Full statistical analyses with secure multi-party computation
Dan Bogdanov, Liina Kamm, Ville Sokk dan@cyber.ee http://sharemind.cyber.ee/
Full statistical analyses with secure multi-party computation Dan - - PowerPoint PPT Presentation
Full statistical analyses with secure multi-party computation Dan Bogdanov, Liina Kamm, Ville Sokk dan@cyber.ee http://sharemind.cyber.ee/ The Sharemind model Input Computing Result parties parties parties x 11 CP 1 y 1 IP 1 ... RP 1 x
Dan Bogdanov, Liina Kamm, Ville Sokk dan@cyber.ee http://sharemind.cyber.ee/
Input parties
Computing parties
x11 xk1 ... x12 xk2 ... x13 xk3 ...
y1 y3 y2
Result parties
x1 xk y y
Step 1: secret sharing and storage of inputs Step 3: reconstruction
Step 2: secure multi-party computation
75 - 53 - 38 = 84 mod 100
Reconstruction: 53 + 38 + 84 = 75 mod 100
Inputs Outputs Computation (y1, y2, y3) = f(x1, x2, x3)
All operations are composable.
for best possible efficiency (works with 2 to n servers as well).
not immediately intuitive.
perform better in some cases.
Developers apply privacy patterns on classical algorithms.
model for balancing public and private computations.
for arithmetic circuits.
(3 times for 3 servers).
case/control index vector (based on available phenotypes) Data acquisition and secure storage Determining cases and controls
Secure genome-wide association study workflow
Scenario 1: secure 23andMe Scenario 2: international consortium study Scenario 2: Phenotype-based filtering Scenario 1: Extended clinical study B C A Wetlab Survey Secure storage and processing genotype/phenotype (donors D11,…, D1m) genotype/phenotype ... Research institution Available phenotype information filtering query
phenotypes Data acquisition Genotype & phenotype Secure coding and storage Securely stored genotype & phenotype Case & control determination Case & control group index Secure statistical testing SNP p<0.1 Results of the study genotype (GATGAG…) phenotype (age, diseases, ...) Research institution Secure storage and processing securely computed case/control index vector Secure storage and processing Gene bank n (donors Dn1, …, Dnm) Gene bank 1
secure application servers
Description of the data analysis task Business logic Data model UX requirements
end users (data owners, analysts etc)
Application Server package SecreC language End user applications Controller library
arithmetic, floating point arithmetic, including division.
arithmetic, shuffling, AES.
histogram, frequency plots, heatmap
median absolute deviation
transmission disequilibrium, Wilcoxon, Mann-Whitney
Hochberg procedure
Agency cleared the use of Sharemind/Rmind for education records of Estonian students.
Board cleared the use of Sharemind/Rmind for analyzing tax records of working students.
associated parties under European law.
http://practice-project.eu/downloads/publications/ D31.1-Risk-assessment-legal-status-PU-M12.pdf
party computation. PhD thesis. University of Tartu. 2015. http://hdl.handle.net/ 10062/45343
cryptographically secure statistical analysis. Cryptology ePrint Archive, Report 2014/512. 2014. http://eprint.iacr.org/2014/512.pdf
privacy in large-scale genome-wide association studies. Bioinformatics 29 (7): 886-893, 2013. http://bioinformatics.oxfordjournals.org/content/29/7/886
practical applications. PhD thesis. University of Tartu. 2013. http://hdl.handle.net/ 10062/29041
"The ¡PRACTICE ¡project ¡has ¡received ¡funding ¡from ¡the ¡European ¡Union's ¡Seventh ¡Framework ¡ Programme ¡([FP7/2007-‑2013]) ¡under ¡grant ¡agreement ¡number ¡ICT-‑609611.” ¡
The ¡informaPon ¡in ¡this ¡document ¡is ¡provided ¡“as ¡is”, ¡and ¡no ¡guarantee ¡or ¡warranty ¡is ¡given ¡that ¡the ¡informaPon ¡is ¡fit ¡for ¡any ¡parPcular ¡
Our ¡entry ¡to ¡the ¡iDASH ¡Privacy ¡& ¡Security ¡Workshop ¡Secure ¡Genome ¡Analysis ¡CompePPon ¡ was ¡prepared ¡with ¡support ¡from
http://practice-project.eu/