- Open Access
iDASH secure genome analysis competition 2017
- XiaoFeng Wang†1Email author,
- Haixu Tang†1,
- Shuang Wang†2,
- Xiaoqian Jiang†3,
- Wenhao Wang1,
- Diyue Bu1,
- Lei Wang1,
- Yicheng Jiang2 and
- Chenghong Wang2
© The Author(s). 2018
- Published: 11 October 2018
Year 2017 marks the 4th anniversary since the first iDASH Secure Genome Analysis Competition  launched jointly by University California San Diego and Indiana University, Bloomington. The past 4 years have witnessed the continued progresses in genomic and biomedical technologies, with their influence permeating our daily life, redefining our perception of privacy. As an example, when the law enforcement identified the golden state killer from his remote relative’s DNA from GEDmatch , the kinship inference attack reported 3 years ago  now becomes reality. Facing the genome privacy community are still these old devils: protecting the privacy during genomic data sharing and genome analysis. Just they look increasingly real every day, which mounts a great pressure on the young community to come up with practical, usable solutions.
Seeking such practical privacy solutions has always been at the center of the competition, as set by the organizers 4 years ago. This year, serving the purpose are three carefully designed competition tracks, including De-duplication for GA4GH (Track 1), SGX-based whole genome variation search (Track 2) and HME based logistic regression model learning (Track 3). Each track either has its root in the real privacy problem haunting the already deployed system or new challenges emerged from innovative applications of new computing techniques to support secure genomic data sharing or analysis.
Specifically, in collaboration with the Global Alliance for Genomics and Health (GA4GH), Track 1 looks for new privacy-preserving patient linkage (PPRL) solution for removing duplicated health records maintained by multiple data owners. The new solution can be applied on top of existing European ENCCA unified patient identifier framework to facilitate record deduplication in GA4GH. Track 2 is meant to seek new answers for a long-standing genome privacy problem: how to perform a large-scale Genome-Wide Association Study (GWAS) on the untrusted public cloud. This time, however, the attempts are made by leveraging Intel’s Software Guard Extension (SGX), a new hardware trusted execution environment (TEE) support, to move a secure analysis solution closer to practical use. Track 3 is designed to answer the new demand for training a machine learning model (logistic regression) on encrypted genomic data, when the computation needs to be conducted in an untrusted environment, through a homomorphic encryption (HME) scheme.
Altogether, these three tracks attracted 65 participation teams from 19 countries across North America, Europe, and Asia. Among them, 19 teams from 23 organizations submitted their final results before the deadline. Finally, a joint team from IBM/INRIA and ENS de Lyon/Cornell Tech/Bar-ILan University won Track 1, CEA France won Track 2 and Seoul National University/UC San Diego won Track 3.
This special issue of BMC Medical Genomics highlights some most intriguing techniques reported during the competition.
Carpov et al.  describe their winning SGX based secure GWAS solution, which includes two key components i.e., (1) genome data compression and encryption and (2) top K most significant SNPs computation. Rust programming framework was used to enable massively parallel computation, which allows for the application to scale well with large input VCF files. It took about 1 min to handle the whole processing steps for about 30GB inputs.
Laud et al.  report the results of using secure multiparty computation to efficiently solve privacy-preserving record linkage problem in large databases. The solution is built upon a commercial platform named Sharemind. To deduplicate 10 million record across 1000 different databases, it took about 30 min for computing servers over 100 Mbits/s network.
Kim et al.  present a winning solution for the homomorphic encryption based secure logistic regression. This solution is built upon an efficient approximate arithmetic homomorphic encryption library named HAEEN . The experimental results show that a logistic regression training task over a dataset with 1,579 samples and 18 features can be finished within 6 min.
Chen et al.  present another novel solution to the iDASH homomorphic encryption based secure logistic regression task. In their solution, they applied a multi-bit plaintext space in fully homomorphic encryption together with fixed point number encoding. Bootstrapping is combined in fully homomorphic encryption with a scaling operation in the fixed point arithmetics. They also use a minimax polynomial approximation to the sigmoid function and a 1-bit gradient descent method to reduce the plaintext growth in the training process. Their training over encrypted data took 0.4–3.2 h per iteration of the gradient descent.
Bonte et al.  discuss an alternative solution for secure logistic regression training over homomorphically encrypted data. The key idea of the proposed solution is based on a simplified fixed Hessian method of a much lower multiplicative complexity, which can be efficiently and iteratively solved under homomorphic operations.
All these new techniques showcase the achievements of this year’s competition. Some of them have already demonstrated the potential of practical use, particularly the deduplication techniques for GA4GH, while the others report exciting progress that can lead to breakthroughs in genome privacy, including truly scalable and privacy-preserving genome analysis on untrusted cloud, based upon the new SGX hardware, and the feasibility of training classification models over fully encrypted data. All such techniques and findings will contribute to the genome-privacy research and move the science in this emerging domain forward.
About this supplement
This article has been published as part of BMC Medical Genomics Volume 11 Supplement 4, 2018: Proceedings of the 6th iDASH Privacy and Security Workshop 2017. The full contents of the supplement are available online at https://bmcmedgenomics.biomedcentral.com/articles/supplements/volume-11-supplement-4.
XW, HT, SW, XJ designed the competition tasks and wrote the manuscript. WW, DB, LW, YJ, CW discussed the results and evaluated the performance for each track. All authors have read and approved the final manuscript.
Ethics approval and consent to participate
The authors declare that they have no competing interests.
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated.
- iDASH Privacy & security workshop 2017 - Home [Internet]. [cited 2018 Apr 30]. Available from: http://humangenomeprivacy.org/2017
- Trends D. DNA link to Golden State Killer raises questions of privacy versus safety. Fox News; 2018 [cited 2018 Apr 30]; Available from: http://www.foxnews.com/tech/2018/04/30/dna-link-to-golden-state-killer-raises-questions-privacy-versus-safety.htmlGoogle Scholar
- Samani SS, Huang Z, Ayday E, Elliot M, Fellay J, Hubaux J-P, et al. Quantifying genomic privacy via inference attack with high-order SNV correlations. Security and Privacy Workshops (SPW), 2015 IEEE. IEEE. 2015:32–40.Google Scholar
- Sergiu Carpov TT. Secure top most significant genome variants search: iDASH 2017 competition. BMC Med Genomics. 2018;11(Suppl 4) https://doi.org/10.1186/s12920-018-0401-7.
- Peeter Laud AP. Privacy-preserving record linkage in large databases using secure multiparty computation. BMC Med Genomics. 2018;11(Suppl 4) https://doi.org/10.1186/s12920-018-0400-8.
- Andrey Kim, Yongsoo Song, Miran Kim, Keewoo Lee, Jung Hee Cheon. Logistic regression model training based on the approximate homomorphic encryption. BMC Med Genomics. 2018;11(Suppl 4) https://doi.org/10.1186/s12920-018-0399-x
- Cheon JH, Kim A, Kim M, Song Y. Homomorphic encryption for arithmetic of approximate numbers [Internet]. IACR Cryptology ePrint Archive. 2016;421:2016. Available from: http://eprint.iacr.org/2016/421.pdf Google Scholar
- Hao Chen, Ran Gilad-Bachrach, Kyoohyung Han, Zhicong Huang, Amir Jalali, Kim Laine, Kristin Lauter. Logistic regression over encrypted data from fully homomorphic encryption. BMC Med Genomics. 2018;11(Suppl 4) https://doi.org/10.1186/s12920-018-0397-z
- Charlotte Bonte FV. Privacy-preserving logistic regression training. BMC Med Genomics. 2018;11(Suppl 4) https://doi.org/10.1186/s12920-018-0398-y.