{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:49:05Z","timestamp":1742914145101,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031063640"},{"type":"electronic","value":"9783031063657"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-06365-7_21","type":"book-chapter","created":{"date-parts":[[2022,6,3]],"date-time":"2022-06-03T07:04:08Z","timestamp":1654239848000},"page":"342-359","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Hybrid Cloud Deployment Architecture for\u00a0Privacy-Preserving Collaborative Genome-Wide Association Studies"],"prefix":"10.1007","author":[{"given":"Fatima-zahra","family":"Boujdad","sequence":"first","affiliation":[]},{"given":"David","family":"Niyitegeka","sequence":"additional","affiliation":[]},{"given":"Reda","family":"Bellafqira","sequence":"additional","affiliation":[]},{"given":"Gouenou","family":"Coatrieux","sequence":"additional","affiliation":[]},{"given":"Emmanuelle","family":"Genin","sequence":"additional","affiliation":[]},{"given":"Mario","family":"S\u00fcdholt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,4]]},"reference":[{"issue":"3","key":"21_CR1","doi-asserted-by":"publisher","first-page":"375","DOI":"10.2307\/3001775","volume":"11","author":"P Armitage","year":"1955","unstructured":"Armitage, P.: Tests for linear trends in proportions and frequencies. Biometrics 11(3), 375\u2013386 (1955)","journal-title":"Biometrics"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Bellafqira, R., Coatrieux, G., Bouslimi, D., Quellec, G.: Content-based image retrieval in homomorphic encryption domain. In: 2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), pp. 2944\u20132947. IEEE (2015)","DOI":"10.1109\/EMBC.2015.7319009"},{"key":"21_CR3","unstructured":"Bkakria, A., Cuppens, F., Cuppens-Boulahia, N., et al.: Preserving multi-relational outsourced databases confidentiality using fragmentation and encryption. JoWUA 4(2), 39\u201362 (2013). https:\/\/hal.archives-ouvertes.fr\/hal-01213956"},{"issue":"5","key":"21_CR4","doi-asserted-by":"crossref","first-page":"1427","DOI":"10.1109\/TCBB.2018.2858818","volume":"15","author":"D Bogdanov","year":"2018","unstructured":"Bogdanov, D., Kamm, L., Laur, S., Sokk, V.: Implementation and evaluation of an algorithm for cryptographically private principal component analysis on genomic data. IEEE\/ACM Trans. Comput. Biol. Bioinf. 15(5), 1427\u20131432 (2018)","journal-title":"IEEE\/ACM Trans. Comput. Biol. Bioinf."},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Bonte, C., et al.: Privacy-preserving genome-wide association study is practical. In: IACR Cryptology ePrint Archive 2018, p. 955 (2018)","DOI":"10.1186\/s12859-018-2541-3"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Boujdad, F.-z., S\u00fcdholt, M.: Constructive privacy for shared genetic data. In: CLOSER 2018\u20138th International Conference on Cloud Computing and Services Science, Proceedings of CLOSER 2018, March 2018","DOI":"10.5220\/0006765804890496"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Bouslimi, D., Coatrieux, G., Cozic, M., Roux, C.: A telemedicine protocol based on watermarking evidence for identification of liabilities in case of litigation. In: 2012 IEEE 14th International Conference on e-Health Networking, Applications and Services (Healthcom), pp. 506\u2013509. IEEE (2012)","DOI":"10.1109\/HealthCom.2012.6379473"},{"key":"21_CR8","doi-asserted-by":"publisher","unstructured":"Canim, M., Kantarcioglu, M., Malin, B.: Secure management of biomedical data with cryptographic hardware. Trans. Info. Tech. Biomed. 16(1), 166\u2013175 (2012). https:\/\/doi.org\/10.1109\/TITB.2011.2171701. http:\/\/dx.doi.org\/10.1109\/TITB.2011.2171701. ISSN 1089\u20137771","DOI":"10.1109\/TITB.2011.2171701"},{"issue":"2","key":"21_CR9","first-page":"48","volume":"10","author":"F Chen","year":"2017","unstructured":"Chen, F., et al.: Presage: privacy-preserving genetic testing via software guard extension. BMC Med. Genomics 10(2), 48 (2017)","journal-title":"BMC Med. Genomics"},{"key":"21_CR10","doi-asserted-by":"publisher","unstructured":"Chen, F., et al.: Princess: privacy-protecting rare disease international network collaboration via encryption through software guard extensions. Bioinformatics (Oxford, England) 33(6), 871\u2013878 (2017). https:\/\/doi.org\/10.1093\/bioinformatics\/btw758. https:\/\/www.ncbi.nlm.nih.gov\/pubmed\/28065902. ISSN 1367\u20134811","DOI":"10.1093\/bioinformatics\/btw758"},{"issue":"6","key":"21_CR11","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1038\/nbt.4108","volume":"36","author":"H Cho","year":"2018","unstructured":"Cho, H., Wu, D.J., Berger, B.: Secure genome-wide association analysis using multiparty computation. Nat. Biotechnol. 36(6), 547 (2018)","journal-title":"Nat. Biotechnol."},{"key":"21_CR12","doi-asserted-by":"publisher","unstructured":"Ciriani, V., De Capitani, S., Vimercati, D., Foresti, S., et al.: Combining fragmentation and encryption to protect privacy in data storage. ACM Trans. Inf. Syst. Secur. 13(3), 22:1\u201322:33 (2010). https:\/\/doi.org\/10.1145\/1805974.1805978. http:\/\/doi.acm.org\/10.1145\/1805974.1805978. ISSN 1094\u20139224","DOI":"10.1145\/1805974.1805978"},{"key":"21_CR13","doi-asserted-by":"publisher","unstructured":"Erlich, Y., Narayanan, A.: Routes for breaching and protecting genetic privacy. Nat. Rev. Genet. 15(6), 409\u2013421 (2014). https:\/\/doi.org\/10.1038\/nrg3723. ISSN 1471\u20130064","DOI":"10.1038\/nrg3723"},{"key":"21_CR14","doi-asserted-by":"publisher","unstructured":"G\u00f6tzfried, J., Eckert, M., Schinzel, S., M\u00fcller, T.: Cache attacks on intel SGX. In: Proceedings of the 10th European Workshop on Systems Security, EuroSec 2017, pp. 2:1\u20132:6. ACM, New York (2017). https:\/\/doi.org\/10.1145\/3065913.3065915. http:\/\/doi.acm.org\/10.1145\/3065913.3065915. ISBN 978-1-4503-4935-2","DOI":"10.1145\/3065913.3065915"},{"issue":"19","key":"21_CR15","doi-asserted-by":"publisher","first-page":"28111","DOI":"10.1007\/s11042-019-07932-3","volume":"78","author":"V Khanduja","year":"2019","unstructured":"Khanduja, V., Chakraverty, S.: A generic watermarking model for object relational databases. Multimedia Tools Appl. 78(19), 28111\u201328135 (2019). https:\/\/doi.org\/10.1007\/s11042-019-07932-3","journal-title":"Multimedia Tools Appl."},{"issue":"4","key":"21_CR16","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1038\/nrg.2017.113","volume":"19","author":"B Langmead","year":"2018","unstructured":"Langmead, B., Nellore, A.: Cloud computing for genomic data analysis and collaboration. Nat. Rev. Genet. 19(4), 208 (2018)","journal-title":"Nat. Rev. Genet."},{"key":"21_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-16295-9_1","volume-title":"Progress in Cryptology - LATINCRYPT 2014","author":"K Lauter","year":"2015","unstructured":"Lauter, K., L\u00f3pez-Alt, A., Naehrig, M.: Private computation on encrypted genomic data. In: Aranha, D.F., Menezes, A. (eds.) LATINCRYPT 2014. LNCS, vol. 8895, pp. 3\u201327. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-16295-9_1"},{"key":"21_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-319-66787-4_4","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2017","author":"A Moghimi","year":"2017","unstructured":"Moghimi, A., Irazoqui, G., Eisenbarth, T.: CacheZoom: how SGX amplifies the power of cache attacks. In: Fischer, W., Homma, N. (eds.) CHES 2017. LNCS, vol. 10529, pp. 69\u201390. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66787-4_4"},{"issue":"2","key":"21_CR19","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1149976.1149977","volume":"2","author":"E Mykletun","year":"2006","unstructured":"Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. ACM Trans. Storage (TOS) 2(2), 107\u2013138 (2006)","journal-title":"ACM Trans. Storage (TOS)"},{"key":"21_CR20","doi-asserted-by":"publisher","unstructured":"Nassar, M., Malluhi, Q., Atallah, M., Shikfa, A.: Securing aggregate queries for DNA databases. IEEE Trans. Cloud Comput. 7(3), 827\u2013837 (2017). https:\/\/doi.org\/10.1109\/TCC.2017.2682860. ISSN 2168\u20137161","DOI":"10.1109\/TCC.2017.2682860"},{"key":"21_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-030-11389-6_12","volume-title":"Digital Forensics and Watermarking","author":"D Niyitegeka","year":"2019","unstructured":"Niyitegeka, D., Coatrieux, G., Bellafqira, R., Genin, E., Franco-Contreras, J.: Dynamic watermarking-based integrity protection of homomorphically encrypted databases \u2013 application to outsourced genetic data. In: Yoo, C.D., Shi, Y.-Q., Kim, H.J., Piva, A., Kim, G. (eds.) IWDW 2018. LNCS, vol. 11378, pp. 151\u2013166. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-11389-6_12"},{"key":"21_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48910-X_16"},{"issue":"1","key":"21_CR23","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/TCBB.2018.2829760","volume":"16","author":"MN Sadat","year":"2019","unstructured":"Sadat, M.N., Al Aziz, M.M., Mohammed, N., Chen, F., Jiang, X., Wang, S.: Safety: secure gwAs in federated environment through a hybrid solution. IEEE\/ACM Trans. Comput. Biol. Bioinform. (TCBB) 16(1), 93\u2013102 (2019)","journal-title":"IEEE\/ACM Trans. Comput. Biol. Bioinform. (TCBB)"},{"issue":"4","key":"21_CR24","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.2307\/2533494","volume":"53","author":"PD Sasieni","year":"1997","unstructured":"Sasieni, P.D.: From genotypes to genes: doubling the sample size. Biometrics 53(4), 1253\u20131261 (1997)","journal-title":"Biometrics"},{"key":"21_CR25","unstructured":"Sweenay, L.: Simple demographics often identify people uniquely. Carnegie Mellon. Data Privacy Working Paper 3 (2000). http:\/\/dataprivacylab.org\/projects\/identifiability\/"},{"key":"21_CR26","doi-asserted-by":"crossref","unstructured":"Tram\u00e8r, F., Huang, Z., Hubaux, J.-P., Ayday, E.: Differential privacy with bounded priors: reconciling utility and privacy in genome-wide association studies. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1286\u20131297. ACM, New York (2015)","DOI":"10.1145\/2810103.2813610"},{"issue":"1","key":"21_CR27","doi-asserted-by":"publisher","first-page":"S3","DOI":"10.1186\/1472-6947-14-3","volume":"14","author":"Yu Fei","year":"2014","unstructured":"Fei, Yu., Ji, Z.: Scalable privacy-preserving data sharing methodology for genome-wide association studies: an application to iDASH healthcare privacy protection challenge. BMC Med. Inform. Decis. Mak. 14(1), S3 (2014)","journal-title":"BMC Med. Inform. Decis. Mak."},{"key":"21_CR28","unstructured":"Yung, C.K., et al.: ICGC in the cloud (2016)"},{"key":"21_CR29","doi-asserted-by":"publisher","unstructured":"Zeng, P., et al.: Statistical analysis for genome-wide association study. J. Biomed. Res. 29(4), 285\u2013297 (2015). https:\/\/doi.org\/10.7555\/JBR.29.20140007. https:\/\/pubmed.ncbi.nlm.nih.gov\/26243515. 26243515[pmid]. ISSN 1674\u20138301","DOI":"10.7555\/JBR.29.20140007"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Forensics and Cyber Crime"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-06365-7_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T10:53:39Z","timestamp":1727348019000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-06365-7_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031063640","9783031063657"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-06365-7_21","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"4 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICDF2C","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Digital Forensics and Cyber Crime","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icdf2c2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icdf2c.eai-conferences.org\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EAI Confy+","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}