduction Brief History and Background of SSH Differences between SSH-1 and SSH- 2 Brief Overview.
CMSC 414 Computer and Network Security Lecture 15 Jonathan Katz.
Polymorphism Structure of the Human Genome Gabor T. Marth Department of Biology Boston College Chestnut Hill, MA
1 Preserving Privacy in Collaborative Filtering through Distributed Aggregation of Offline Profiles The 3rd ACM Conference on Recommender Systems, New.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
1 Pertemuan 04 Pengamanan Akses Sistem Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
CMSC 414 Computer and Network Security Lecture 8 Jonathan Katz.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Wireless Sensor Network Security Anuj Nagar CS 590.
Genetic variation, detection, concepts, sources, and forces
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
1 Message Authentication and Hash Functions Authentication Requirements Authentication Functions Message Authentication Codes Hash Functions Security of.
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Murphy’s Law If anything can go wrong, it will.. 2 Data Security and Confidentiality “… a firm belief in Murphy’s Law and in the necessity to try and.
Honey Encryption: Security Beyond the Brute-Force Bound
SNPs and the Human Genome Prof. Sorin Istrail. A SNP is a position in a genome at which two or more different bases occur in the population, each with.
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Maryland Information Systems Security Lab D EPARTMENT OF C OMPUTER S CIENCE EAP Password Authenticated eXchange (PAX) T. Charles Clancy William A. Arbaugh.
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
High dimensional genomic data, identifiability, and query-response Haixu Tang School of Informatics and Computing Indiana University, Bloomington.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Self-Healing Group-Wise Key Distribution Schemes with Time-Limited Node Revocation for Wireless Sensor Networks Minghui Shi, Xuemin Shen, Yixin Jiang,
Time to Encrypt our DNA? Stuart Bradley Humbert, M., Huguenin, K., Hugonot, J., Ayday, E., Hubaux, J. (2015). De-anonymizing genomic databases using phenotypic.
Linear Reduction Method for Tag SNPs Selection Jingwu He Alex Zelikovsky.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
When DRM Meets Restricted Multicast A Content Encryption Key Scheme for Restricted Multicast and DRM Min FENG and Bin ZHU Microsoft Research Asia.
A Comparative Study of RFID Solutions for Security and Privacy: POP vs. Previous Solutions Advanced Information Systems Engineering Lab Saitama University,
Linkage Disequilibrium and Recent Studies of Haplotypes and SNPs
Requirements and Selection Process for RADIUS Crypto-Agility December 5, 2007 David B. Nelson IETF 70 Vancouver, BC.
KERBEROS SYSTEM Kumar Madugula.
多媒體網路安全實驗室 A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for mobile Networks 作者 :Zhiguo Wan,Kui Ren,Bart.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Wireless LAN Concepts. Wireless LAN Standards.
Increasing Power in Association Studies by using Linkage Disequilibrium Structure and Molecular Function as Prior Information Eleazar Eskin UCLA.
Inferences on human demographic history using computational Population Genetic models Gabor T. Marth Department of Biology Boston College Chestnut Hill,
Wired Equivalent Privacy. INTRODUCTION Wired Equivalent Privacy (WEP) is a security algorithm for IEEE wireless networks. Introduced as part of.
1 Pascal URIEN, IETF 61th, Washington DC, 10th November 2004 draft-urien-eap-smartcard-06.txt “EAP-Support in Smartcard”
LCA1 Erman Ayday, Jean Louis Raisaro and Jean-Pierre Hubaux Privacy-Enhancing Technologies for Medical Tests and Personalized Medicine Laboratory for Computer.
chownIoT Secure Handling of Smart Home IoT Devices Ownership Change
GenoGuard: Protecting Genomic Data against Brute-Force Attacks
Constrained Hidden Markov Models for Population-based Haplotyping
Introduction to Direct-to-Consumer Genetic Testing
Introduction to bioinformatics lecture 11 SNP by Ms.Shumaila Azam
DNA / RNA and Protein Synthesis
PLANT BIOTECHNOLOGY & GENETIC ENGINEERING (3 CREDIT HOURS)
Linkage Genes that are physically located on the same chromosome are said to be “linked”. Linked genes are said to be “mapped” to the same chromosome.
Network Security Ola Flygt Växjö University
DNA / RNA and Protein Synthesis
A Genome-Wide Association Study of Basal Transepidermal Water Loss Finds that Variants at 9q34.3 Are Associated with Skin Barrier Function  Manfei Zhang,
Hunting for Celiac Disease Genes
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
Sarah E. Medland, Dale R. Nyholt, Jodie N. Painter, Brian P
Germline variants influencing primary tumor type.
Syed Rafiul Hussain*, Mitziu Echeverria†, Ankush Singla*,
Presentation transcript:

GenoGuard: Protecting Genomic Data against Brute-Force Attacks Zhicong Huang, Erman Ayday, Jacques Fellay, Jean-Pierre Hubaux, Ari Juels Presented by Chuong Ngo

The Genomic Future

The Dangers of the Genomic Future

The Current Landscape

GenoGuard is honey encryption with n- gram derived seeds.

GenoGuard - System Model

Protection Mechanisms (e.g. encryption)

GenoGuard - System Model Protection Mechanisms (e.g. encryption) Authentication

GenoGuard - Protocol

GenoGuard - Encoding (0, 2) Single Nucleotide Variants Encoder Seed PBE Encrypted Seed

GenoGuard - Encoding 0 2

0 [0, 6)

GenoGuard - Encoding 0 2 [0.54, 6)

GenoGuard - Modeling Linkage disequilibrium and allele frequency K-th order Markov chains Recombination rates

Evaluation - Model Fitness

Evaluation - Storage Overhead

Evaluation - Experimental Security

Side Attacks - Ancestry Compatibility

Side Attacks - Hair Color

Side Attacks - Chromosomes

Conclusion

Discussion What are the potential weakness of GenoGuard? Does the use of Markov chains make sense? Why or why not? Do the authors claims of GenoGuard’s security make sense? Why or why not?