Academic literature on the topic 'Genomic data security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Genomic data security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Genomic data security"

1

Vavekanand, Raja. "Data Security and Privacy in Genomics Research: A Comparative Analysis to Protect Confidentiality." Studies in Medical and Health Sciences 1, no. 1 (2024): 23–31. http://dx.doi.org/10.48185/smhs.v1i1.1158.

Full text
Abstract:
The quick progress of genomics examination has driven a surge in the creation of significantly fragile genomic data, making ensuring its security essential. This data contains sensitive information roughly an individual's prosperity, family history, and defencelessness to ailments. Unauthorized access or mishandling can lead to isolation, stigmatization, and mystery breaches. The potential threats to genomic data affirmation are multifaceted, checking the chance of re-identification and extended defense lessness to data breaches, hacking events, and unauthorized get to by harmful actors. To address these challenges, a multifaceted approach is required, tallying solid privacy-preserving methods, securing data capacity, and transmission sharpens, and getting to controls. Encryption techniques, differential security methods, and secure multiparty computation offer promising streets for securing genomic data while progressing collaborative ask approximately. Establishing clear authority frameworks and rules for data management, capacity, and sharing is essential to reduce security threats in genomics research. Collaboration between researchers, policymakers, industry partners, and support groups is essential for developing comprehensive methods to protect genomic data security. By prioritizing security concerns and executing effective safeguards, the community can uphold individuals' rights, maintain open acceptance, and drive advancements in genomics research for the betterment of society.
APA, Harvard, Vancouver, ISO, and other styles
2

Smith, Marcus, and Ausma Bernot. "Government and Commercial Interests in Genomics: Improving Data Security and Regulation." Law, Technology and Humans 6, no. 1 (2024): 88–100. http://dx.doi.org/10.5204/lthj.3256.

Full text
Abstract:
The relationship between new technologies and security is well established in the fields of defence, law enforcement, communications and public health. This has been highlighted by recent public debate about the security implications of data held by companies operating in social media and information technology (such as TikTok and Huawei). While genomic technology had been less high profile in the context of security, this changed following the COVID-19 pandemic, which focused attention on the significant implications of this form of data. This article discusses commercial genomic technology, related government interests and the growing implications for data security and regulation, such as through the example of the Beijing Genomics Institute, a large company providing genomic testing services to consumers worldwide. We suggest that commercial genomic data has growing implications for countries such as the United States and Australia and argue for greater attention to be directed to this form of technology and associated data security and regulation, including security assessment to address the risks associated with international transfer via corporate entities.
APA, Harvard, Vancouver, ISO, and other styles
3

Mohammed Yakubu, Abukari, and Yi-Ping Phoebe Chen. "Ensuring privacy and security of genomic data and functionalities." Briefings in Bioinformatics 21, no. 2 (2019): 511–26. http://dx.doi.org/10.1093/bib/bbz013.

Full text
Abstract:
Abstract In recent times, the reduced cost of DNA sequencing has resulted in a plethora of genomic data that is being used to advance biomedical research and improve clinical procedures and healthcare delivery. These advances are revolutionizing areas in genome-wide association studies (GWASs), diagnostic testing, personalized medicine and drug discovery. This, however, comes with security and privacy challenges as the human genome is sensitive in nature and uniquely identifies an individual. In this article, we discuss the genome privacy problem and review relevant privacy attacks, classified into identity tracing, attribute disclosure and completion attacks, which have been used to breach the privacy of an individual. We then classify state-of-the-art genomic privacy-preserving solutions based on their application and computational domains (genomic aggregation, GWASs and statistical analysis, sequence comparison and genetic testing) that have been proposed to mitigate these attacks and compare them in terms of their underlining cryptographic primitives, security goals and complexities—computation and transmission overheads. Finally, we identify and discuss the open issues, research challenges and future directions in the field of genomic privacy. We believe this article will provide researchers with the current trends and insights on the importance and challenges of privacy and security issues in the area of genomics.
APA, Harvard, Vancouver, ISO, and other styles
4

P., Shobha, and Nalini N. "Genomic Data Fusion using Paillier Cryptosystem." Journal of Current Science and Technology 14, no. 3 (2024): 57. http://dx.doi.org/10.59796/jcst.v14n3.2024.57.

Full text
Abstract:
The proposed work performs secure data fusion using homomorphic encryption, specifically the Paillier cryptosystem. The Paillier cryptosystem allows computation to be performed on encrypted data without decrypting it first, thus ensuring the privacy and security of the computation. The experiment measures the algorithm's performance based on execution time, memory usage, security, accuracy, and scalability. The data-level Paillier cryptosystem approach is generally slower than the feature-level fusion method due to its more complex operations and computations. Scalability is limited by the time required for encryption, homomorphic addition, and decryption. Improving scalability can be achieved by parallelizing the encryption and decryption steps, optimizing the homomorphic addition algorithm, or using more efficient cryptographic primitives. The article compares the performance of the Paillier cryptosystem with differential privacy in terms of their advantages and disadvantages. By adopting a preemptive approach to data fusion security, healthcare organizations can minimize the risk of data breaches and protect patient privacy. Data fusion security is an important factor when dealing with medical records. In the field of medical records, data fusion refers to the method of combining multiple sources of data into a distinct record. This can include data from electronic health records (EHRs), medical imaging devices, wearable devices, and other sources. There are several security considerations that must be addressed when fusing data from multiple sources.
APA, Harvard, Vancouver, ISO, and other styles
5

Villanueva, Angela G., Robert Cook-Deegan, Jill O. Robinson, Amy L. McGuire, and Mary A. Majumder. "Genomic Data-Sharing Practices." Journal of Law, Medicine & Ethics 47, no. 1 (2019): 31–40. http://dx.doi.org/10.1177/1073110519840482.

Full text
Abstract:
Making data broadly accessible is essential to creating a medical information commons (MIC). Transparency about data-sharing practices can cultivate trust among prospective and existing MIC participants. We present an analysis of 34 initiatives sharing DNA-derived data based on public information. We describe data-sharing practices captured, including practices related to consent, privacy and security, data access, oversight, and participant engagement. Our results reveal that data-sharing initiatives have some distance to go in achieving transparency.
APA, Harvard, Vancouver, ISO, and other styles
6

Prodduturi, Viswaketan Reddy. "GENOMIC DATA SECURITY AND PRIVACY IN HEALTHCARE INFORMATICS." INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND INFORMATION TECHNOLOGY 8, no. 1 (2025): 563–73. https://doi.org/10.34218/ijrcait_08_01_044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yeh, Kenneth, Jeanne Fair, Helen Cui, et al. "Achieving Health Security and Threat Reduction through Sharing Sequence Data." Tropical Medicine and Infectious Disease 4, no. 2 (2019): 78. http://dx.doi.org/10.3390/tropicalmed4020078.

Full text
Abstract:
With the rapid development and broad applications of next-generation sequencing platforms and bioinformatic analytical tools, genomics has become a popular area for biosurveillance and international scientific collaboration. Governments from countries including the United States (US), Canada, Germany, and the United Kingdom have leveraged these advancements to support international cooperative programs that aim to reduce biological threats and build scientific capacity worldwide. A recent conference panel addressed the impacts of the enhancement of genomic sequencing capabilities through three major US bioengagement programs on international scientific engagement and biosecurity risk reduction. The panel contrasted the risks and benefits of supporting the enhancement of genomic sequencing capabilities through international scientific engagement to achieve biological threat reduction and global health security. The lower costs and new bioinformatic tools available have led to the greater application of sequencing to biosurveillance. Strengthening sequencing capabilities globally for the diagnosis and detection of infectious diseases through mutual collaborations has a high return on investment for increasing global health security. International collaborations based on genomics and shared sequence data can build and leverage scientific networks and improve the timeliness and accuracy of disease surveillance reporting needed to identify and mitigate infectious disease outbreaks and comply with international norms. Further efforts to promote scientific transparency within international collaboration will improve trust, reduce threats, and promote global health security.
APA, Harvard, Vancouver, ISO, and other styles
8

Venkata, Murali Krishna Neursu, Kilaru Kalyan, and Reddy Vatti Vineeth. "Genomic Data Engineering: AI-Enhanced Storage, Processing, and Analysis for Biotechnology Innovations." Global Journal of Engineering and Technology [GJET] 4, no. 2 (2025): 10–12. https://doi.org/10.5281/zenodo.14964119.

Full text
Abstract:
<em>The field of genomic data engineering has been revolutionized by artificial intelligence (AI), enabling efficient storage, processing, and analysis of massive biological datasets. AI-driven techniques enhance the accuracy of genome sequencing, accelerate biomedical research, and facilitate personalized medicine. However, managing and processing genomic data presents challenges related to computational complexity, data security, and scalability. This research explores AI-based methods for optimizing genomic data storage, processing pipelines, and predictive analytics. The study highlights the role of deep learning, cloud computing, edge AI, and Salesforce-driven data management solutions in advancing genomic research, offering insights into future trends in biotechnology innovations.</em>
APA, Harvard, Vancouver, ISO, and other styles
9

Ammar, Alzaydi, Abedalrhman Kahtan, Nurhaliza Siti, and Ismail Mohd. "Enhancing Cyber Defense Mechanisms for Genomic Data in Personalized Healthcare Systems." Applied Science and Biotechnology Journal for Advanced Research 3, no. 5 (2024): 20–30. https://doi.org/10.5281/zenodo.13852606.

Full text
Abstract:
In the era of personalized medicine, genomic data emerges as a cornerstone for tailored healthcare solutions, offering unprecedented opportunities for disease prediction and prevention. However, this sensitive data is increasingly vulnerable to cyber threats that compromise patient privacy and system integrity. Addressing this critical issue, our research introduces a novel cybersecurity framework specifically designed to protect genomic information within healthcare systems. We develop and implement advanced cryptographic methods, real-time intrusion detection systems, and secure data sharing protocols to construct a robust defense mechanism. Through extensive simulations, we evaluate the efficacy of our framework against a range of cyber threats, demonstrating significant enhancements in security measures. Our findings reveal that the proposed solution not only fortifies the security of genomic data but also ensures compliance with regulatory standards and ethical guidelines. This paper contributes a methodologically sound approach to cybersecurity in healthcare, proposing a scalable and efficient framework that paves the way for safer genomic data handling in the realm of personalized medicine.
APA, Harvard, Vancouver, ISO, and other styles
10

Gudodagi, Raveendra, and R. Venkata Siva Reddy. "Security Provisioning and Compression of Diverse Genomic Data based on Advanced Encryption Standard (AES) Algorithm." International Journal of Biology and Biomedical Engineering 15 (May 14, 2021): 104–12. http://dx.doi.org/10.46300/91011.2021.15.14.

Full text
Abstract:
Compression of genomic data has gained enormous momentum in recent years because of advances in technology, exponentially growing health concerns, and government funding for research. Such advances have driven us to personalize public health and medical care. These pose a considerable challenge for ubiquitous computing in data storage. One of the main issues faced by genomic laboratories is the 'cost of storage' due to the large data file of the human genome (ranging from 30 GB to 200 GB). Data preservation is a set of actions meant to protect data from unauthorized access or changes. There are several methods used to protect data, and encryption is one of them. Protecting genomic data is a critical concern in genomics as it includes personal data. We suggest a secure encryption and decryption technique for diverse genomic data (FASTA / FASTQ format) in this article. Since we know the sequenced data is massive in bulk, the raw sequenced file is broken into sections and compressed. The Advanced Encryption Standard (AES) algorithm is used for encryption, and the Galois / Counter Mode (GCM) algorithm, is used to decode the encrypted data. This approach reduces the amount of storage space used for the data disc while preserving the data. This condition necessitates the use of a modern data compression strategy. That not only reduces storage but also improves process efficiency by using a k-th order Markov chain. In this regard, no efforts have been made to address this problem separately, from both the hardware and software realms. In this analysis, we support the need for a tailor-made hardware and software ecosystem that will take full advantage of the current stand-alone solutions. The paper discusses sequenced DNA, which may take the form of raw data obtained from sequencing. Inappropriate use of genomic data presents unique risks because it can be used to classify any individual; thus, the study focuses on the security provisioning and compression of diverse genomic data using the Advanced Encryption Standard (AES) Algorithm.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Genomic data security"

1

Niyitegeka, David. "Composition de mécanismes cryptographiques et de tatouage pour la protection de données génétiques externalisées." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0225.

Full text
Abstract:
De nos jours, le “cloud computing” permet de mutualiser et de traiter de grandes quantités de données génétiques à un coût minime et sans avoir à maintenir une infrastructure propre. Ces données sont notamment utilisées dans des études d'association pangénomiques (“Genome Wide Association Studies” ou GWAS) afin d’identifier des variants génétiques associées à certaines maladies. Cependant, leur externalisation induit de nombreux problèmes en matière de sécurité. Notamment, le génome humain représente l'unique identité biologique d’un individu et est donc par nature une information très sensible. L'objectif de ces travaux de thèse est de protéger des données génétiques lors de leur partage, stockage et traitement sur le cloud. Nous avons développé différents outils de sécurité fondés sur le tatouage, des mécanismes cryptographiques et leur combinaison. Dans un premier temps, en utilisant le chiffrement homomorphe, nous avons proposé une version originale sécurisée de l’approche GWAS fondée sur la technique dite “collapsing method” ; une technique qui s’appuie sur la régression logistique. Pour faire face aux problèmes de complexité de calcul et de mémoire liés à l’exploitation du chiffrement homomorphe, nous avons proposé un protocole qui profite de différents outils cryptographiques (PGP, fonction de hachage) pour partager entre plusieurs unités de recherche des études GWAS sur des variants rares de manière sécurisée, cela sans augmenter la complexité de calcul. En parallèle, nous avons développé une méthode de crypto-tatouage qui exploite la sécurité sémantique des schémas de chiffrement homomorphe, pour permettre à un cloud de protéger/vérifier l’intégrité de bases de données génétiques externalisées par différents utilisateurs. Ce schéma de crypto-tatouage est dynamique dans le sens où le tatouage est réactualisé au fil des mises à jour des données par leurs propriétaires sans cependant retatouer l’ensemble des jeux de données. Dans le même temps, nous avons proposé la première solution de tatouage robuste qui permet de protéger la propriété intellectuelle et le traçage de traitres pour des données génétiques utilisées dans des GWAS<br>Nowadays, cloud computing allows researchers and health professionals to flexibly store and process large amounts of genetic data remotely, without a need to purchase and to maintain their own infrastructures. These data are especially used in genome-wide association studies (GWAS) in order to conduct the identification of genetic variants that are associated with some diseases. However, genetic data outsourcing or sharing in the cloud induces many security issues. In addition, a human genome is very sensitive by nature and represents the unique biological identity of its owner. The objective of this thesis work is to protect genetic data during their sharing, storage and processing. We have developped new security tools that are based on watermarking and cryptographic mechanisms, as well as on the combination of them. First, we have proposed a privacy-preserving method that allows to compute the secure collapsing method based on the logistic regression model using homomorphic encryption (HE). To overcome the computational and storage overhead of HE-based solutions, we have developed a framework that allows secure performing of GWAS for rare variants without increasing complexity compared to its nonsecure version. It is based on several security mechanisms including encryption. In parallel of these works, we have exploited the semantic security of some HE schemes so as to develop a dynamic watermarking method that allows integrity control for encrypted data. At last, we have developed a robust watermarking tool for GWAS data for traitor tracing purposes
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Genomic data security"

1

Humbert, Mathias, Erman Ayday, Jean-Pierre Hubaux, and Amalio Telenti. "On Non-cooperative Genomic Privacy." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-47854-7_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ayday, Erman. "Cryptographic Solutions for Genomic Privacy." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-53357-4_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ayday, Erman, Jean Louis Raisaro, Urs Hengartner, Adam Molyneaux, and Jean-Pierre Hubaux. "Privacy-Preserving Processing of Raw Genomic Data." In Data Privacy Management and Autonomous Spontaneous Security. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54568-9_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yamamoto, Akito, and Tetsuo Shibuya. "Privacy-Preserving Genomic Statistical Analysis Under Local Differential Privacy." In Data and Applications Security and Privacy XXXVII. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-37586-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhao, Chuan, Shengnan Zhao, Bo Zhang, Shan Jing, Zhenxiang Chen, and Minghao Zhao. "Towards Secure Computation of Similar Patient Query on Genomic Data Under Multiple Keys." In Cyberspace Safety and Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37352-8_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Vasanth, R., and Dinesh Jackson Samuel. "Providing Data Security in Deep Learning by Using Genomic Procedure." In Advances in Intelligent Systems and Computing. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-0199-9_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Teruya, Tadanori, Koji Nuida, Kana Shimizu, and Goichiro Hanaoka. "On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic Data." In Advances in Information and Computer Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-22425-1_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Jing, Zhiping Chen, Linai Kuang, et al. "Security Count Query and Integrity Verification Based on Encrypted Genomic Data." In Proceedings of the 9th International Conference on Computer Engineering and Networks. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-3753-0_63.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Habyarimana, Ephrem. "Future Vision, Summary and Outlook." In Big Data in Bioeconomy. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71069-9_21.

Full text
Abstract:
AbstractThe DataBio’s agriculture pilots were carried out through a multi-actor whole-farm management approach using information technology, satellite positioning and remote sensing data as well as Internet of Things technology. The goal was to optimize the returns on inputs while reducing environmental impacts and streamlining the CAP monitoring. Novel knowledge was delivered for a more sustainable agriculture in line with the FAO call to achieve global food security and eliminate malnutrition for the more than nine billion people by 2050. The findings from the pilots shed light on the potential of digital agriculture to solve Europe’s concern of the declining workforce in the farming industry as the implemented technologies would help run farms with less workforce and manual labor. The pilot applications of big data technologies included autonomous machinery, mapping of yield, variable rate of applying agricultural inputs, input optimization, crop performance and in-season yields prediction as well as the genomic prediction and selection method allowing to cut cost and duration of cultivar development. The pilots showed their potential to transform agriculture, and the improved predictive analytics is expected to play a fundamental role in the production environment. As AI models are retrained with more data, the decision support systems become more accurate and serve the farmer better, leading to faster adoption. Adoption is further stimulated by cooperation between farmers to share investment costs and technological platforms allowing farmers to benchmark among themselves and across cropping season.
APA, Harvard, Vancouver, ISO, and other styles
10

Pálhalmi, János, and Anna Mező. "AI-Powered Microscopy Platform for Airborne Biothreat Detection." In Security Informatics and Law Enforcement. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62083-6_10.

Full text
Abstract:
AbstractBecause Bacillus anthracis is one of the most lethal bioweapons, it is critical to create rapid, label-free screening and early warning systems to detect and classify anomalies in bacillus form vegetative cell and spore concentrations in the air. Even though significant effort has been invested in the development of various sensor solutions to detect, monitor, and identify airborne biological agents, no standard, interoperable, real-time or near-real-time optical sensor-based biothreat monitoring solution exists. Aside from the numerous advantages of genomic methods in microbe identification, optical sensors and microscopy-based technologies provide advantages in terms of rapid detection and classification capabilities. The AI-powered biothreat detection software platform from DataSenseLabs can perform intermethod comparison to cross-validate the results acquired by various quantitative phase imaging (QPI) measurement methodologies. This platform feature—support for multisensory data input—is not merely the foundation of the R&amp;D level cross-validation approach, but also the key component of interoperable verification of air sample content in the case of airborne biothreat. Depending on the study design, sample type, and light microscopic or QPI measurement method, the platform’s algorithm system can detect and monitor abnormalities in the concentration of bacillus form objects taken from the air with greater than 80–95% accuracy. Another goal of the platform is to serve as a standardized tool for biomedical, environmental, and CBRN scientists to train and validate their concepts in pathogen detection and classification use cases, allowing them to better understand the gaps and challenges associated with artificial intelligence-powered optical sensor systems.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Genomic data security"

1

Naveed, Muhammad. "Hurdles for Genomic Data Usage Management." In 2014 IEEE Security and Privacy Workshops (SPW). IEEE, 2014. http://dx.doi.org/10.1109/spw.2014.44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Goodrich, Michael T. "The Mastermind Attack on Genomic Data." In 2009 30th IEEE Symposium on Security and Privacy (SP). IEEE, 2009. http://dx.doi.org/10.1109/sp.2009.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Oprisanu, Bristena, Georgi Ganev, and Emiliano De Cristofaro. "On Utility and Privacy in Synthetic Genomic Data." In Network and Distributed System Security Symposium. Internet Society, 2022. http://dx.doi.org/10.14722/ndss.2022.24092.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Huang, Zhicong, Erman Ayday, Jacques Fellay, Jean-Pierre Hubaux, and Ari Juels. "GenoGuard: Protecting Genomic Data against Brute-Force Attacks." In 2015 IEEE Symposium on Security and Privacy (SP). IEEE, 2015. http://dx.doi.org/10.1109/sp.2015.34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cheng, Ke, Yantian Hou, and Liangmin Wang. "Secure Similar Sequence Query on Outsourced Genomic Data." In ASIA CCS '18: ACM Asia Conference on Computer and Communications Security. ACM, 2018. http://dx.doi.org/10.1145/3196494.3196535.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Migliore, Andrea, Stelvio Cimato, and Gabriella Trucco. "Efficient Secure Computation of Edit Distance on Genomic Data." In 10th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2024. http://dx.doi.org/10.5220/0012459400003648.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yilmaz, Emre, Tianxi Ji, Erman Ayday, and Pan Li. "Genomic Data Sharing under Dependent Local Differential Privacy." In CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy. ACM, 2022. http://dx.doi.org/10.1145/3508398.3511519.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Simmons, Sean, and Bonnie Berger. "One Size Doesn't Fit All: Measuring Individual Privacy in Aggregate Genomic Data." In 2015 IEEE Security and Privacy Workshops (SPW). IEEE, 2015. http://dx.doi.org/10.1109/spw.2015.25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ki, Youngjoon, and Ji Won Yoon. "An Efficient Method for Securely Storing and Handling of Genomic Data." In 2017 International Conference on Software Security and Assurance (ICSSA). IEEE, 2017. http://dx.doi.org/10.1109/icssa.2017.13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Turkmen, Fatih, Muhammad Rizwan Asghar, and Yuri Demchenko. "iGenoPri: Privacy-preserving genomic data processing with integrity and correctness proofs." In 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2016. http://dx.doi.org/10.1109/pst.2016.7906964.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Genomic data security"

1

Verzi, Stephen, Raga Krishnakumar, Drew Levin, Daniel Krofcheck, and Kelly Williams. Data Science and Machine Learning for Genome Security. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1855003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fromm, Hillel, Paul Michael Hasegawa, and Aaron Fait. Calcium-regulated Transcription Factors Mediating Carbon Metabolism in Response to Drought. United States Department of Agriculture, 2013. http://dx.doi.org/10.32747/2013.7699847.bard.

Full text
Abstract:
Original objectives: The long-term goal of the proposed research is to elucidate the transcription factors, genes and metabolic networks involved in carbon metabolism and partitioning in response to water deficit. The proposed research focuses on the GTLcalcium/calmodulinbindingTFs and the gene and metabolic networks modulated by these TFs in Arabidopsis thaliana. The specific objectives are as follows. Objective-1 (USA): Physiological analyses of GTL1 loss- and gain-of-function plants under water sufficient and drought stress conditions Objective 2 (USA / Israel-TAU): Characterizion of GTL target genes and bioinformatic analysis of data to eulcidate gene-network topology. Objective-3 (Israel-TAU): Regulation of GTLmediated transcription by Ca²⁺/calmodulin: mechanism and biological significance. Objective-4 (Israel-BGU): Metabolic networks and carbon partitioning in response to drought. Additional direction: In the course of the project we added another direction, which was reported in the 2nd annual report, to elucidate genes controlling drought avoidance. The TAU team has isolated a few unhydrotropic (hyd) mutants and are in the process of mapping these mutations (of hyd13 and hyd15; see last year's report for a description of these mutants under salt stress) in the Arabidopsis genome by map-based cloning and deep sequencing. For this purpose, each hyd mutant was crossed with a wild type plant of the Landsberg ecotype, and at the F2 stage, 500-700 seedlings showing the unhydrotropic phenotype were collected separately and pooled DNA samples were subkected to the Illumina deep sequencing technology. Bioinformatics were used to identify the exact genomic positions of the mutations (based on a comparison of the genomic sequences of the two Arabidopsis thaliana ecotypes (Columbia and Landsberg). Background: To feed the 9 billion people or more, expected to live on Earth by the mid 21st century, the production of high-quality food must increase substantially. Based on a 2009 Declaration of the World Summit on Food Security, a target of 70% more global food production by the year 2050 was marked, an unprecedented food-production growth rate. Importantly, due to the larger areas of low-yielding land globally, low-yielding environments offer the greatest opportunity for substantial increases in global food production. Nowadays, 70% of the global available water is used by agriculture, and 40% of the world food is produced from irrigated soils. Therefore, much needs to be done towards improving the efficiency of water use by plants, accompanied by increased crop yield production under water-limiting conditions. Major conclusions, solutions and achievements: We established that AtGTL1 (Arabidopsis thaliana GT-2 LIKE1) is a focal determinant in water deficit (drought) signaling and tolerance, and water use efficiency (WUE). The GTL1 transcription factor is an upstream regulator of stomatal development as a transrepressor of AtSDD1, which encodes a subtilisin protease that activates a MAP kinase pathway that negatively regulates stomatal lineage and density. GTL1 binds to the core GT3 cis-element in the SDD1 promoter and transrepresses its expression under water-sufficient conditions. GTL1 loss-of-function mutants have reduced stomatal number and transpiration, and enhanced drought tolerance and WUE. In this case, higher WUE under water sufficient conditions occurs without reduction in absolute biomass accumulation or carbon assimilation, indicating that gtl1-mediated effects on stomatal conductance and transpiration do not substantially affect CO₂ uptake. These results are proof-of-concept that fine-tuned regulation of stomatal density can result in drought tolerance and higher WUE with maintenance of yield stability. Implications: Accomplishments during the IS-4243-09R project provide unique tools for continued discovery research to enhance plant drought tolerance and WUE.
APA, Harvard, Vancouver, ISO, and other styles
3

Lers, Amnon, Majid R. Foolad, and Haya Friedman. genetic basis for postharvest chilling tolerance in tomato fruit. United States Department of Agriculture, 2014. http://dx.doi.org/10.32747/2014.7600014.bard.

Full text
Abstract:
ABSTRACT Postharvest losses of fresh produce are estimated globally to be around 30%. Reducing these losses is considered a major solution to ensure global food security. Storage at low temperatures is an efficient practice to prolong postharvest performance of crops with minimal negative impact on produce quality or human health and the environment. However, many fresh produce commodities are susceptible to chilling temperatures, and the application of cold storage is limited as it would cause physiological chilling injury (CI) leading to reduced produce quality. Further, the primary CI becomes a preferred site for pathogens leading to decay and massive produce losses. Thus, chilling sensitive crops should be stored at higher minimal temperatures, which curtails their marketing life and in some cases necessitates the use of other storage strategies. Development of new knowledge about the biological basis for chilling tolerance in fruits and vegetables should allow development of both new varieties more tolerant to cold, and more efficient postharvest storage treatments and storage conditions. In order to improve the agricultural performance of modern crop varieties, including tomato, there is great potential in introgression of marker-defined genomic regions from wild species onto the background of elite breeding lines. To exploit this potential for improving tomato fruit chilling tolerance during postharvest storage, we have used in this research a recombinant inbred line (RIL) population derived from a cross between the red-fruited tomato wild species SolanumpimpinellifoliumL. accession LA2093 and an advanced Solanum lycopersicumL. tomato breeding line NCEBR-1, developed in the laboratory of the US co-PI. The original specific objectives were: 1) Screening of RIL population resulting from the cross NCEBR1 X LA2093 for fruit chilling response during postharvest storage and estimation of its heritability; 2) Perform a transcriptopmic and bioinformatics analysis for the two parental lines following exposure to chilling storage. During the course of the project, we learned that we could measure greater differences in chilling responses among specific RILs compared to that observed between the two parental lines, and thus we decided not to perform transcriptomic analysis and instead invest our efforts more on characterization of the RILs. Performing the transcriptomic analysis for several RILs, which significantly differ in their chilling tolerance/sensitivity, at a later stage could result with more significant insights. The RIL population, (172 lines), was used in field experiment in which fruits were examined for chilling sensitivity by determining CI severity. Following the field experiments, including 4 harvest days and CI measurements, two extreme tails of the response distribution, each consisting of 11 RILs exhibiting either high sensitivity or tolerance to chilling stress, were identified and were further examined for chilling response in greenhouse experiments. Across the RILs, we found significant (P &lt; 0.01) correlation between field and greenhouse grown plants in fruit CI. Two groups of 5 RILs, whose fruits exhibited reproducible chilling tolerant/sensitive phenotypes in both field and greenhouse experiments, were selected for further analyses. Numerous genetic, physiological, biochemical and molecular variations were investigated in response to postharvest chilling stress in the selected RILs. We confirmed the differential response of the parental lines of the RIL population to chilling stress, and examined the extent of variation in the RIL population in response to chilling treatment. We determined parameters which would be useful for further characterization of chilling response in the RIL population. These included chlorophyll fluorescence Fv/Fm, water loss, total non-enzymatic potential of antioxidant activity, ascorbate and proline content, and expression of LeCBF1 gene, known to be associated with cold acclimation. These parameters could be used in continuation studies for the identification and genetic mapping of loci contributing to chilling tolerance in this population, and identifying genetic markers associated with chilling tolerance in tomato. Once genetic markers associated with chilling tolerance are identified, the trait could be transferred to different genetic background via marker-assisted selection (MAS) and breeding. The collaborative research established in this program has resulted in new information and insights in this area of research and the collaboration will be continued to obtain further insights into the genetic, molecular biology and physiology of postharvest chilling tolerance in tomato fruit. The US Co-PI, developed the RIL population that was used for screening and measurement of the relevant chilling stress responses and conducted statistical analyses of the data. Because we were not able to grow the RIL population under field conditions in two successive generations, we could not estimate heritability of response to chilling temperatures. However, we plan to continue the research, grow the RIL progeny in the field again, and determine heritability of chilling tolerance in a near future. The IS and US investigators interacted regularly and plan to continue and expand on this study, since combing the expertise of the Co-PI in genetics and breeding with that of the PI in postharvest physiology and molecular biology will have great impact on this line of research, given the significant findings of this one-year feasibility project.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!