Ensuring Privacy Properties. Our approach, being
based on Idris, allows for proofs of certain safety pro-
perties (that entail security and privacy properties) to
be passed as arguments to operators that are part of
correctly built queries. For instance, if we try to wa-
termark a genetic data that is already encrypted, type
checking will not pass because of the proof p1 of the
wat operator that verifies data has not been transfor-
med yet. Similarly, trying to detect a watermark from
data that has not been decrypted yet will give rise to a
type checking error, see Fig. 12.
4 CONCLUSION
In this paper we have pointed to the lack of program-
ming support for privacy-preserving applications that
manipulate shared genetic data. We have presented
two contributions: (i) new cloud-based architectu-
res for such applications that are motivated by con-
crete requirements from researchers in genetics and
(ii) a model and corresponding security- and privacy-
enhancing techniques for the development of such ap-
plications, notably using watermarking for the preser-
vation of ownership and integrity properties.
As future work, we are striving for the integra-
tion of other privacy-enhancing techniques, an effi-
cient implementation of a general Java library for bi-
omedical analyses using shared genetic data, and its
application to real-world genetic analyses.
ACKNOWLEDGEMENTS
We thank our partners from the PRIVGEN project
2
, in
particular, D. Niyitegeka, G. Coatrieux and E. Genin,
for valuable discussions on watermarking and genetic
data sharing.
REFERENCES
Behjati S, T. P. (2013). What is next generation sequen-
cing? Archives of Disease in Childhood Education
and Practice Edition.
Bouslimi, D., Coatrieux, G., et al. (2016). Data hiding
in encrypted images based on predefined watermark
embedding before encryption process. Signal Proces-
sing: Image Communication, 47.
Cherrueau, R.-A., Douence, R., and S
¨
udholt, M. (2015).
A Language for the Composition of Privacy-
Enforcement Techniques. In IEEE RATSP, pages
1037 – 1044, Helsinki, Finland.
Ciriani, V., Vimercati, S. D. C. D., Foresti, S., et al. (2010).
Combining fragmentation and encryption to protect
privacy in data storage. ACM Trans. Inf. Syst. Secur.,
13(3):22:1–22:33.
Cousin, E., Deleuze, J.-F., and G
´
enin, E. (2006). Selection
of SNP subsets for association studies in candidate ge-
nes: . . . . BMC Genetics, 7:20.
Erlich, Y. and Narayanan, A. (2014). Routes for breaching
and protecting genetic privacy. Nature Reviews Gene-
tics, pages 409–421.
Gulcher, J. R., Kristjansson, K., Gudbjartsson, H., and
Stefnsson, K. (2000). Protection of privacy by third-
party encryption in genetic research in iceland. Euro-
pean Journal Of Human Genetics.
Homer, N., Szelinger, S., Redman, M., et al. (2008). Resol-
ving individuals contributing trace amounts of dna to
highly complex mixtures using high-density snp ge-
notyping microarrays. PLOS Genetics, 4(8):1–9.
Iftikhar, S., Khan, S., Anwar, Z., et al. (2015). Genin-
foguarda robust and distortion-free watermarking
technique for genetic data. PLOS ONE, 10(2):1–22.
Kantarcioglu, M., Jiang, W., Liu, Y., and Malin, B. (2008).
A cryptographic approach to securely share and query
genomic sequences. Trans. Info. Tech. Biomed.,
12(5):606–617.
Liina Kamm, Dan Bogdanov, S. L. et al. (2013). A new way
to protect privacy in large-scale genome-wide associ-
ation studies. Bioinformatics (Oxford, England).
Lu, W.-J., Yamada, Y., and Sakuma, J. (2015). Privacy-
preserving genome-wide association studies on clouds
using fully homomorphic encryption. BMC Medical
Informatics and Decision Making, 15(5):S1.
McLaren, P. J., Raisaro, J. L., Aouri, M., et al. (2016).
Privacy-preserving genomic testing in the clinic: a
model using hiv treatment. Genetics in Medicine,
18(8):814–822.
Sweenay, L. (2000). Simple demographics often identify
people uniquely. Carnegie Mellon. Data Privacy Wor-
king Paper 3.
Tang, H., Jiang, X., Wang, X., et al. (2016). Protecting
genomic data analytics in the cloud: state of the art
and opportunities. BMC Medical Genomics, 9(1):63.
Wang, R., Wang, X., Li, Z., Tang, H., et al. (2009). Privacy-
preserving genomic computation through program
specialization. In ACM CCS, pages 338–347, New
York, NY, USA. ACM.
Xie, W., Kantarcioglu, M., Bush, W. S., et al. (2014). Secu-
rema: protecting participant privacy in genetic associ-
ation meta-analysis. Bioinformatics, 30(23):3334.
Zhang, Y., Dai, W., Jiang, X., et al. (2015). Foresee: Fully
outsourced secure genome study based on homomor-
phic encryption. ”BMC Medical Informatics and De-
cision Making, 15(5):S5.
CLOSER 2018 - 8th International Conference on Cloud Computing and Services Science
496