MIT University , Skopje , North Macedonia
Whole genome sequencing is easier than ever and helps advancing the medical research and personalized healthcare. As extracting the genomic data becomes faster and less complex, individual rights in privacy must be respected and secured. The main focus of this paper is to study and compare models and algorithms that protect the genomic data by using the most fundamental form of data protection known today: information-theoretic (I-T) security. A cryptosystem is I-T secure even when the adversary has unlimited computing power and knows the secret codebook. Information theory offers tools to design codes that maximize the useful communication rate while minimizing the “leak” of confidential information to unwanted parties. In order to study and protect genomic data one needs multidisciplinary approach using High Power Computing and genome analysis. We conclude the paper by advising how the structure of the genome may be used to make the data protection more efficient.
The statements, opinions and data contained in the journal are solely those of the individual authors and contributors and not of the publisher and the editor(s). We stay neutral with regard to jurisdictional claims in published maps and institutional affiliations.