Volume 10 Supplement 2

Proceedings of the 5th iDASH Privacy and Security Workshop 2016

Research

Publication of this supplement has not been supported by sponsorship. Information about the source of funding for publication charges can be found in the individual articles. The articles have undergone the journal's standard peer review process for supplements. The Supplement Editors declare that they have no competing interests.

Chicago, IL, USA

11/11/2016

Edited by Shuang Wang, Xiaoqian Jiang, XiaoFeng Wang and Haixu Tang 

Workshop website

New Content Item

  1. Research

    Private queries on encrypted genomic data

    One of the tasks in the iDASH Secure Genome Analysis Competition in 2016 was to demonstrate the feasibility of privacy-preserving queries on homomorphically encrypted genomic data. More precisely, given a list...

    Gizem S. Çetin, Hao Chen, Kim Laine, Kristin Lauter, Peter Rindal and Yuhou Xia

    BMC Medical Genomics 2017 10(Suppl 2):45

    Published on: 26 July 2017

  2. Research

    Efficient and secure outsourcing of genomic data storage

    Cloud computing is becoming the preferred solution for efficiently dealing with the increasing amount of genomic data. Yet, outsourcing storage and processing sensitive information, such as genomic data, comes...

    João Sá Sousa, Cédric Lefebvre, Zhicong Huang, Jean Louis Raisaro, Carlos Aguilar-Melchor, Marc-Olivier Killijian and Jean-Pierre Hubaux

    BMC Medical Genomics 2017 10(Suppl 2):46

    Published on: 26 July 2017

  3. Research

    BLOOM: BLoom filter based oblivious outsourced matchings

    Whole genome sequencing has become fast, accurate, and cheap, paving the way towards the large-scale collection and processing of human genome data. Unfortunately, this dawning genome era does not only promise...

    Jan Henrik Ziegeldorf, Jan Pennekamp, David Hellmanns, Felix Schwinger, Ike Kunze, Martin Henze, Jens Hiller, Roman Matzutt and Klaus Wehrle

    BMC Medical Genomics 2017 10(Suppl 2):44

    Published on: 26 July 2017

  4. Research

    Aftermath of bustamante attack on genomic beacon service

    With the enormous need for federated eco-system for holding global genomic and clinical data, Global Alliance for Genomic and Health (GA4GH) has created an international website called beacon service which all...

    Md Momin Al Aziz, Reza Ghasemi, Md Waliullah and Noman Mohammed

    BMC Medical Genomics 2017 10(Suppl 2):43

    Published on: 26 July 2017

  5. Research

    Secure approximation of edit distance on genomic data

    Edit distance is a well established metric to quantify how dissimilar two strings are by counting the minimum number of operations required to transform one string into the other. It is utilized in the domain ...

    Md Momin Al Aziz, Dima Alhadidi and Noman Mohammed

    BMC Medical Genomics 2017 10(Suppl 2):41

    Published on: 26 July 2017

  6. Research

    PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension

    Advances in DNA sequencing technologies have prompted a wide range of genomic applications to improve healthcare and facilitate biomedical research. However, privacy and security concerns have emerged as a cha...

    Feng Chen, Chenghong Wang, Wenrui Dai, Xiaoqian Jiang, Noman Mohammed, Md Momin Al Aziz, Md Nazmus Sadat, Cenk Sahinalp, Kristin Lauter and Shuang Wang

    BMC Medical Genomics 2017 10(Suppl 2):48

    Published on: 26 July 2017