their variant quality and genotype quality. It indexes
the previously known variations by using by using
Single Nucleotide Polymorphism (dbSNP) database
(Sherry et al., 2001). Furthermore, our method deals
with the variations that are specific to the person. We
show that our method can reduce a single whole hu-
man genome to the size small enough to be stored in
a smart card. We also propose a system in which ge-
nomic smart cards are used to perform privacy pre-
serving disease risk test.
2 RELATED WORK
In (Reber and Perttunen, 1997), a method storing at
least a portion of human genome on on the machine-
readable storage medium was proposed. This method
proposes the storage of raw genome in a lossless man-
ner. However, the storage limits and the data process-
ing method are not specified.
In the literature, there are many solutions for pro-
tecting the privacy of genomic data used in genetic
tests. Troncoso-Pastoriza et al. (Troncoso-Pastoriza
et al., 2007) proposed a protocol for secure pat-
tern matching by evaluating automata in an oblivious
manner. The protocol is developed for secure DNA
matching and provides security in semi-honest set-
ting. The communication complexity is linear in the
size of input alphabet and the number of states of the
finite state machine.
Adida and Kohane (Adida and Kohane, 2006) pro-
posed a system GenePING for secure storage of large,
genome-sized datasets. GenePING is developed by
extending the PING (Riva et al., 2001; Simons et al.,
2005) personal health record system. The authors
claim that an attacker accessing to the raw GenePING
storage can not find any relation between patient and
genomic data points.
Blanton and Aliasgari (Blanton and Aliasgari,
2010) proposed a solution for secure DNA searching
also using secure automata evaluation. Proposed pro-
tocol introduce improvements on (Troncoso-Pastoriza
et al., 2007) reducing communicating parties work.
This work proposes a secure outsourcing of computa-
tion protocol which uses external service provider and
modified multi-party protocol.
Jha et al. (Jha et al., 2008) presents privacy
protecting implementations on genomic computations
such as sequence comparisons and distance calcula-
tions using secure two-party communication proto-
col. For edit distance they developed three protocols.
First protocol uses Yao’s garbled circuits while sec-
ond combines garbled circuits with secure computa-
tion with shares. To overcome performance and scal-
ability issues they hybridized the first two protocols
into the third.
Bruekers et al. (Bruekers et al., 2008) proposed
a solution, in semi-honest attacker model, for limited
DNA-based operations like identity, ancestor and pa-
ternity tests, based on Short Tandem Repeat. Pro-
vided solution is based on homomorphic encryption
and its complexity highly depends on the number of
errors to be tolerated.
Taking into account the fully-sequenced human
genome, Baldi et al. (Baldi et al., 2011) proposed
protocols, for paternity tests, personalized medicine
and genetic compatibility tests, based on private set
operations technique. The main aim of this work is to
provide privacy protecting mechanisms to individu-
als, who have their genomic data, for getting serviced
for genetic tests from authorized parties.
Canim et al. (Canim et al., 2012) proposed to
use cryptographic hardware for secure storage, share
and query of genomic data. As a tamper-proof hard-
ware, secure coprocessors are employed for process-
ing genomic data owned by health organizations e.g.
hospitals. Data reside, in encrypted form, in data
storage servers which are assumed to be untrusted.
Proposed solution only addresses the genomic data
owned by health organizations and use potentially ex-
pensive tamper-proof hardware. As the authors agree,
the proposed protocol cannot provide privacy in the
case where information is extracted from the query
results.
Ayday et al. (Ayday et al., 2012) proposed a pri-
vacy protecting method, for medical tests and person-
alized medicine using genomic data, based on homo-
morphic encryption. The authors evaluate that per-
sonal genomic data is quite sensitive to be left to in-
dividuals own and propose to store personal genomic
data, in encrypted format, in a storage and process-
ing unit which can be in the control of governments,
non-profit organizations or private companies, such as
cloud storage service providers.
Focusing on disease risk tests, Ayday et al. (Ayday
et al., 2013) proposed a system to provide privacy-
protecting methods, based on homomorphic encryp-
tion, for genomic, clinical and environmental data
storage and process. Like (Ayday et al., 2012), this
work also proposes to use storage and processing unit
to store sensitive data in encrypted form and disease
risk tests are performed by authorized institutions us-
ing homomorphic encryption technique and secure in-
teger comparison.
HumanGenomeinaSmartCard
311