A secure system for genomics clinical decision support

Journal of Biomedical Informatics - Tập 112 - Trang 103602 - 2020
Seemeen Karimi1, Xiaoqian Jiang2, Robert H. Dolin1, Miran Kim2, Aziz Boxwala1
1Elimu Informatics Inc., Richmond, CA, United States
2UT Health School of Biomedical Informatics, Houston, TX, United States

Tài liệu tham khảo

Masys, 2012, Technical desiderata for the integration of genomic data into Electronic Health Records, J. Biomed. Inform., 45, 419, 10.1016/j.jbi.2011.12.005 Starren, 2013, Crossing the omic chasm: a time for omic ancillary systems, JAMA, 309, 1237, 10.1001/jama.2013.1579 Honeyman, 1994, Picture archiving and communications systems (PACS), Curr. Probl. Diagn. Radiol., 23, 101, 10.1016/0363-0188(94)90004-3 National Institute of Standards and Technology, NIST Cloud Computing Program - NCCP, Nov. 15, 2010. https://www.nist.gov/programs-projects/nist-cloud-computing-program-nccp (accessed Apr. 30, 2020). Lippert, 2017, Identification of individuals by trait prediction using whole-genome sequencing data, Proc. Natl. Acad. Sci., 114, 10166, 10.1073/pnas.1711125114 National Institute of Standards and Technology, NVD - Control - SC-28 - Protection of Information at Rest. https://nvd.nist.gov/800-53/Rev4/control/SC-28 (accessed Apr. 29, 2020). Office for Civil Rights (OCR), The Security Rule. US Department of Health and Human Services, 2017. Yao, 1986, How to generate and exchange secrets, 162 Pinkas, 2009, Secure Two-Party Computation Is Practical, Advances in Cryptology – ASIACRYPT 2009, 250, 10.1007/978-3-642-10366-7_15 Bellare, 2012, Foundations of garbled circuits, Proceedings of the 2012 ACM Conference on Computer and Communications Security, 784, 10.1145/2382196.2382279 Ben-Or, 1988, Completeness theorems for non-cryptographic fault-tolerant distributed computation, 1 Cho, 2018, Secure genome-wide association analysis using multiparty computation, Nat. Biotechnol., 36, 547, 10.1038/nbt.4108 Damgaard, 2012, Multiparty Computation from Somewhat Homomorphic Encryption, Advances in Cryptology – CRYPTO 2012, 643, 10.1007/978-3-642-32009-5_38 Jagadeesh, 2017, Deriving genomic diagnoses without revealing patient genomes, Science, 357, 692, 10.1126/science.aam9710 Aziz, 2017, Privacy-preserving techniques of genomic data—a survey, Brief. Bioinform., 20, 887, 10.1093/bib/bbx139 Chen, 2017, Princess: Privacy-protecting rare disease international network collaboration via encryption through software guard extensions, Bioinformatics, 33, 871, 10.1093/bioinformatics/btw758 Chen, 2017, PRESAGE: privacy-preserving genetic testing via software guard extension, BMC Med. Genomics, 10, 48 Sadat, 2018, SAFETY: Secure gwAs in Federated Environment Through a hYbrid solution Wang, 2016, HEALER: homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS, Bioinformatics, 32, 211, 10.1093/bioinformatics/btv563 Zhang, 2015, Foresee: Fully outsourced secure genome study based on homomorphic encryption, BMC Med. Informat. Decision Making, 15, S5, 10.1186/1472-6947-15-S5-S5 Schuster, 2015, VC3: trustworthy data analytics in the cloud using SGX, 38 A. Moghimi, T. Eisenbarth, B. Sunar, MemJam: A false dependency attack against constant-time crypto implementations in SGX, in: Topics in Cryptology – CT-RSA 2018, 2018, pp. 21–44. Evtyushkin, 2018, A New Side-Channel Attack on Directional Branch Predictor, SIGPLAN Not, 53, 693, 10.1145/3296957.3173204 CryptoExperts, Post-Quantum Cryptography. https://www.cryptoexperts.com/services/post_quantum_cryptography/ (accessed Apr. 29, 2020). Gentry, 2009, Fully homomorphic encryption using ideal lattices, 169 Wang, 2018, iDASH secure genome analysis competition 2017, BMC Med. Genomics, 11, 85, 10.1186/s12920-018-0396-0 Rasmussen, 2020, The genomic medical record and omic ancillary systems, 253 Walton, 2019, Genomic data in the electronic health record, Adv. Mol. Pathol., 2, 21, 10.1016/j.yamp.2019.07.001 Williams, 2019, Genomic information for clinicians in the electronic health record: lessons learned from the clinical genome resource project and the electronic medical records and genomics network, Front. Genet., 10, 10.3389/fgene.2019.01059 “Sync for Genes | HealthIT.gov.” https://www.healthit.gov/topic/sync-genes (accessed Jul. 24, 2020). Dolin, 2018, A pharmacogenomics clinical decision support service based on FHIR and CDS Hooks, Methods, Inf. Med., 57 Bell, 2014, Development and use of active clinical decision support for preemptive pharmacogenomics, J. Am. Med. Inform. Assoc. JAMIA, 21, e93, 10.1136/amiajnl-2013-001993 Relling, 2015, Pharmacogenomics in the clinic, Nature, 526, 343, 10.1038/nature15817 Van Driest, 2014, Clinically actionable genotypes among 10,000 patients with preemptive pharmacogenomic testing, Clin. Pharmacol. Ther., 95, 423, 10.1038/clpt.2013.229 “Clopidogrel Bisulfate - Drug Usage Statistics, ClinCalc DrugStats Database.” https://clincalc.com/DrugStats/Drugs/ClopidogrelBisulfate (accessed Apr. 28, 2020). “CPIC® Guideline for Clopidogrel and CYP2C19.” https://cpicpgx.org/guidelines/guideline-for-clopidogrel-and-cyp2c19/ (accessed Apr. 28, 2020). Kalia, 2017, Recommendations for reporting of secondary findings in clinical exome and genome sequencing, 2016 update (ACMG SF v2.0): a policy statement of the American College of Medical Genetics and Genomics, Genet. Med. Off. J. Am. Coll. Med. Genet., 19, 249 Dorschner, 2013, Actionable, pathogenic incidental findings in 1,000 participants’ exomes, Am. J. Hum. Genet., 93, 10.1016/j.ajhg.2013.08.006 Jang, 2015, Frequency and spectrum of actionable pathogenic secondary findings in 196 Korean exomes, Genet. Med. Off. J. Am. Coll. Med. Genet., 17 Thompson, 2018, Genomic sequencing identifies secondary findings in a cohort of parent study participants, Genet. Med. Off. J. Am. Coll. Med. Genet., 20 Landrum, 2016, ClinVar: public archive of interpretations of clinically relevant variants, Nucleic Acids Res., 44, 10.1093/nar/gkv1222 National Center for Biotechnology Information, NCBI ClinVar gene-specific summary, 2018, National Institutes of Health (NIH), ftp://ftp.ncbi.nlm.nih.gov/pub/clinvar/tab_delimited/archive/2018/gene_specific_summary_2018-01.txt.gz (accessed Apr. 28, 2020). Akioyamen, 2017, Estimating the prevalence of heterozygous familial hypercholesterolaemia: a systematic review and meta-analysis, BMJ Open, 7, 10.1136/bmjopen-2017-016461 de Ferranti, 2016, Prevalence of familial hypercholesterolemia in the 1999 to 2012 United States National Health and Nutrition Examination Surveys (NHANES), Circulation, 133, 10.1161/CIRCULATIONAHA.115.018791 Rehm, 2015, ClinGen–the clinical genome resource, N. Engl. J. Med., 372, 10.1056/NEJMsr1406261 US National Library of Medicine, A Study of CNP520 Versus Placebo in Participants at Risk for the Onset of Clinical Symptoms of Alzheimer’s Disease. https://clinicaltrials.gov/ct2/show/NCT03131453 (accessed Apr. 28, 2020). Reilly, 1998, Genetic risk assessment and insurance, Genet. Test., 2, 1, 10.1089/gte.1998.2.1 Naveed, 2015, Privacy in the genomic era, ACM Comput. Surv., 48, 10.1145/2767007 Molteni, 2018, The creepy genetics behind the golden state killer case, Wired Lin, 2004, Genomic research and human subject privacy, Science, 305, 10.1126/science.1095019 Shringarpure, 2015, Privacy risks from genomic data-sharing beacons, Am. J. Hum. Genet., 97, 631, 10.1016/j.ajhg.2015.09.010 Raisaro, 2017, Addressing Beacon re-identification attacks: quantification and mitigation of privacy risks, J. Am. Med. Inform. Assoc. JAMIA, 24, 799, 10.1093/jamia/ocw167 von Thenen, 2019, Re-identification of individuals in genomic data-sharing beacons via allele inference, Bioinformatics, 35, 365, 10.1093/bioinformatics/bty643 Harmanci, 2016, Quantification of private information leakage from phenotype-genotype data: linking attacks, Nat. Methods, 13, 251, 10.1038/nmeth.3746 Carter, 2019, Considerations for genomic data privacy and security when working in the cloud, J. Mol. Diagn. JMD, 21, 542, 10.1016/j.jmoldx.2018.07.009 Jiang, 2014, A community assessment of privacy preserving techniques for human genomes, BMC Med. Inform. Decis. Mak., 14, S1, 10.1186/1472-6947-14-S1-S1 Shimizu, 2016, Efficient privacy-preserving string search and an application in genomics, Bioinformatics, 32, 1652, 10.1093/bioinformatics/btw050 Kim, 2017, Secure searching of biomarkers through hybrid homomorphic encryption scheme, BMC Med. Genomics, 10, 42, 10.1186/s12920-017-0280-3 M. Kim, Y. Song, B. Li, D. Micciancio, Semi-parallel Logistic Regression for GWAS on Encrypted Data, 294, 2019. [Online]. Available: http://eprint.iacr.org/2019/294 (accessed: May 11, 2020). The Variant Call Format Specification. [Online]. Available: https://samtools.github.io/hts-specs/VCFv4.3.pdf (accessed: May 01, 2020). Cheon, 2017, Homomorphic encryption for arithmetic of approximate numbers, Lect. Notes Comput. Sci., 409, 10.1007/978-3-319-70694-8_15 Brakerski, 2012, Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP, Lect. Notes Comput. Sci., 868, 10.1007/978-3-642-32009-5_50 J. Fan, F. Vercauteren, Somewhat Practical Fully Homomorphic Encryption, 144, 2012. [Online]. Available: https://eprint.iacr.org/2012/144 (accessed: May 08, 2020). W. Jakob, J. Rhinelander, and D. Moldovan, “pybind11 — Seamless operability between C++11 and Python,” 2016. https://rgl.epfl.ch/software/pybind11 (accessed Apr. 28, 2020). Whirl-Carrillo, 2012, Pharmacogenomics Knowledge for Personalized Medicine, Clinical Pharmacology & Therapeutics, 92, 414, 10.1038/clpt.2012.96 1000 Genomes Project Consortium et al., A global reference for human genetic variation, Nature 526(7571) (2015). doi: 10.1038/nature15393. Art. no. 7571. Li, 2011, Tabix: fast retrieval of sequence features from generic TAB-delimited files, Bioinformatics, 27, 718, 10.1093/bioinformatics/btq671 “NCBI Variation Services.” https://api.ncbi.nlm.nih.gov/variation/v0/ (accessed Apr. 28, 2020). M. Albrecht et al., Homomorphic Encryption Security Standard, HomomorphicEncryption.org, Toronto, Canada, Nov. 2018. [Online]. Available: https://homomorphicencryption.org/standard/ (accessed: Jul. 24, 2019).