TY - JOUR
T1 - ACE
T2 - A Consent-Embedded privacy-preserving search on genomic database
AU - Jafarbeiki, Sara
AU - Sakzad, Amin
AU - Steinfeld, Ron
AU - Kasra Kermanshahi, Shabnam
AU - Thapa, Chandra
AU - Kume, Yuki
N1 - Publisher Copyright:
© 2024 The Authors
PY - 2024/4/30
Y1 - 2024/4/30
N2 - In this paper, we introduce ACE, a consent-embedded searchable encryption scheme. ACE enables dynamic consent management by supporting the physical deletion of associated data at the time of consent revocation. This ensures instant real deletion of data, aligning with privacy regulations and preserving individuals' rights. We evaluate ACE in the context of genomic databases, demonstrating its ability to perform the addition and deletion of genomic records and related information based on ID, which especially complies with the requirements of deleting information of a particular data owner. To formally prove that ACE is secure under non-adaptive attacks, we present two new definitions of forward and backward privacy. We also define a new hard problem, which we call D-ACE, that facilitates the proof of our theorem (we formally prove its hardness by a security reduction from DDH to D-ACE). We finally present implementation results to evaluate ACE's performance.
AB - In this paper, we introduce ACE, a consent-embedded searchable encryption scheme. ACE enables dynamic consent management by supporting the physical deletion of associated data at the time of consent revocation. This ensures instant real deletion of data, aligning with privacy regulations and preserving individuals' rights. We evaluate ACE in the context of genomic databases, demonstrating its ability to perform the addition and deletion of genomic records and related information based on ID, which especially complies with the requirements of deleting information of a particular data owner. To formally prove that ACE is secure under non-adaptive attacks, we present two new definitions of forward and backward privacy. We also define a new hard problem, which we call D-ACE, that facilitates the proof of our theorem (we formally prove its hardness by a security reduction from DDH to D-ACE). We finally present implementation results to evaluate ACE's performance.
KW - Cloud security
KW - Dynamic searchable encryption
KW - Genomic data privacy
KW - Querying of encrypted data
KW - Secure outsourcing
UR - http://www.scopus.com/inward/record.url?scp=85190357468&partnerID=8YFLogxK
U2 - 10.1016/j.heliyon.2024.e29399
DO - 10.1016/j.heliyon.2024.e29399
M3 - Article
AN - SCOPUS:85190357468
SN - 2405-8440
VL - 10
JO - Heliyon
JF - Heliyon
IS - 8
M1 - E29399
ER -