{"created":"2021-03-01T07:16:05.207723+00:00","id":37018,"links":{},"metadata":{"_buckets":{"deposit":"dc84e699-9b74-42d3-b3f7-56804c35e7b3"},"_deposit":{"id":"37018","owners":[],"pid":{"revision_id":0,"type":"depid","value":"37018"},"status":"published"},"_oai":{"id":"oai:tsukuba.repo.nii.ac.jp:00037018","sets":["152:2150","3:62:5297:4903"]},"item_5_biblio_info_6":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2015-12","bibliographicIssueDateType":"Issued"},"bibliographicPageStart":"S1","bibliographicVolumeNumber":"15","bibliographic_titles":[{"bibliographic_title":"BMC medical informatics and decision making"}]}]},"item_5_creator_3":{"attribute_name":"著者別名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"佐久間, 淳"}],"nameIdentifiers":[{},{},{}]}]},"item_5_description_4":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"Objective\nDeveloped sequencing techniques are yielding large-scale genomic data at low cost. A genome-wide association study (GWAS) targeting genetic variations that are significantly associated with a particular disease offers great potential for medical improvement. However, subjects who volunteer their genomic data expose themselves to the risk of privacy invasion; these privacy concerns prevent efficient genomic data sharing. Our goal is to presents a cryptographic solution to this problem.\n\nMethods\nTo maintain the privacy of subjects, we propose encryption of all genotype and phenotype data. To allow the cloud to perform meaningful computation in relation to the encrypted data, we use a fully homomorphic encryption scheme. Noting that we can evaluate typical statistics for GWAS from a frequency table, our solution evaluates frequency tables with encrypted genomic and clinical data as input. We propose to use a packing technique for efficient evaluation of these frequency tables.\n\nResults\nOur solution supports evaluation of the D′ measure of linkage disequilibrium, the Hardy-Weinberg Equilibrium, the χ2 test, etc. In this paper, we take χ2 test and linkage disequilibrium as examples and demonstrate how we can conduct these algorithms securely and efficiently in an outsourcing setting. We demonstrate with experimentation that secure outsourcing computation of one χ2 test with 10, 000 subjects requires about 35 ms and evaluation of one linkage disequilibrium with 10, 000 subjects requires about 80 ms.\n\nConclusions\nWith appropriate encoding and packing technique, cryptographic solutions based on fully homomorphic encryption for secure computations of GWAS can be practical.","subitem_description_type":"Abstract"}]},"item_5_publisher_27":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"BioMed Central"}]},"item_5_relation_11":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_id_text":"10.1186/1472-6947-15-S5-S1","subitem_relation_type_select":"DOI"}}]},"item_5_rights_12":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":" © 2015 Lu et al. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated."}]},"item_5_select_15":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_select_item":"publisher"}]},"item_5_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12035223","subitem_source_identifier_type":"NCID"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Lu, Wen-Jie"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yamada, Yoshiji"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Sakuma, Jun"}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2016-02-10"}],"displaytype":"detail","filename":"BMCMIDM_15-S1.pdf","filesize":[{"value":"1.2 MB"}],"format":"application/pdf","licensetype":"license_6","mimetype":"application/pdf","url":{"label":"BMCMIDM_15-S1","url":"https://tsukuba.repo.nii.ac.jp/record/37018/files/BMCMIDM_15-S1.pdf"},"version_id":"8891881e-bc8c-41ae-95c4-088e5c0fb5df"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"Privacy-preserving genome-wide association studies on cloud environment using fully homomorphic encryption","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Privacy-preserving genome-wide association studies on cloud environment using fully homomorphic encryption"}]},"item_type_id":"5","owner":"1","path":["2150","4903"],"pubdate":{"attribute_name":"公開日","attribute_value":"2016-02-10"},"publish_date":"2016-02-10","publish_status":"0","recid":"37018","relation_version_is_last":true,"title":["Privacy-preserving genome-wide association studies on cloud environment using fully homomorphic encryption"],"weko_creator_id":"1","weko_shared_id":5},"updated":"2022-04-27T09:06:20.799708+00:00"}