Privacy-Preserving Genome Computing Through Program Specialization
Xiaofeng Wang - Indiana University
Apr 29, 2009
AbstractIn this talk, I present a new approach to performing important classes of genomic computations (e.g., search for homologous genes) that makes a significant step towards privacy protection in this domain. Our approach leverages a key property of the human genome, namely that the vast majority of it is shared across humans (and hence public), and consequently relatively little of it is sensitive. Based on this observation, we propose a privacy-protection framework that partitions a genomic computation, distributing the part on sensitive data to the data provider and the part on the pubic data to the user of the data. Such a partition is achieved through program specialization that enables a biocomputing program to perform a concrete execution on public data and a symbolic execution on sensitive data. As a result, the program is simplified into an efficient query program that takes only sensitive genetic data as inputs. We prove the effectiveness of our techniques on a set of dynamic programming algorithms fundamental to genomic computing. We developed a program transformation tool that automatically instruments a legacy program for specialization operations. We also demonstrate that our techniques can greatly facilitate secure multi-party computations on large biocomputing problems.
About the SpeakerXiaoFeng Wang is an assistant professor in the school of informatics at Indiana University at Bloomington. He received his Ph.D. in Computer Engineering from Carnegie Mellon University in 2004.
His research interests span all areas of computer and communication security. Particularly, he is carrying out active research on system and network security (including automatic program analysis, malware detection and containment, countermeasures to denial of service attacks), privacy-preserving techniques and their application to critical information systems (such as health information systems), and incentive engineering in information security. His publications regularly appear in the mainstream venues in system and network security. He also serves on various conference committees in the area.
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.