Advertisement

Human Genome Data Protection Using PostgreSQL DBMS

  • Péter Lehotay-Kéry
  • Attila Kiss
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 850)

Abstract

There can be a data boom in the near future, due to cheaper methods make possible for everyone to keep their own DNA on their own device or on a central medical cloud. These are sensitive data. There are a lot of cases, when genomes are contained in text files. The size of these can even be 3 GB on every user. Secured data management is not solved in these files.

By using database managers, the levels of permissions can be managed, security and encryption is not the task of the user, because these are integrated into the database manager systems. In this paper, we would like to demonstrate, with the use of an open-source database manager system and with some typical bioinformatical algorithms, that bioinformatical methods can be solved with integrating them into the database manager systems. With efficiency measurements we would like to present, that the use of database manager systems can be efficient in more complex environments.

Keywords

Bioinformatics Biology Cryptography Databases Genetics 

Notes

Acknowledgment

The project was supported by the European Union, co-financed by the European Social Fund (EFOP-3.6.3-VEKOP-16-2017-00002).

References

  1. 1.
    Bockenhauer, H.-J., Bongartz, D.: Algorithmic Aspects of Bioinformatics. Springer, Heidelberg (2007).  https://doi.org/10.1007/978-3-540-71913-7CrossRefzbMATHGoogle Scholar
  2. 2.
    Katz, J., Lindell, Y.: Introduction to Modern Cryptography. CRC Press, Boca Raton (2014)zbMATHGoogle Scholar
  3. 3.
    Lichtenwalter, R.N., Zorina-Lichtenwalter, K., Diatchenko, L.: Genotypic data in relational databases: efficient storage and rapid retrieval. In: Kirikova, M., Nørvåg, K., Papadopoulos, G.A. (eds.) ADBIS 2017. LNCS, vol. 10509, pp. 408–421. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-66917-5_27CrossRefGoogle Scholar
  4. 4.
    Aniceto, R., Xavier, R., Guimarães, V., Hondo, F., Holanda, M., Walter, M.E., Lifschitz, S.: Evaluating the Cassandra NoSQL database approach for genomic data persistency. Int. J. Genomics 2015 (2015)Google Scholar
  5. 5.
    Rice, M., Gladstone, W., Weir, M.: Relational databases: a transparent framework for encouraging biology students to think informatically. Cell Biol. Educ. 3(4), 241–252 (2004)CrossRefGoogle Scholar
  6. 6.
    Bhargavan, K., Leurent, G.: On the practical (in-) security of 64-bit block ciphers: collision attacks on HTTP over TLS and OpenVPN. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 456–467. ACM (2016)Google Scholar
  7. 7.
    Bogdanov, A., Khovratovich, D., Rechberger, C.: Biclique cryptanalysis of the full AES. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 344–371. Springer, Heidelberg (2011).  https://doi.org/10.1007/978-3-642-25385-0_19CrossRefGoogle Scholar
  8. 8.
    Mytis-Gkometh, P., Drosatos, G., Efraimidis, P.S., Kaldoudi, E.: Notarization of knowledge retrieval from biomedical repositories using blockchain technology. In: Maglaveras, N., Chouvarda, I., de Carvalho, P. (eds.) Precision Medicine Powered by pHealth and Connected Health. IP, vol. 66, pp. 69–73. Springer, Singapore (2018).  https://doi.org/10.1007/978-981-10-7419-6_12CrossRefGoogle Scholar
  9. 9.
    Schneier, B.: Description of a new variable-length key, 64-bit block cipher (Blowfish). In: Anderson, R. (ed.) FSE 1993. LNCS, vol. 809, pp. 191–204. Springer, Heidelberg (1994).  https://doi.org/10.1007/3-540-58108-1_24CrossRefGoogle Scholar
  10. 10.
    Daemen, J., Rijmen, V.: The Design of Rijndael: AES-the Advanced Encryption Standard. Springer, Heidelberg (2013).  https://doi.org/10.1007/978-3-662-04722-4CrossRefzbMATHGoogle Scholar
  11. 11.
    Barker, E.: SP 800–67 Rev. 2, Recommendation for Triple Data Encryption Algorithm (TDEA) Block Cipher. NIST Special Publication 800:67 (2017)Google Scholar
  12. 12.
    Adams, C.: The cast-128 encryption algorithm (1997)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Information Systems, Faculty of InformaticsELTE Eötvös Loránd UniversityBudapestHungary
  2. 2.J. Selye UniversityKomárnoSlovakia

Personalised recommendations