GeneCloud: Secure Cloud Computing for Biomedical Research

Applications in the biomedical sector have a rising demand for computational power due to the growing amount of biological data. However, the setup and maintenance of a sufficient computational infrastructure is costly. Cloud computing allows distributed computing over a network and maximizes the effectiveness of the shared resources. Nevertheless, security concerns rise when valuable research data is transferred to a public Cloud. Herein, we describe – from the application and security perspective – three biomedical case studies from different domains: Patent annotation, cancer outcome prediction, and drug target prediction. We elaborate on different strategies to secure the data and results in the Cloud as well as on the infrastructure needed. The proposed Cloud solutions could help to adapt other similar algorithms from different domains to benefit from Cloud computing.

[1]  Michael Schroeder,et al.  Drug Promiscuity in PDB: Protein Binding Site Similarity Is Key , 2013, PloS one.

[2]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[3]  Eugene H. Spafford,et al.  Secure outsourcing of scientific computations , 2001, Adv. Comput..

[4]  Michael Schroeder,et al.  GoPubMed: exploring PubMed with the Gene Ontology , 2005, Nucleic Acids Res..

[5]  Suzan Verberne,et al.  Quantifying the Challenges in Parsing Patent Claims , 2010, PaIR 2010.

[6]  C. Chong,et al.  New uses for old drugs , 2007, Nature.

[7]  Dan Boneh,et al.  Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.

[8]  Eugene H. Spafford,et al.  Secure Outsourcing of Some Computations , 1996 .

[9]  Allan Hanbury,et al.  1st international workshop on advances in patent information retrieval (AsPIRe'10) , 2010, SIGF.

[10]  Arun Krishnan GridBLAST: a Globus‐based high‐throughput implementation of BLAST in a Grid computing framework , 2005, Concurr. Comput. Pract. Exp..

[11]  Michael Schroeder,et al.  Google Goes Cancer: Improving Outcome Prediction for Cancer Patients by Network-Based Ranking of Marker Genes , 2012, PLoS Comput. Biol..

[12]  Cong Wang,et al.  Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.

[13]  Rajkumar Buyya,et al.  InterCloud: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services , 2010, ICA3PP.

[14]  Krishna P. Gummadi,et al.  Towards Trusted Cloud Computing , 2009, HotCloud.

[15]  Jean-François Méhaut,et al.  Resource Management of Virtual Infrastructure for On-demand SaaS Services , 2011, CLOSER.

[16]  Jeremy C. Morgan,et al.  A next generation sequence processing and analysis platform with integrated cloud-storage and high performance computing resources , 2012, BCB '12.

[17]  Jonathan Katz,et al.  Secure text processing with applications to private DNA matching , 2010, CCS '10.

[18]  Ahmad-Reza Sadeghi,et al.  Twin Clouds: Secure Cloud Computing with Low Latency - (Full Version) , 2011, Communications and Multimedia Security.

[19]  Ulf Leser,et al.  GeneView: a comprehensive semantic search engine for PubMed , 2012, Nucleic Acids Res..

[20]  Benjamin C. M. Fung,et al.  Privacy Preserving Record Linkage via grams Projections , 2012, ArXiv.

[21]  J. DiMasi,et al.  Trends in Risks Associated With New Drug Development: Success Rates for Investigational Drugs , 2010, Clinical pharmacology and therapeutics.

[22]  Florian Kerschbaum,et al.  Approximate Two-Party Privacy-Preserving String Matching with Linear Complexity , 2013, 2013 IEEE International Congress on Big Data.

[23]  Roberto Di Pietro,et al.  PRISM - Privacy-Preserving Search in MapReduce , 2012, Privacy Enhancing Technologies.

[24]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[25]  Michael Schroeder,et al.  Automated Patent Categorization and Guided Patent Search using IPC as Inspired by MeSH and PubMed , 2013, Journal of Biomedical Semantics.

[26]  Benny Rochwerger,et al.  Reservoir - When One Cloud Is Not Enough , 2011, Computer.

[27]  Andrew Chi-Chih Yao,et al.  How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).

[28]  Mikhail J. Atallah,et al.  Securely outsourcing linear algebra computations , 2010, ASIACCS '10.

[29]  Lei Xie,et al.  Detecting evolutionary relationships across existing fold space, using sequence order-independent profile–profile alignments , 2008, Proceedings of the National Academy of Sciences.