{"id":33148,"date":"2017-08-24T21:46:30","date_gmt":"2017-08-25T01:46:30","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/genome-cryptography-is-the-new-way-to-secure-your-dna-data-gears-of-biz.php"},"modified":"2017-08-24T21:46:30","modified_gmt":"2017-08-25T01:46:30","slug":"genome-cryptography-is-the-new-way-to-secure-your-dna-data-gears-of-biz","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/genome-cryptography-is-the-new-way-to-secure-your-dna-data-gears-of-biz.php","title":{"rendered":"Genome cryptography is the new way to secure your DNA data &#8211; Gears Of Biz"},"content":{"rendered":"<p><p>    DNA security and privacy is a looming problem that scientists    and researchers are only just starting to grapple with. A team    at Stanford has now developed a technique that can cloak    irrelevant genomic information, allowing scientists to access    key disease-related mutations without revealing an individuals    broader genome sequence.  <\/p>\n<p>    In a world where everything from dating profiles to medical    diagnoses are drawing on DNA data, were currently just forced    to hope that each company with access to our DNA is acting    responsibly with out genetic fingerprints. But for many, hope    is not enough, and nor should it be. With genomic information    becoming increasingly of value, a demand has arisen for a way    to secure that data while still being able to enjoy the    benefits of DNA analysis.  <\/p>\n<p>    Often people who have diseases, or those who know that a    particular genetic disease runs in their family, are the most    reluctant to share their genomic information because they know    it could potentially be used against them in some way, says    Gill Bejerano, associate professor of developmental biology, of    pediatrics and of computer science. They are missing out on    helping themselves and others by allowing researchers and    clinicians to learn from their DNA sequences.  <\/p>\n<p>    To address such concerns, the Stanford team developed a    technique based on a classic cryptographic protocol, known as    garbled circuit or Yaos protocol. The individual encrypts    their own genome using an algorithm on their smartphone or    computer, which translates specific gene variants into a linear    set of values that are securely uploaded into the cloud. On the    other end of the transaction, the researcher (or any    second-party) accesses only the data that is pertinent to their    investigation.  <\/p>\n<p>    In this way, no person or computer, other than the individuals    themselves, has access to the complete set of genetic    information, says Bejerano.  <\/p>\n<p>    The team demonstrated the process by executing several    practical demonstrations, including identifying specific gene    mutations in patients with rare diseases and comparing a babys    DNA with his parents to target the likely cause of a genetic    disease. In all tested instances, at least 97 percent of each    subjects unique DNA information was completely hidden from the    researchers.  <\/p>\n<p>    As well as protecting a persons privacy when having their DNA    processed for medical reasons, this technique could    theoretically be applied to more commercial contexts, such as    ancestry genome studies or even the rising field of    nutrigenomics.  <\/p>\n<p>    There is a general conception that we can only find meaningful    differences by surveying the entire genome, says Bejerano.    But these meaningful differences make up only a very tiny    proportion of our DNA. There are now amazing tools in computer    science and cryptography that allow researchers to pinpoint    only these differences while keeping the remainder of the    genome completely private.  <\/p>\n<p>    Just recently it was demonstrated that synthetic DNA could be    created containing malware that allows a malicious party to    gain control of the computer that sequences it. As we learn    more and more about what our genetic fingerprint means, the    value of that fingerprint will only increase. In the future,    the DNA marketplace will be big business and security protocols    such as this new Stanford technique are going to be important.  <\/p>\n<p>    The teams research was published in the journal    Science.  <\/p>\n<p>    Source: Stanford Medicine  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the rest here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/gearsofbiz.com\/genome-cryptography-is-the-new-way-to-secure-your-dna-data\/24972\" title=\"Genome cryptography is the new way to secure your DNA data - Gears Of Biz\">Genome cryptography is the new way to secure your DNA data - Gears Of Biz<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> DNA security and privacy is a looming problem that scientists and researchers are only just starting to grapple with. A team at Stanford has now developed a technique that can cloak irrelevant genomic information, allowing scientists to access key disease-related mutations without revealing an individuals broader genome sequence. In a world where everything from dating profiles to medical diagnoses are drawing on DNA data, were currently just forced to hope that each company with access to our DNA is acting responsibly with out genetic fingerprints<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-33148","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/33148"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=33148"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/33148\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=33148"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=33148"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=33148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}