Privacy-preserving genotype imputation in a trusted execution environment
- PMID: 34450045
- PMCID: PMC8542641
- DOI: 10.1016/j.cels.2021.08.001
Privacy-preserving genotype imputation in a trusted execution environment
Abstract
Genotype imputation is an essential tool in genomics research, whereby missing genotypes are inferred using reference genomes to enhance downstream analyses. Recently, public imputation servers have allowed researchers to leverage large-scale genomic data resources for imputation. However, privacy concerns about uploading one's genetic data to a server limit the utility of these services. We introduce a secure hardware-based solution for privacy-preserving genotype imputation, which keeps the input genomes private by processing them within Intel SGX's trusted execution environment. Our solution features SMac, an efficient and secure imputation algorithm designed for Intel SGX, which employs a state-of-the-art imputation strategy also utilized by existing imputation servers. SMac achieves imputation accuracy equivalent to existing tools and provides protection against known side-channel attacks on SGX while maintaining scalability. We also show the necessity of our enhanced security by identifying vulnerabilities in existing imputation software. Our work represents a step toward privacy-preserving genomic analysis services.
Keywords: Intel SGX; genomic privacy; genotype imputation; imputation server; privacy enhancing technologies; privacy-preserving data analysis; secure computation; secure enclaves; trusted execution environment.
Copyright © 2021 Elsevier Inc. All rights reserved.
Conflict of interest statement
Declaration of interests The authors declare no competing interests.
Figures






Comment in
-
Paving the path toward genomic privacy with secure imputation.Cell Syst. 2021 Oct 20;12(10):950-952. doi: 10.1016/j.cels.2021.09.006. Cell Syst. 2021. PMID: 34672957
References
-
- Aciicmez O and Seifert J (2007) ‘Cheap hardware parallelism implies cheap security’, in Workshop on fault diagnosis and tolerance in cryptography (FDTC 2007), pp. 80–91. doi: 10.1109/FDTC.2007.16. - DOI
-
- Aldaya AC et al. (2019) ‘Port contention for fun and profit’, in 2019 IEEE symposium on security and privacy (SP). IEEE, pp. 870–887.
-
- Andrysco M et al. (2015) ‘On subnormal floating point and abnormal timing’, in 2015 IEEE symposium on security and privacy. IEEE, pp. 623–639.
-
- Baum LE and others (1972) ‘An inequality and associated maximization technique in statistical estimation for probabilistic functions of markov processes’, Inequalities, 3(1), pp. 1–8.
-
- Brasser F et al. (2017) ‘Software grand exposure: SGX cache attacks are practical’, in 11th USENIX workshop on offensive technologies (WOOT17). Vancouver, BC: USENIX Association. Available at: https://www.usenix.org/conference/woot17/workshop-program/presentation/b....