| Literature DB >> 26733391 |
Yuchen Zhang, Wenrui Dai, Xiaoqian Jiang, Hongkai Xiong, Shuang Wang.
Abstract
BACKGROUND: The increasing availability of genome data motivates massive research studies in personalized treatment and precision medicine. Public cloud services provide a flexible way to mitigate the storage and computation burden in conducting genome-wide association studies (GWAS). However, data privacy has been widely concerned when sharing the sensitive information in a cloud environment.Entities:
Mesh:
Year: 2015 PMID: 26733391 PMCID: PMC4698942 DOI: 10.1186/1472-6947-15-S5-S5
Source DB: PubMed Journal: BMC Med Inform Decis Mak ISSN: 1472-6947 Impact factor: 2.796
Observed allele counts for SNP, where O1,1 and O1,2 are the number of alleles A and a in the case group, O2,1 and O2,1 are the corresponding counts in the control group, N1 and N2 are the total allele counts for the case and control group, respectively.
| SNP | A | a | Total |
|---|---|---|---|
| Case | |||
| Control | |||
| Total | |||
Figure 1Conceptual diagram for the proposed FORESEE framework.
Complexity analysis in terms of cumulative circuit depth2 (CCD) and the number of homomorphic multiplications (HMs) for secure approximation division (Algorithm 3).
| Algorithm 3 | CCD | # of HMs |
|---|---|---|
| 1: Compute | ||
| 2: Compute | ||
| 3: | ||
| 4: | ||
| 5: Calculate | − | − |
| 6: | ||
| 7: | ||
| 9: | ||
| 10: | − | − |
| 11: | ||
| 12: | − | − |
| 13: | ||
| 14: | 1 | |
| 15: | ||
| 2 | ||
Experimental setups for secure errorless divisio.
|
|
|
| Public key size | Private key size | |
|---|---|---|---|---|---|
| (30,30) | 907 | 23 | 678 | 0.67 GB | 0.68 GB |
| (40,40) | 1,601 | 26 | 1,309 | 1.00 GB | 1.00 GB |
| (50,50) | 2,503 | 29 | 276 | 0.50 GB | 0.51 GB |
| (60,60) | 3,607 | 30 | 270 | 0.67 GB | 0.68 GB |
| (70,70) | 4,903 | 31 | 3,144 | 3.30 GB | 3.30 GB |
| (80,80) | 6,421 | 31 | 342 | 0.81 GB | 0.82 GB |
| (90,90) | 8,101 | 31 | 309 | 0.81 GB | 0.82 GB |
| (100,100) | 10,007 | 33 | 5,952 | 3.40 GB | 3.40 GB |
The inputs are positive integers m (i.e., dividend) and w (i.e., divisor) with corresponding upper bounds and . p is plaintext base; L is number of levels in modulus chain; and Lis number of slots for parallel computation. Moreover, the storage costs of key generation are also provided as reference.
Time cost in seconds for key generation, encryption, and errorless division computation using various parameters.
| Key generation | Encryption | Execution time | ||
|---|---|---|---|---|
| Total | Average | |||
| (30,30) | 44.8395 | 9.13476 | 9.13476 | 0.0135 |
| (40,40) | 64.4364 | 9.61973 | 9.61973 | 0.0074 |
| (50,50) | 76.5504 | 11.3389 | 11.3389 | 0.0411 |
| (60,60) | 73.7685 | 12.0161 | 12.0161 | 0.0445 |
| (70,70) | 117.846 | 13.9717 | 13.9717 | 0.0044 |
| (80,80) | 87.9779 | 4.14286 | 13.3369 | 0.0390 |
| (90,90) | 87.9528 | 4.10576 | 15.5242 | 0.0502 |
| (100,100) | 127.002 | 16.7352 | 16.7352 | 0.0028 |
The average execution time is obtained by averaging over all the slots used.
Time cost in seconds for key generation, encryption, and the computation of chiRsquare statistics using different parameters based on secure approximation division.
| # of SNPs | Key generation | Encryption | Execution time | |
|---|---|---|---|---|
| Total | Average | |||
| 311 | 212.32 | 355.61 | 286.75 | 0.92 |
| 610 | 222.53 | 428.05 | 315.67 | 0.52 |
The average execution time is obtained by averaging over all the slots used.
Recall and precision with different p-value cutoffs in identifying significant SNPS on both datasets, where the mean-squared error (MSE) and maximum error between the exact and the approximate chi-square statistics
| # of SNPs | # of significant SNPs | Precision | Recall | |||
|---|---|---|---|---|---|---|
| 311 | 0.05 | 24 | 1 | 1 | 3.21 | 5.5 |
| 0.01 | 20 | 1 | 1 | |||
| 0.005 | 20 | 1 | 1 | |||
| 610 | 0.05 | 56 | 1 | 1 | 4.07 | 6.0 |
| 0.01 | 27 | 1 | 1 | |||
| 0.005 | 23 | 1 | 1 | |||
Time cost in seconds for key generation, encryption and the computation of chi8squared statistics using different parameters based on secure errorless division (ED) and secure approximation division (AD) protocols.
| # of SNPs | Key generation | Encryption | Execution time | |||
|---|---|---|---|---|---|---|
| ED | AD | ED | AD | ED | AD | |
| 311 | 2206 | 9575 | 1900 | |||
| 610 | 2131 | 9026 | 1660 | |||
L (i
| # of SNPs |
| Public key size | Private key size | |||
|---|---|---|---|---|---|---|
| ED | AD | ED | AD | ED | AD | |
| 311 | 151 | 23.3GB | 23.6GB | |||
| 610 | ||||||
Complexity analysis in terms of cumulative circuit depth2 (CCD) and the number of homomorphic multiplications (HMs) for secure errorless division protocol (Algorithm 1).
| Algorithm 1 | CCD | # of HMs |
|---|---|---|
| 1: Let | ||
| 2: Let | ||
| 3: Decompose | − | − |
| 4: | ||
| 5: | 1 | |
| 6: | ||
| 7: | ||
| 8: | 1 | |
| 9: | ||