Skip to main content

GeneCloud: Secure Cloud Computing for Biomedical Research

  • Chapter
  • First Online:
Trusted Cloud Computing

Abstract

Applications in the biomedical sector have a rising demand for computational power due to the growing amount of biological data. However, the setup and maintenance of a sufficient computational infrastructure is costly. Cloud computing allows distributed computing over a network and maximizes the effectiveness of the shared resources. Nevertheless, security concerns rise when valuable research data is transferred to a public Cloud. Herein, we describe – from the application and security perspective – three biomedical case studies from different domains: Patent annotation, cancer outcome prediction, and drug target prediction. We elaborate on different strategies to secure the data and results in the Cloud as well as on the infrastructure needed. The proposed Cloud solutions could help to adapt other similar algorithms from different domains to benefit from Cloud computing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Krishnan, A.: Gridblast: a globus-based high-throughput implementation of blastin a grid computing framework. Concurrency and Computation: Practice and Experience 17(13) (2005) 1607–1623

    Google Scholar 

  2. Morgan, J.C., Chapman, R.W., Anderson, P.E.: A next generation sequence processing and analysis platform with integrated cloud-storage and high performance computing resources. In: Proceedings of the ACM Conference on Bioinformatics, Computational Biology and Biomedicine. BCB ’12, New York, NY, USA, ACM (2012) 594–594

    Google Scholar 

  3. Ren, K., Wang, C., Wang, Q.: Security Challenges for the Public Cloud. IEEEInternet Computing 16(1) (January 2012) 69–73

    Google Scholar 

  4. Santos, N., Gummadi, K.P., Rodrigues, R.: Towards trusted cloud computing. In: Proceedings of the 2009 conference on Hot topics in cloud computing. HotCloud’09, Berkeley, CA, USA, USENIX Association (2009) 3

    Google Scholar 

  5. Bugiel, S., N¨urnberger, S., Sadeghi, A.R., Schneider, T.: Twin Clouds: Secure Cloud Computing with Low Latency. In: 12th Communications and Multimedia Security Conference (CMS’11). Volume 7025 of LNCS., Springer (2011)

    Google Scholar 

  6. Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings ofthe 41st annual ACM symposium on Theory of computing. STOC ’09, New York, NY, USA, ACM (2009) 169–178

    Google Scholar 

  7. Yao, A.C.C.: How to generate and exchange secrets. In: Foundations of ComputerScience, 1986., 27th Annual Symposium on. (1986) 162–167

    Google Scholar 

  8. Beck, M., Kerschbaum, F.: Approximate two-party privacy-preserving string matching with linear complexity. (2013)

    Google Scholar 

  9. Open Grid Forum Working Group: OCCI – Open Cloud Computing Interface (2009)

    Google Scholar 

  10. Buyya, R., Ranjan, R., Calheiros, R.: InterCloud: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services. In Hsu, C.H., Yang, L., Park, J., Yeo, S.S., eds.: Algorithms and Architectures for Parallel Processing. Volume 6081 of Lecture Notes in Computer Science. Springer Berlin / Heidelberg (2010) 13–31

    Google Scholar 

  11. Rochwerger, B., Breitgand, D., Epstein, A., Hadas, D., Loy, I., Nagin, K., Tordsson,J., Ragusa, C., Villari, M., Clayman, S., Levy, E., Maraschini, A., Massonet, P., Mu andoz, H., Tofetti, G.: Reservoir - When One Cloud Is Not Enough. Computer 44(3) (March 2011) 44

    Google Scholar 

  12. Chakode, R., Yenke, B.O., Mehaut, J.F.: Resource Management of Virtual Infrastructure for On-demand SaaS Services. In: CLOSER2011: Proceedings of the 1st International conference on Cloud Computing and Service Science. (May 2011) 352–361

    Google Scholar 

  13. Eisinger, D., Tsatsaronis, G., Bundschus, M., Wieneke, U., Schroeder, M.: Automated patent categorization and guided patent search using ipc as inspired by mesh and pubmed. Journal of Biomedical Semantics 4(Suppl 1) (2013) S3

    Google Scholar 

  14. Winter, C., Kristiansen, G., Kersting, S., Roy, J., Aust, D., Knösel, T., Rümmele, P., Jahnke, B., Hentrich, V., Rückert, F., Niedergethmann, M., Weichert, W., Bahra, M., Schlitt, H.J., Settmacher, U., Friess, H., Buühler, M., Saeger, H.D., Schroeder, M., Pilarsky, C., Grützmann, R.: Google goes cancer: improving outcome prediction for cancer patients by network-based ranking of marker genes. PLoS Comput Biol 8(5) (2012) e1002511

    Google Scholar 

  15. Roy, J., Winter, C., Isik, Z., Schroeder, M.: Network information improves canceroutcome prediction. Brief Bioinform (Dec 2012)

    Google Scholar 

  16. Haupt, V.J., Schroeder, M.: Old friends in new guise: Repositioning of knowndrugs with structural bioinformatics. Brief Bioinform 12(4) (Jul 2011) 312–326

    Google Scholar 

  17. Haupt, V.J., Daminelli, S., Schroeder, M.: Drug promiscuity in PDB: Protein binding site similarity is key. PLoS One (2013)

    Google Scholar 

  18. Doms, A., Schroeder, M.: Gopubmed: exploring pubmed with the gene ontology.Nucleic Acids Res 33(Web Server issue) (Jul 2005) W783–W786

    Google Scholar 

  19. Thomas, P., Starlinger, J., Vowinkel, A., Arzt, S., Leser, U.: Geneview: a comprehensive semantic search engine for pubmed. Nucleic Acids Res 40(Web Server issue) (Jul 2012) W585–W591

    Google Scholar 

  20. Verberne, S., D’hondt, E., Oostdijk, N.: Quantifying the Challenges in ParsingPatent Claims. 1st International Workshop on Advances in Patent Information Retrieval (2003)

    Google Scholar 

  21. Kwon, T., Lee, M.K., Kwon, D.: ML Confidential: Machine Learning on EncryptedData. Information Security and Cryptology ICISC 2012 Lecture Notes in Computer Science 7839 (2013) 1–21

    Google Scholar 

  22. Bonomi, L., Xiong, L., Chen, R., Fung, B.: Privacy Preserving Record Linkage viagrams Projections. arXiv preprint arXiv:1208.2773 (2012)

    Google Scholar 

  23. Katz, J.: Secure text processing with applications to private DNA matching. Proceedings of the 17th ACM conference on 1 (October 2010) 485–492

    Google Scholar 

  24. Blass, E., Pietro, R.D., Molva, R., Onen, M.: PRISMPrivacy-Preserving Search in MapReduce. Privacy Enhancing Technologies (2012)

    Google Scholar 

  25. Atallah, M.J., Frikken, K.B.: Securely outsourcing linear algebra computations. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security - ASIACCS ’10, New York, New York, USA, ACM Press (April 2010) 48

    Google Scholar 

  26. Atallah, M., Pantazopoulos, K., Spafford, E.: Secure outsourcing of some computations. Computer (1996) 1–24

    Google Scholar 

  27. Atallah, M.J., Pantazopoulos, K.N., Rice, J.R., Spafford, E.H.: Secure outsourcingof scientific computations. ADVANCES IN COMPUTERS (1998) 215 – 272

    Google Scholar 

  28. Paillier, P.: Public-Key Cryptosystems Based on Composite Degree ResiduosityClasses. Advances in Cryptography - Eurocrypt ’99 1592 (1999) 223–238

    Google Scholar 

  29. Boneh, D., Goh, E.J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. Theory of Cryptography (TCC) ’05 3378 (2005) 325–341

    Google Scholar 

  30. DiMasi, J.A., Feldman, L., Seckler, A., Wilson, A.: Trends in risks associated withnew drug development: success rates for investigational drugs. Clin Pharmacol Ther 87(3) (Mar 2010) 272–277

    Google Scholar 

  31. Chong, C.R., Sullivan, D.J.: New uses for old drugs. Nature 448(7154) (Aug 2007) 645–646

    Google Scholar 

  32. Xie, L., Bourne, P.E.: Detecting evolutionary relationships across existing foldspace, using sequence order-independent profile-profile alignments. Proc Natl Acad Sci U S A 105(14) (Apr 2008) 5441–5446

    Google Scholar 

Download references

Acknowledgements and Funding

Funding by the German Federal Ministry of Economics and Technology is kindly acknowledged as GeneCloud is part of the Trusted Cloud Initiative.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Martin Beck .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Beck, M. et al. (2014). GeneCloud: Secure Cloud Computing for Biomedical Research. In: Krcmar, H., Reussner, R., Rumpe, B. (eds) Trusted Cloud Computing. Springer, Cham. https://doi.org/10.1007/978-3-319-12718-7_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12718-7_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12717-0

  • Online ISBN: 978-3-319-12718-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics