On the protection of consumer genomic data in the Internet of Living Things

Abstract Several companies have recently emerged to provide online Direct-To-Consumer (DTC) DNA analysis and sequencing . Those activities will be, in the near future, the foundations of the emerging Internet of Living Things . The concept of Internet of Living Things has been introduced to characterize networks of biological sequencing sensors, which could rely on cloud-based analysis capabilities, to support the users in deeply studying DNA or other molecules. Sequencing sensors have many fields of application and much more will likely to come. In this context, DNA microarray images represent the core of modern genomic data analysis, since they allow the simultaneous monitoring of many thousands of genes and represent a sort of “container”, not only for storing genomics data, but also for managing, sharing and exchanging such type of data. In this scenario, the ability to protect genomics and medical big data is a growing challenge. In particular, for what concerns DNA microarray images, the techniques commonly employed for data protection are not effective due for example to the unauthorized use or manipulation after decryption or the lost of metadata during image processing. In this paper we address the problem of protecting such type of information, by means of watermarking techniques. In particular, we propose reversible watermarking techniques explicitly tailored for the characteristics of DNA microarray images to ensure the protection of such images in terms of authenticity and integrity, besides enabling the binding of those imaging data with other information related to them. We assess the effectiveness and efficiency of our techniques by means of a working prototype.

[1]  Kim-Kwang Raymond Choo,et al.  Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds , 2016, Journal of Medical Systems.

[2]  Zhe Liu,et al.  Practical-oriented protocols for privacy-preserving outsourced big data analysis: Challenges and future research directions , 2017, Comput. Secur..

[3]  Kim-Kwang Raymond Choo,et al.  A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification , 2017, IEEE Transactions on Information Forensics and Security.

[4]  Donghyun Kim,et al.  A new outsourcing conditional proxy re‐encryption suitable for mobile cloud environment , 2017, Concurr. Comput. Pract. Exp..

[5]  Anirban Basu,et al.  Privacy-friendly secure bidding for smart grid demand-response , 2017, Inf. Sci..

[6]  Kim-Kwang Raymond Choo,et al.  A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network , 2018, IEEE Transactions on Dependable and Secure Computing.

[7]  Alfredo De Santis,et al.  On the Protection of fMRI Images in Multi-domain Environments , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications.

[8]  Marek R. Ogiela,et al.  Grammar Encoding in DNA-Like Secret Sharing Infrastructure , 2010, AST/UCMA/ISA/ACN.

[9]  Bruno Carpentieri,et al.  Lossless, low-complexity, compression of three-dimensional volumetric medical images via linear prediction , 2013, 2013 18th International Conference on Digital Signal Processing (DSP).

[10]  Alfredo De Santis,et al.  Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes , 2016, IEEE Transactions on Dependable and Secure Computing.

[11]  Alfredo De Santis,et al.  On-Board Format-Independent Security of Functional Magnetic Resonance Images , 2017, ACM Trans. Embed. Comput. Syst..

[12]  Bruno Carpentieri,et al.  Text Compression and Encryption through Smart Devices for Mobile Communication , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[13]  Andelka M. Phillips,et al.  ‘Only a click away — DTC genetics for ancestry, health, love…and more: A view of the business and regulatory landscape’ , 2016, Applied & translational genomics.

[14]  Akiyoshi Wakatani,et al.  Digital watermarking for ROI medical images by using compressed signature image , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[15]  Roberto Caldelli,et al.  Reversible Watermarking Techniques: An Overview and a Classification , 2010, EURASIP J. Inf. Secur..

[16]  Yaniv Erlich A vision for ubiquitous sequencing , 2015, bioRxiv.

[17]  Alfredo De Santis,et al.  Cloud-based adaptive compression and secure management services for 3D healthcare data , 2015, Future Gener. Comput. Syst..

[18]  Athanasios V. Vasilakos,et al.  Revocable Identity-Based Access Control for Big Data with Verifiable Outsourced Computing , 2017, IEEE Transactions on Big Data.

[19]  Bruno Carpentieri,et al.  The AVQ Algorithm: Watermarking and Compression Performances , 2011, 2011 Third International Conference on Intelligent Networking and Collaborative Systems.

[20]  A. Bovik,et al.  A universal image quality index , 2002, IEEE Signal Processing Letters.

[21]  Ajay N. Jain,et al.  Fully automatic quantification of microarray image data. , 2002, Genome research.

[22]  Christian Roux,et al.  Reversible Watermarking for Knowledge Digest Embedding and Reliability Control in Medical Images , 2009, IEEE Transactions on Information Technology in Biomedicine.

[23]  Yu Luo,et al.  Gridding and compression of microarray images , 2004, Proceedings. 2004 IEEE Computational Systems Bioinformatics Conference, 2004. CSB 2004..

[24]  Roy D. Sleator,et al.  'Big data', Hadoop and cloud computing in genomics , 2013, J. Biomed. Informatics.

[25]  Melanie Swan,et al.  Sensor Mania! The Internet of Things, Wearable Computing, Objective Metrics, and the Quantified Self 2.0 , 2012, J. Sens. Actuator Networks.

[26]  Ilsun You,et al.  A Secure Distributed Video Surveillance System Based on Portable Devices , 2012, CD-ARES.

[27]  Ilsun You,et al.  Secure and distributed video surveillance via portable devices , 2014, J. Ambient Intell. Humaniz. Comput..

[28]  Zhou Wang,et al.  Why is image quality assessment so difficult? , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[29]  Jeffrey G. Andrews,et al.  What Will 5G Be? , 2014, IEEE Journal on Selected Areas in Communications.

[30]  Mauro Barni,et al.  Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications , 2007 .

[31]  Jin Li,et al.  Hierarchical and Shared Access Control , 2016, IEEE Transactions on Information Forensics and Security.

[32]  Xinyi Huang,et al.  Cryptographic Hierarchical Access Control for Dynamic Structures , 2016, IEEE Transactions on Information Forensics and Security.

[33]  Nilanjan Dey,et al.  Internet of Things and Big Data Technologies for Next Generation Healthcare , 2017 .

[34]  Alfredo De Santis,et al.  Hierarchical and Shared Key Assignment , 2014, 2014 17th International Conference on Network-Based Information Systems.

[35]  Iuon-Chang Lin,et al.  Reversible Watermarking: Current Status and Key Issues , 2006, Int. J. Netw. Secur..

[36]  Osamah M. Al-Qershi,et al.  Authentication and Data Hiding Using a Hybrid ROI-Based Watermarking Scheme for DICOM Images , 2011, Journal of Digital Imaging.

[37]  Bruno Carpentieri,et al.  A Secure Low Complexity Approach for Compression and Transmission of 3-D Medical Images , 2013, 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications.

[38]  J. Murray,et al.  Personalized medicine: been there, done that, always needs work! , 2012, American journal of respiratory and critical care medicine.

[39]  Ton Kalker,et al.  Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform , 2007, IEEE Transactions on Information Forensics and Security.

[40]  A. Nordgren,et al.  Can genomics tell me who I am? Essentialistic rhetoric in direct-to-consumer DNA testing , 2009 .

[41]  Sheikh Iqbal Ahamed,et al.  A privacy preserving framework for RFID based healthcare systems , 2017, Future Gener. Comput. Syst..

[42]  Salim Hariri,et al.  IoT Security Framework for Smart Cyber Infrastructures , 2016, 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W).

[43]  Alfredo De Santis,et al.  Protection of Microscopy Images through Digital Watermarking Techniques , 2014, 2014 International Conference on Intelligent Networking and Collaborative Systems.