Next Article in Journal / Special Issue
Foundations of Programmable Secure Computation
Previous Article in Journal
Complementing Privacy and Utility Trade-Off with Self-Organising Maps
Previous Article in Special Issue
Fair and Secure Multi-Party Computation with Cheater Detection
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Implementing Privacy-Preserving Genotype Analysis with Consideration for Population Stratification

1
Cybernetica AS, 12618 Tallinn, Estonia
2
Institute of Mathematics and Statistics, University of Tartu, 51009 Tartu, Estonia
3
Institute of Computer Science, University of Tartu, 51009 Tartu, Estonia
*
Author to whom correspondence should be addressed.
Cryptography 2021, 5(3), 21; https://doi.org/10.3390/cryptography5030021
Submission received: 29 April 2021 / Revised: 12 August 2021 / Accepted: 18 August 2021 / Published: 20 August 2021
(This article belongs to the Special Issue Secure Multiparty Computation)

Abstract

:
In bioinformatics, genome-wide association studies (GWAS) are used to detect associations between single-nucleotide polymorphisms (SNPs) and phenotypic traits such as diseases. Significant differences in SNP counts between case and control groups can signal association between variants and phenotypic traits. Most traits are affected by multiple genetic locations. To detect these subtle associations, bioinformaticians need access to more heterogeneous data. Regulatory restrictions in cross-border health data exchange have created a surge in research on privacy-preserving solutions, including secure computing techniques. However, in studies of such scale, one must account for population stratification, as under- and over-representation of sub-populations can lead to spurious associations. We improve on the state of the art of privacy-preserving GWAS methods by showing how to adapt principal component analysis (PCA) with stratification control (EIGENSTRAT), FastPCA, EMMAX and the genomic control algorithm for secure computing. We implement these methods using secure computing techniques—secure multi-party computation (MPC) and trusted execution environments (TEE). Our algorithms are the most complex ones at this scale implemented with MPC. We present performance benchmarks and a security and feasibility trade-off discussion for both techniques.

1. Introduction

Genome-wide association studies (GWAS) split the cohort of individuals into two or more groups based on a phenotypic trait of interest, e.g., on the level of hemoglobin, on the existence or non-existence of a disease. These groups are compared to each other in the framework of case–control studies to find in the DNA sequence single-nucleotide polymorphisms (SNPs) that are significantly overrepresented in one group. GWAS have been performed extensively to date, and various concerns have been found. At least two of these problems—the existence of polygenic phenotypes, and population stratification—can be alleviated with the use of more heterogenous databases with larger volumes of data.
Polygenic phenotypes are traits that are affected by multiple genetic locations. Only a small subset of these locations are known, and they explain only a small amount of variance. To study them further, bioinformaticians need access to more heterogeneous data in order to detect subtle associations.
Population stratification is most often caused by geographic isolation of subpopulations over several generations [1]. If the case and control groups are compiled carelessly, genetic differentiation caused by population stratification can confound associations between genotype and trait. The resulting false positive or negative associations may, in fact, result from differences in local ancestry and be independent from the phenotypic trait under investigation [2]. An example of allele frequencies differing because of ancestry was shown in a case–control study [3]. In this study, a European American cohort was investigated. They found that a SNP in the lactase gene (LCT) gave a strong statistically significant association ( p < 10 6 ) with height. Both height and the LCT gene have wide variations across populations in Europe. This spurious association was reduced when individuals were rematched on the basis of European ancestry.
While collaboration among biobanks is improving, the construction of datasets that represent continent-wide or worldwide populations pose significant privacy risks. To alleviate these risks, privacy-preserving methods with cryptographic guarantees have been identified as the potential solution. Moreover, the European Data Protection Board (EDPB) has acknowledged certain secure computing technologies (split or multi-party processing) as an effective technical measure for protecting personal data transfers across borders [4]. This comes in light of the recent Court of Justice of the European Union judgment in the Schrems II case. Furthermore, the European Data Protection Supervisor has noted the role of using technologies that enable computation over encrypted data in the context of creating the European Health Data Space [5]. Secure multi-party computation (MPC) is one such privacy enhancing technique that can provide cryptographic guarantees. Two organisational models for GWAS-on-MPC were shown already in [6]. A number of implementations have been proposed since, including [7,8,9,10,11,12,13]. Components of GWAS have also been implemented using fully homomorphic encryption [14,15] and Intel® Software Guard eXtensions (SGX) trusted execution environments [16,17,18,19].
However, even in big heterogenous datasets, population stratification or over-representation of sub-populations can lead to spurious associations. To counteract these effects, bioinformaticians use estimation methods that propose parameters that represent the ancestry of the cohort. The number of these associated SNPs can greatly vary based on how different or similar the populations are. Principal component analysis (PCA) uses eigenvector decomposition to infer population stratification. The results can be used to visualise genetic relationships between variables alongside reference populations helping identify population stratification. Alternatively, the results can be used to adjust the genotypes and phenotypes for stratification as in [20]. Stand-alone PCA for GWAS using MPC has been demonstrated in [8,10,21]. A survey paper of privacy-preserving techniques for bioinformatics was published in 2017 [22].
In this paper, we show how the state-of-the-art GWAS methods that account for population stratification can be made to be privacy-preserving. That is, we present privacy-preserving versions of the following four algorithms: EIGENSTRAT [20], FastPCA [23], EMMAX [24] and genomic control [25]. We redesign the existing widely-used algorithms to use two different privacy enhancing technologies (PETs)—secure multi-party computation and trusted execution environments. The algorithms can be used on multiple protocol backends in various security models. We compare the solutions, implement the algorithms and present benchmark results. For implementation, we use the Sharemind MPC [26] and Sharemind HI platforms. Sharemind HI uses the Intel® Software Guard eXtensions (SGX) technology to create trusted execution environments and, thus, can be run securely in single server setting while Sharemind MPC requires a more complex setup.

2. Materials and Methods

2.1. Genome-Wide Association Studies

To conduct genome-wide association studies (GWAS), the cohort of individuals is usually split into two (or more) groups—cases and controls—based on a phenotypic trait of interest, e.g., the colour of the eyes. Next, the genotype data of the groups are studied to detect DNA sequence single-nucleotide polymorphisms (SNPs) that are significantly overrepresented in one group. Although all four nucleotides (A, C, G, and T) can be located at a SNP site, usually, only two alleles A and B are considered. The first (A) corresponds to the reference sequence, and the second (B) represents potential mutations. SNP data are stored as pairs of chromosomes (AA, AB, BB, and NN if the measurement could not be completed for some reason) in text format. It is also common to use binary encoding for SNPs, where zero denotes the dominant nucleotide in the specific DNA location and one denotes the remaining three alternatives. As the same genetic information is represented in two chromosomes and common genotyping techniques measure these simultaneously, the resulting measurement outcome can be encoded as { , 0 , 1 , 2 } , where ⊥ encodes measurement failures.
In GWAS, genotype data are usually represented as an n × m matrix X with values { 0 , 1 , 2 } , where the rows correspond to individuals and columns to SNP locations. Phenotype data are given as a { 0 , 1 } vector y of length n, where 1 denotes the case group (the existence of the trait(s) in question) and 0 denotes the control group (the lack of the trait(s) in question). The measurement failures are denoted by the n × m mask matrix M with values { 0 , 1 } that indicate whether the corresponding SNP is available or not (0 represents the missing SNP and 1 the available SNP). Table 1 gives an example what this dataset looks like.

2.2. Algorithms for GWAS That Account for Population Stratification

To assess the effect of SNP i on a phenotypic trait in an additive model, the allelic data of the marker can be presented in a table as described in Table 2. For a perfectly mixed population, the marker can be tested with the χ 2 -test. However, population substructure and inbreeding can lead to an increased homozygosity, which induces extra-binomial variance, leading to spurious associations. Within a genotype, this increased variance can be accounted for with the Cochran–Armitage trend test, where each SNP i can be tested for whether it satisfies the following assumption:
Y i 2 = N i ( N i ( r i 1 + 2 r i 2 ) R i ( n i 1 + n i 2 ) ) 2 R i ( N i R i ) ( N i ( n i 1 + 4 n i 2 ) ( n i 1 + 2 n i 2 ) 2 ) χ 2 .
However, the trend test does not take into account the increased allelic variance between genotypes caused by population substructures and hidden relatedness. We selected four algorithms, which are used to account for population stratification, and implemented them using secure computing techniques.
Genomic control. To correct for the effect of population stratification, this algorithm [25] estimates the variance inflation factor, which measures the increase in allelic variance across individuals within the samples. Genomic control assumes that this factor is a constant for all markers, and it can therefore be estimated using the Cochran–Armitage test statistics of all markers. To lower the rate of false positives caused by cryptic relatedness and population stratification, the test statistics are divided by the computed estimate. The resulting statistics are approximately distributed χ 2 with one degree of freedom under the null hypothesis.
While powerful, it has its limitations. Mainly, if the markers are not uniformly differentiated across ancestral populations, the estimation of the inflation factor can be too small, and therefore insufficient, for some markers, leading to a number of false positive associations. For other markers, the inflation factor can be too large, thereby becoming superfluous.
Principal component analysis. It has been shown that for samples of different subpopulations, the first principal components of the genotype data describe the differences in ancestry [20]. Therefore, it is possible to correct for stratification by adjusting the genotype and phenotype data using the principal components as covariates, as is done in the EIGENSTRAT algorithm [20]. For hypothesis testing, a generalisation of the Cochran–Armitage trend test can be used on the adjusted genotypes and phenotypes. Unlike the genomic control algorithm, this approach does not adjust all markers uniformly. Therefore, it can better capture the differences in allele frequencies caused by different ancestrial populations.
The main drawback of principal component analysis is that it is often unclear how many and which principal components capture the population substructure and what other top principal components capture in the sample structure. Usually up to 10 principal components are used to adjust for population stratification.
FastPCA [23] is a variation of principal component analysis. It uses recent advances in random matrix theory to reduce the computational effort in approximating the first principal components, which are simply the top eigenvectors of the kinship matrix. We chose FastPCA because computing eigenvectors in the privacy-preserving environment is very time consuming, as are all operations that deal with floating-point computations, and we do not need to compute exact eigenvectors.
EMMAX. An even more elaborate way is to use linear mixed models to correct for population stratification with each SNP as a fixed effect [24]. The relatedness of individuals in the sample are captured by the variance components. To assess the effect of the SNP to the phenotype, we first estimate these variance components, after which we can test the significance of the fixed effect by using a t-test.
The EMMAX algorithm is computationally more demanding than the previous algorithms. However, it is often statistically more powerful because it is able to better capture and correct for cryptic relatedness, especially for smaller sample substructures.

2.3. Privacy-Preserving Computation and GWAS

2.3.1. Deployment Models for Privacy-Preserving GWAS

In a typical collaborative genome-wide association study setting, two or more biobanks or service providers run collaborative analysis on data they have collected from their donors. Due to regulatory requirements or personal preferences, the processing of donor data should be minimised so that data leaks can be kept to a minimum. However, donors may still be willing to participate in research if a privacy-preserving solution is available.
Each biobank holds genotype data and medical diagnoses of a number of individuals. The analyst wants to run the genome-wide association study on the combined data of the gene banks. Since a person’s genotype data are sensitive, the banks cannot reveal their data to each other. The analyst must not be able to determine any information about the individuals in the study by performing the analysis, and they should only receive the names of the significant SNPs. For a more detailed analysis of the usage models of MPC in GWAS, refer to [6].
Either the donors or the biobanks act as the input parties, who provide protected data for the computation. The biobanks, universities or dedicated service providers act as computing parties who host and run the secure computing system. The system is used by researchers in, e.g., universities or pharmaceutical companies who want to study a specific disease. They are the result parties in the system.

2.3.2. Cryptographic Secure Multi-Party Computation

In secure multi-party computation (MPC), two or more parties compute a function without seeing any of the private input values of the other parties. Most often secret sharing, garbled circuits or homomorphic encryption are used to enable MPC [27]. MPC technology has reached a level of maturity required to enable real-world implementations [28]. Data processing applications are typically implemented using one of the programmable MPC frameworks [29].
In this paper, we prototype our implementation using the Sharemind MPC platform [26]. Sharemind MPC is a distributed platform for privacy-preserving data processing supporting multiple MPC protocol sets, which use secret sharing as the secure storage method. Each value that needs to be protected is shared by the input parties according to the secret sharing algorithm. The resulting random shares are distributed between multiple computing parties.
Each computing party has a copy of the algorithms and runs them using MPC protocols that convert secret-shared inputs into secret-shared outputs, without recovering the private values on any computing party. Such MPC systems provide end-to-end security for data processing if a sufficient number of computing parties follow the protocol. If one or more do not, it may cause the computation to reach the wrong result or even breach privacy. The particular protocol set determines the exact failure mode. Efficient protocol sets are available for two and three computing parties, and adding more parties increases the communication complexity, a common bottleneck in MPC based on secret sharing.

2.3.3. Trusted Execution Environments

A trusted execution environment (TEE) is a secure area of a processor. It ensures the confidentiality and integrity of the the data that are loaded into this area. It is isolated from the rest of the processor, and the computations cannot be monitored. In a standard deployment, data are first sent to the TEE. Next, either computations are run immediately or data can be sealed and stored outside the TEE (kept on the disk in an encrypted form). For computing, the data are loaded into the TEE and decrypted there. After the computations have been completed, results are either encrypted and stored on the disk, or published. The host will not have access to the encryption keys for the data nor be able see decrypted data in any other way.
The Intel® Software Guard eXtensions (SGX) has emerged as a popular way to create trusted execution environments. SGX provides features such as enclaves, attestation and data sealing to protect data and allow for remote audit of processing and privacy policy enforcement. In SGX, enclaves are protected memory areas that protect the confidentiality and integrity of data even if there is malware in the system. Attestation helps the system prove to external parties that it is running the trusted software and the correct version of the application. Data sealing (encryption) is used to store data outside the enclave while protecting its confidentiality and integrity. Only the specific enclave knows the encryption key and can decrypt the data.
Trusted execution environments do not require distributed storage; thus they can be used to build a system where there is just a single computing party. However, that computing party has a different trust model than computing parties in MPC. Notably, one has to trust the provider of the hardware that is used to create the trusted execution environments and that it has been implemented correctly. Second, applications of TEEs need to account for side channel attacks that observe execution time, power usage or the electromagnetic radiation of the hardware while the privacy-preserving task is running. These can be used to recover the encrypted data in the enclave. At the same time, TEEs can perform privacy-preserving operations significantly faster than MPC, and thus the trade-off between their secure models requires study. See [30] for a recent review of SGX attacks and their mitigations.
Sharemind HI (HI standing for hardware isolation) is a privacy-preserving data processing platform that uses SGX enclaves, sealing, and attestation to support data analysis processes between identified participants and provides end-to-end privacy for the protected data for applications just as Sharemind MPC does.

2.3.4. Adapting Algorithms for Secure Computing

The privacy-preserving algorithms that we design in this paper minimise data leakage. Our design process follows the security goals for privacy-by-design statistical analysis algorithms as defined by [31] (The authors of [31] also note the importance of query restrictions that prevent new, possibly insecure, algorithms from being executed on a secure computing platform before whitelisting. However, this does not affect the design of algorithms and only affects the choice of the secure computing platform the algorithms will run on).
  • Cryptographic security. During computation, no computing party learns any private input or intermediate value computed by the function unless the value is explicitly published. Private values are also not leaked through changes in the running time of the algorithm. We achieve this by designing algorithms that process all private values either by using MPC and TEEs or by making the algorithm running time as independent of the inputs as possible. This means designing the algorithms as straight-line programs that have no branching based on private values or where each branching decision is analysed with regard to what it could leak in the running time.
  • Source privacy. An algorithm is source-private if all its outputs and all intermediate values do not depend on the order of inputs. The GWAS algorithms in this paper are designed to avoid leaking information based on the order of donors’ data in the inputs. The order of SNPs in the inputs will affect the SNPs in the output, but this is by design as the related metadata are not private data.
  • Output privacy. An algorithm is output-private if the results it declassifies do not leak the private inputs. The GWAS algorithms in this paper can be used either as parts of larger processing workflows, and in this case they do not declassify outputs. However, the results of the algorithms are statistical significances per SNP and contain no personal data given a sufficient amount of inputs.
The algorithms also need adaptation for performance. In secure multi-party computation based on secret sharing, servers need to communicate with each other to run the shared computations. It has been shown that redesigning algorithms with maximum parallelisation helps use the communication channel more efficiently, reducing the round count and improving speed. Thus, the algorithms in this paper are adapted to use single-instruction, multiple-data (SIMD) vector and matrix operations to the maximum reasonable extent.
The algorithms are designed for secure computing frameworks supporting integer, fixed and floating-point arithmetic. In this paper, we implement the algorithms using the Sharemind MPC and Sharemind HI platforms as they support a comparable application model on different secure computing technologies. This allows us to compare the techniques. However, the algorithms would work on any secure computing technique, including fully homomorphic encryption or zero knowledge.
In the following algorithm representations, we use the notation x to denote a value x that is protected by the selected secure computing system. For example, in an MPC runtime based on secret sharing, x means that x has been secretly shared among multiple parties so that no party can recover it. For trusted execution environments, x means that x is only processed within the enclave. Similarly, x , X denote protected data structures (vector x and matrix X , respectively). For a matrix X and indexes i , j , k , l , we denote by X [ i : j , k : l ] the submatrix of X consisting of elements from rows i , , j 1 and columns k , , l 1 . A missing index means that we take all the elements up until or starting from an index.
The operator * denotes element-wise multiplication between two matrices or multiplication by a scalar and is used to distinguish this operation from matrix multiplication. The operator/denotes element-wise division by scalar, vector or matrix, as necessary. The functions rowSums and colSums compute the sum of each row or column of a matrix, respectively. The output is a vector.
The function reshape takes as input a vector and two integers n and m and reshapes the vector row-wise into an n × m matrix. The function flatten flattens a matrix row-wise into a vector. The function choose takes as inputs a Boolean vector m and two vectors x y of the same type and chooses elements point-wise from either x or y based on the values in vector m . The operator cut takes as arguments a Boolean vector m and a same size vector x of any type and discards the elements point-wise from x if the corresponding value in m is false. While the size of the output vector can leak information, since the size of the output vector is equal to the number of true values in m , in our implementations, we make sure that the function always outputs a vector with a single value. This guarantees that no information is leaked.

3. Results

In this section, we describe the privacy-preserving versions of the algorithms and give the benchmark results. We first describe and discuss EIGENSTRAT and FastPCA, and then we go to EMMAX and finally we describe the genomic control algorithm. The EIGENSTRAT and EMMAX algorithms use the privacy-preserving GS-PCA algorithm from [8]. GS-PCA is highly parallelisable and therefore especially suits the secure multi-party setting. Our privacy-preserving genomic control algorithm uses the privacy-preserving version of quicksort from [32].
The nature of the algorithm adaptation was twofold: firstly, we made the modifications that were needed for the algorithm to work in the privacy-preserving setting, and secondly, we added implementation details for Sharemind, the MPC framework we used. To lower the computing time while maintaining accuracy, our MPC implementations use a mix of floating-point and fixed-point arithmetic. The conversion was only done in cases where the accuracy loss was at acceptable levels.
It is important to note that the algorithms can be viewed separately from their implementations, as the algorithms can be implemented for any MPC platform that has the necessary fixed-point and floating-point arithmetic available. The fixed-point and floating-point conversions that are discussed in these subsections can be beneficial for implementations on other platforms as well, and, therefore, we have added these directly into the algorithm description.

3.1. Privacy-Preserving EIGENSTRAT and FastPCA

Algorithm 1 describes the privacy-preserving version of EIGENSTRAT [20]. As input it receives the genotype matrix X , the corresponding matrix of mask vectors M , and the phenotype vector y . It also receives the number of components k and the number of GS-PCA iterations J. According to [20], k is usually 10 but can also be 1, 2 or 5. In our benchmark tests, we set k = 2 . The GS-PCA algorithm requires the number of iterations J as an input. Using a public predetermined number of iterations avoids side channel attacks based on the number of iterations. In our benchmarks, we set J to 15 as this gives us sufficient precision.
We start by computing the vector μ of the means of the columns and use this to normalise the columns. In the MPC implementation, we use floating-point arithmetic to compute the normalised genotype matrix Z , and we convert this matrix to fixed-point values before finding the scaled kinship matrix K Z Z T , which is n 1 times the covariance matrix. We do not perform the division with n 1 , as this is an expensive operation, and it does not influence the properties of eigenvalues that we need for our computations.
Using the privacy-preserving GS-PCA algorithm, we find the vector λ of the k largest eigenvalues and the n × k matrix U of corresponding eigenvectors of matrix K . In this algorithm, we do not need the vector λ of eigenvalues, so we simply drop this result. Our MPC implementation of the GS-PCA algorithm also uses fixed-point arithmetic. To adjust for stratification, the entries are converted back to floating-point values as this keeps the accuracy loss to a minimum. Using the eigenvectors from U , we iteratively adjust the genotype matrix and phenotype vector and then compute the trend statistics using the adjusted values. No values are declassified during the execution.
The biggest issue with this algorithm in the privacy-preserving setting is that finding ZZ T requires a lot of computational effort. The computation time of the GS-PCA algorithm also increases quadratically as the number of rows in Z (the size of the sample) increases. To deal with this, we can instead use FastPCA [23], which makes use of random matrix theory.
Algorithm 1: Privacy-preserving EIGENSTRAT
Cryptography 05 00021 i001
Algorithm 2 describes the privacy-preserving version of the FastPCA randomised algorithm for finding the top k left singular vectors [23]. As input, it receives the normalised genotype matrix Z , the number of components k, the oversampling parameter p and the number of iterations J. We estimate that J = 12 is enough to ensure accuracy.
The privacy-preserving implementation is fairly straightforward. We use the Marsaglia polar method to generate the entries for the random matrix Gi . To speed up the process of finding U k , we used fixed-point not floating-point values. The biggest difference in fixed and floating-point computation comes from computing G i ( ZZ T ) J Z . While this process is faster when done with fixed-point values, it causes accuracy loss in some cases. It is important to keep in mind that when using fixed-point values, we can get overflows during the iterative matrix multiplication. To prevent this, we divide the product matrix G i ( ZZ T ) i with a suitable constant after each iterative step.
For QR factorisation and eigendecomposition, we used the Householder QR algorithm and the symmetric QR algorithm [33], respectively. Having found the k top principal components, we can use them to adjust our genotype and phenotype vectors like in EIGENSTRAT. Again, no values are declassified during the execution.
Algorithm 2: Privacy-preserving FastPCA randomised algorithm for top k left singular vectors
Cryptography 05 00021 i002

3.2. Privacy-Preserving EMMAX

Algorithm 3 describes the privacy-preserving version of EMMAX [24]. Although the algorithm can generally be used for the analysis of quantitative phenotypic traits, we implemented it with case–control studies in mind. Therefore, as input, the algorithm takes a similar genotype matrix X as EIGENSTRAT, the mask matrix M indicating the missing values, the phenotype vector y indicating the inclusion into the case group, and the number of GS-PCA iterations J.
We use a mix of fixed-point and floating-point arithmetic in our MPC implementation of the EMMAX algorithm. We start by normalising the columns of X . As with the privacy-preserving EIGENSTRAT, we use floating-point arithmetic to compute the normalised genotype matrix Z and convert the entries to fixed-point values to compute the the covariance matrix K Z Z T . We then use the GS-PCA algorithm to find the eigendecomposition of K . The resulting eigenvectors and eignevalues are converted to floating-point values again. The rest of the computations in the MPC implementation use floating-point arithmetic. This keeps the accuracy loss to a minimum.
We denote by ξ the vector of eigenvalues and by U F the matrix of corresponding eigenvectors, by λ the vector of n 1 largest eigenvalues and by U R the matrix of corresponding eigenvectors. After finding the vector η = U R T y , we create a 101 × ( n 1 ) matrix δ Mat , where every column has values ranging from 10 5 to 10 5 . Creating 101 × ( n 1 ) matrices η 2 Mat and λ Mat , where the columns are vectors η 2 and λ , respectively, allows us to compute the value of the restricted log-likelihood function f R at each δ in parallel. Amongst these, we choose the δ for which f R obtains the greatest value, roughly approximating the maximum point of the restricted likelihood function. We improve upon this approximation by using the Newton–Rhapson method to obtain δ m a x .
Algorithm 3: Privacy-preserving EMMAX
Input: Genotype matrix X (private), mask matrix M (private), phenotype vector y (private), number of GS-PCA iterations J (public)
Output: Vector t of statistics for the t-test
  1   μ colSums ( X ) / colSums ( M ) ;
  2   Z ( X M μ ) / ( sqrt ( μ / 2 ( 1 μ / 2 ) ) ) ;
  3   K Z Z T ;
  4   ξ , U F GS PCA ( K , n , J ) ;
  5   λ ξ [ : n 1 ] ;
  6   U R U F [ : , : n 1 ] ;
  7   η U R T y ;
  8   η 2 η η ;
  9   η 2 Mat η 2 // η 2 Mat is a 101 × ( n 1 ) matrix, each row is equal to η 2 ;
10   λ Mat λ // λ Mat is a 101 × ( n 1 ) matrix, each row is equal to λ ;
11   δ ( 10 5 , , 10 5 ) ;
12   δ Mat δ // δ Mat is a 101 × ( n 1 ) matrix, each column is equal to δ ;
13   Λ p δ λ Mat + δ Mat ;
14   f pot ( n 1 ) ln ( colSums ( η 2 Mat / Λ p δ ) ) colSums ( ln ( Λ p δ ) ) ;
15   f pot f pot + δ ( max ( f pot ) = = f pot ) // Adds a different positive constant to each maximum value in f pot to make sure that there is a single largest value in the vector, prevents leakage when using cut to find δ pot ;
16   δ pot cut ( δ , max ( f pot ) = = f pot ) ;
17   δ m a x Newton Rhapson ( δ pot ) //Newton–Rhapson algorithm;
18   X 1 X ;
19   diag 1 / ( ξ + δ m a x ) ;
20   diagMat diag // diagMat is a square matrix with diag at the diagonal;
21   XH X 1 U F diagMat U F T ;
22   diagXHX = rowSums ( XH X 1 ) ;
23   XHX [ : , 0 ] diagXHX [ 0 ] ;
24   XHX [ : , 3 ] diagXHX [ 1 : ] ;
25   XHX [ : , 1 ] rowSums ( XH ) ;
26   XHX [ : , 2 ] XHX [ : , 1 ] ;
27   det XHX [ : , 0 ] XHX [ : , 3 ] XHX [ : , 1 ] XHX [ : , 2 ] ;
28   iXHX [ : , 0 ] XHX [ : , 3 ] / det ;
29   iXHX [ : , 3 ] XHX [ : , 0 ] / det ;
30   iXHX [ : , 1 ] XHX [ : , 1 ] / det ;
31   iXHX [ : , 2 ] iXHX [ : , 1 ] ;
32   yMat y // yMat is an m × n matrix, each row is equal to y ;
33   XHy rowSums ( XH yMat ) ;
34   β iXHX [ : , 2 ] XHy [ 0 ] + iXHX [ : , 3 ] XHy [ 1 : ] ;
35   yMat 2 y // yMat 2 is an n × n matrix, each row is equal to y ;
36   yU F rowSums ( yMat 2 U F ) ;
37   y H y sum ( yU F diag yU F ) ;
38   R 1 ( iXHX [ : , 0 ] XHy [ 0 ] + iXHX [ : , 2 ] XHy [ 1 : ] ) XHy [ 0 ] ;
39   R 2 β XHy [ 1 : ] ;
40   return t β / sqrt ( iXHX [ : , 3 ] ( y H y ( R 1 + R 2 ) ) ) ;
In order to estimate the linear coefficient β k of SNP k for every k = 1 , , m , we need to compute ( X k H X k T ) 1 X k H y for each k, where
H = U F diag ( ( ξ + δ m a x ) 1 ) U F T
is an n × n matrix and
X k = 1 1 X 1 k X n k .
Instead of computing each of these values one at a time, we define the following ( m + 1 ) × n matrix
X 1 = 1 1 X 11 X n 1 X 1 m X n m ,
and we compute
H = U F diag ( ( ξ + δ m a x ) 1 ) U F T
and
XH = X 1 H .
Note that the first and ( i + 1 ) th rows of matrix XH are equal to the rows of the 2 × n matrix X k H . We continue by computing the entries of the m × 4 matrix XHX . This matrix contains the entries of each matrix X k H X k T , more precisely
X k H X k T = XHX [ k , 0 ] XHX [ k , 1 ] XHX [ k , 2 ] XHX [ k , 3 ] .
As finding the inverse of a 2 × 2 matrix is easy, we can now create an m × 4 matrix iXHX , which contains the entries of ( X k H X k T ) 1 in the kth row. Let yMat be an ( m + 1 ) × n matrix for which each row is equal to vector y . Next, we find the vector XHy , where the first and ( i + 1 ) th entries are equal to the entries of the vector X k H y T . The estimate of β k can now be computed as
β k = iXHX [ k , 2 ] XHy [ 0 ] + iXHX [ k , 3 ] XHy [ k + 1 ] .
We compute all these estimates in parallel. To find the vector of t-statistics, t = ( β 1 s 1 , , β m s m ) , we compute the value y H y = y H y T and the values
( X k H y ) T ( X k H X k T ) 1 X k H y ,
and use them to find s k for all k = 1 , , m .

3.3. Genomic Control

Algorithm 4 describes the privacy-preserving version of the genomic control algorithm [25]. As input it receives the genotype matrix X and the phenotype vector y . For this privacy-preserving algorithm, we need to manipulate the shape of the data to achieve better performance. As comparison is rather expensive and we would have to perform a significant number of comparisons to count the number of different combinations { A A , A B , B B } , we will convert the data into the following format: the columns of the matrix X indicate individuals and for each SNP we have three rows (for A A , A B and B B ), where the value is 1 for the corresponding observation and the values for the other two rows are 0. For the missing SNP values, all three rows are marked as 0.
We would like to compute the entries in Table 2 for each SNP in parallel as parallel operations are optimal in the privacy-preserving setting. For this, we will find the sum of the columns corresponding to the case and control group separately. This gives us six vectors r i , s i , i { 0 , 1 , 2 } . From these we can compute
R = r 0 + r 1 + r 2 , S = s 0 + s 1 + s 2 , N = R + S , n 1 = r 1 + s 1 , n 2 = r 2 + s 2 .
With these vectors we can now compute the Cochran–Armitage trend statistics for all SNPs in parallel. We then find the estimate of the variance inflation factor and divide the trend statistics with them, giving us the necessary χ 2 statistics for each SNP. As previously, no values are declassified during the execution of the algorithm.
Algorithm 4: Privacy-preserving genomic control
Cryptography 05 00021 i003

3.4. Performance Measurements

All of the algorithms running on Sharemind MPC are implemented in the SecreC programming language [34,35]. The trusted execution environment versions are implemented in C/C++ and require the Sharemind HI runtime. The source code for each is available for download as additional material. The data that we used to run and measure our implementation were taken from the NCBI Gene Expression Omnibus (GEO) (https://www.ncbi.nlm.nih.gov/geo/query/acc.cgi?acc=GSE44974, accessed on 19 August 2021). It is available for download. However, the contents of the dataset do not affect the performance results as the running times of the privacy-preserving algorithms are data-independent by design; otherwise this would leak information about the dataset.
As discussed in Section 2.3, secure multi-party computation introduces a level of complexity to already complex algorithms. In addition to designing privacy-preserving versions of frequently used GWAS algorithms, we also show that they are implementable and run on a volume of data that would be used for realistic genome-wide association studies. We implemented our algorithms using the privacy-preserving computation platform Sharemind. For MPC, we used the three-party protocol suite in the passive adversary model [36]. For HI, we used the Intel Software Guard Extensions (SGX).
First we present the performance results of the MPC solution, then the TEE solution, and finally we compare the two approaches. The performance of the MPC algorithms was benchmarked using three servers with Intel Xeon E5-2640 processors, 128 GB of memory and dedicated 10 Gb/s connections. In the benchmark tables, we show running times for the different subtasks of the algorithms, thus giving a better overview of where optimisation can be attempted.
Table 3 presents benchmark results for our privacy-preserving EIGENSTRAT algorithm. Table preparation includes the time needed for reading the table and normalising it. Stratification control includes the time needed for finding the kinship matrix, subtracting the genotype and phenotype principal components. We looked at the running times for 1500, 2000, 5000 and 20,000 SNPs for 217 donors, and then also increased the number of donors to look at 2000 SNPs for 434 and 868 donors. The size of the case and control groups does not influence running times.
For our privacy-preserving EIGENSTRAT, the computation of the kinship matrix proved to be the biggest computational overhead, scaling linearly with respect to the number of SNPs and quadratically with respect to the size of the sample in our data table. The GS-PCA algorithm, used for finding the top eigenvectors of the kinship matrix, also scales quadratically with respect to the size of the sample. This is because the kinship matrix is an n × n matrix, where n is the number of people in our sample. As such, the running time of the GS-PCA algorithm does not depend on the number of SNPs. Other computational steps scale linearly with respect to the dimensions of the input matrix.
Table 4 presents benchmark results for our privacy-preserving FastPCA randomised algorithm. Table preparation includes the time needed for reading the table and normalising it. Stratification control includes the time needed for subtracting the genotype and phenotype principal components. Similarly to EIGENSTRAT, we looked at the running times for 1500, 2000, 5000, and 20,000 SNPs for 217 donors, and then also increased the number of donors to look at 2000 SNPs for 434 and 868 donors. The size of the case and control groups does not influence running times.
The main benefit of FastPCA is that it does not require computing the kinship matrix, and, therefore, it scales linearly with respect to both the number of SNPs and the sample size. In addition, eigendecomposition is only applied to a small ( k + p ) × ( k + p ) matrix, which offers clear speed-ups with respect to the GS-PCA approach.
Table 5 presents benchmark results for our privacy-preserving EMMAX algorithm. Table preparation includes the time needed for reading the table and normalising it. The maximum likelihood times include everything in Algorithm 3 after the call to GS-PCA and before computing the test statistics. Most of the time in this group is spent on computing XHX . As the privacy-preserving EMMAX algorithm is significantly slower than the privacy-preserving PCA algorithm, we looked at the running times for 1000, 5000 and 20,000 SNPs for 217 donors and then also looked at 1000 SNPs for 100 and 434 donors. As can be seen from Table 5, the running time for 1000 SNPs and 434 donors is already more than 36 h, and we did not test the algorithm any further. The size of the case and control groups does not influence running times.
Similarly to EIGENSTRAT, our EMMAX implementation computes the kinship matrix, which scales linearly with respect to the number of SNPs and quadratically with respect to the size of the sample. We then use the GS-PCA algorithm to compute the eigenvectors and eigenvalues of the kinship matrix. However, for EMMAX, we need the entire eigendecompostion instead of a few eigenvectors. This means that the process takes significantly longer compared to the privacy-preserving PCA. It is clear that as the size of the genotype matrix grows, the computation of the XHX matrix quickly overshadows the computational effort of the rest of the algorithm.
Table 6 presents benchmark results for our privacy-preserving genomic control algorithm. We performed these computations for the usual 5000 SNPs and 217 donors but then went on to test with far larger datasets than the PCA experiments. Here, most of the running time is spent on table preparation, which includes table reading and computing the genotype distribution table for the Cochran–Armitage tests. Note that due to the way data are managed in this algorithm, 300,000 SNPs will take up 900,000 rows in the dataset.
Benchmark details for the HI versions of PCA and EMMAX are given in Table 7. Unlike the MPC benchmarks, these results are given in milliseconds. The Sharemind HI tests were run on a PC with i7-7700 CPU and 16 GB RAM.
With the genomic control algorithm for Sharemind HI, the running time of 15,112 milliseconds for 300,000 SNPs and 200 donors was mostly spent on reading input data (1 ms of the total running time was spent on other computations). For comparison, we performed the experiments on the same data structures as for MPC. As discussed, this involves having three rows for each SNP. As reading data is an expensive operation in HI but comparing strings is not, the HI version can be optimised for real-world data encodings. After the data was read, the computations themselves took altogether one millisecond. Therefore, we did not run these tests for fewer SNPs.
Table 8 presents the comparison of benchmark results for the Sharemind MPC and HI implementations of privacy-preserving GWAS algorithms with stratification control. As expected, the algorithms ran nearly instantaneously on Sharemind HI. The table also gives the running times if HI was 100 times slower, an artificial estimate for if we were to take more special measures to avoid side-channel attacks. For genomic control, this would still be around 20 s for reading input data, because the computation times themselves would still not exceed seconds.

4. Discussion

Feasibility. We showed how to adapt complex stratification control algorithms for genome-wide association studies to secure computing. We especially demonstrate the most complex PCA algorithms implemented in the literature on large datasets. In addition, we adapted the algorithms to trusted execution environments, showcasing how the side-channel security of the proposed algorithms can benefit both MPC and TEEs.
Security. Both secure multi-party computation and trusted execution environments can offer cryptographic security; however, both solutions have their advantages and drawbacks. For MPC, it requires the service providers to set up at least two servers. More complex algorithms might not be implementable or might not finish execution in this environment. The computations that do finish introduce a major computation and communication overhead. However, when the input party trusts their data to the computing parties, they do not need to trust one single party but can trust that the parties do not collaborate. Moreover, to be certain, an input party can become a computing party and thus gain more confidence.
The trusted execution environment does not require such a complicated setup and collaboration from different parties. There is only one server and everyone can import their data in encrypted format. In addition, the environment does not introduce a significant computational or communication overhead. However, the input parties must trust the trusted execution environment provider (Intel). If something in the enclave fails, if a critical vulnerability is discovered, all data could be compromised. Designers of TEE-based data analysis must create a data lifecycle that reduces these risks.
Performance. It is clear that in the MPC setting, the running times of EMMAX are not feasible for real-world use for larger data volumes. It is a complex iterative algorithm that includes a lot of floating-point matrix multiplications. We fear that further optimisations would not yield a significant speed-up. However, genomic control shows that it is feasible to also carry out privacy-preserving GWAS with stratification control using MPC. The privacy-preserving EIGENSTRAT remains on the border of feasibility. However, for all four algorithms, we show that the computations can be run and be completed.
For the solution based on the Intel Software Guard Extensions (SGX), it is clear that the computations are efficient and run in similar time to the algorithms that do not use secure computing. However, even if side channel attack mitigations make the computation 100 times slower, it will outperform MPC, according to our experiments. Thus, further comparison of the security properties of real-world deployments of these technologies will be needed.

Author Contributions

Conceptualisation, methodology: A.O. and S.L.; MPC algorithms, MPC implementation, MPC benchmarking, writing—original draft: A.O.; HI algorithms, HI implementation: V.S.; HI implementation, HI benchmarking: J.R.; validation, writing—original draft, writing—review and editing, project administration, supervision: L.K. All authors have read and agreed to the published version of the manuscript.

Funding

This work has been supported by the EU H2020-SU-ICT-03-2018 Project No. 830929 CyberSec4Europe (http://cybersec4europe.eu, accessed on 19 August 2021). This research has also been supported by the European Regional Development Fund through the Estonian Centre of Excellence in ICT Research (EXCITE), and by the Estonian Research Council through grants PRG49 and PRG920.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data that we used to run and measure our implementation were taken from the NCBI Gene Expression Omnibus (GEO) (https://www.ncbi.nlm.nih.gov/geo/query/acc.cgi?acc=GSE44974, accessed on 19 August 2021). It is available for download. However, the contents of the dataset do not affect the performance results as the running times of the privacy-preserving algorithms are data-independent by design. Therefore, any other dataset (real or synthetic) can be used to reproduce the benchmark results in this paper.

Acknowledgments

The authors wish to thank Dan Bogdanov for their support and suggestions for this paper, and Armin Daniel Kisand for their insights on trusted execution environments and Intel SGX.

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.

References

  1. Hartl, D.L.; Clark, A.G. Principles of Population Genetics, 4th ed.; Sinauer Associates: Sunderland, MA, USA, 2006. [Google Scholar]
  2. Hellwege, J.N.; Keaton, J.M.; Giri, A.; Gao, X.; Velez Edwards, D.R.; Edwards, T.L. Population Stratification in Genetic Association Studies. Curr. Protoc. Hum. Genet. 2017, 95, 1.22.1–1.22.23. [Google Scholar] [CrossRef] [PubMed]
  3. Campbell, C.D.; Ogburn, E.L.; Lunetta, K.L.; Lyon, H.N.; Freedman, M.L.; Groop, L.C.; Altshuler, D.; Ardlie, K.G.; Hirschhorn, J.N. Demonstrating stratification in a European American population. Nat. Genet. 2005, 37, 868. [Google Scholar] [CrossRef] [PubMed]
  4. European Data Protection Board. Recommendations 01/2020 on Measures that Supplement Transfer Tools to Ensure Compliance with the EU Level of Protection of Personal Data. 2020. Available online: https://edpb.europa.eu/our-work-tools/public-consultations-art-704/2020/recommendations-012020-measures-supplement-transfer_en (accessed on 19 August 2021).
  5. European Data Protection Supervisor. Preliminary Opinion 8/2020 on the European Health Data Space. 2020. Available online: https://edps.europa.eu/data-protection/our-work/publications/opinions/preliminary-opinion-82020-european-health-data-space_en (accessed on 19 August 2021).
  6. Kamm, L.; Bogdanov, D.; Laur, S.; Vilo, J. A new way to protect privacy in large-scale genome-wide association studies. Bioinformatics 2013, 29, 886–893. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  7. Constable, S.D.; Tang, Y.; Wang, S.; Jiang, X.; Chapin, S. Privacy-preserving GWAS analysis on federated genomic datasets. BMC Med. Inform. Decis. Mak. 2015, 15, S2. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  8. Bogdanov, D.; Kamm, L.; Laur, S.; Sokk, V. Implementation and Evaluation of an Algorithm for Cryptographically Private Principal Component Analysis on Genomic Data. IEEE/ACM Trans. Comput. Biol. Bioinform. 2018, 15, 1427–1432. [Google Scholar] [CrossRef]
  9. Bonte, C.; Makri, E.; Ardeshirdavani, A.; Simm, J.; Moreau, Y.; Vercauteren, F. Towards practical privacy-preserving genome-wide association study. BMC Bioinform. 2018, 19, 537. [Google Scholar] [CrossRef] [Green Version]
  10. Cho, H.; Wu, D.J.; Berger, B. Secure genome-wide association analysis using multiparty computation. Nat. Biotechnol. 2018, 36, 547–551. [Google Scholar] [CrossRef]
  11. Tkachenko, O.; Weinert, C.; Schneider, T.; Hamacher, K. Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies. In Proceedings of the 2018 on Asia Conference on Computer and Communications Security (ASIACCS’18), Incheon, Korea, 4–8 June 2018; ACM: New York, NY, USA, 2018; pp. 221–235. [Google Scholar]
  12. Bellafqira, R.; Ludwig, T.E.; Niyitegeka, D.; Génin, E.; Coatrieux, G. Privacy-Preserving Genome-Wide Association Study for Rare Mutations—A Secure FrameWork for Externalized Statistical Analysis. IEEE Access 2020, 8, 112515–112529. [Google Scholar] [CrossRef]
  13. Poddar, R.; Kalra, S.; Yanai, A.; Deng, R.; Popa, R.A.; Hellerstein, J.M. Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics. In Proceedings of the 30th USENIX Security Symposium (USENIX Security 21), Online, 11–13 August 2021; USENIX Association: Vancouver, BC, Canada, 2021. [Google Scholar]
  14. Zhang, Y.; Dai, W.; Jiang, X.; Xiong, H.; Wang, S. FORESEE: Fully Outsourced secuRe gEnome Study basEd on homomorphic Encryption. BMC Med. Inform. Decis. Mak. 2015, 15, S5. [Google Scholar] [CrossRef] [Green Version]
  15. Wang, S.; Zhang, Y.; Dai, W.; Lauter, K.E.; Kim, M.; Tang, Y.; Xiong, H.; Jiang, X. HEALER: Homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS. Bioinformatics 2016, 32, 211–218. [Google Scholar] [CrossRef] [Green Version]
  16. Chen, F.; Yang, H.; Kim, J.; Ohno-Machado, L.; Ding, S.; Jiang, X.; Wang, S.; Fox, D.; Lauter, K.; Lu, Y.; et al. PRINCESS: Privacy-protecting Rare disease International Network Collaboration via Encryption through Software guard extensionS. Bioinformatics 2016, 33, 871–878. [Google Scholar] [CrossRef] [Green Version]
  17. Asvadishirehjini, A.; Kantarcioglu, M.; Malin, B. A Framework for Privacy-Preserving Genomic Data Analysis Using Trusted Execution Environments. In Proceedings of the 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Atlanta, GA, USA, 28–31 October 2020; pp. 138–147. [Google Scholar]
  18. Kockan, C.; Zhu, K.; Dokmai, N.; Karpov, N.; Kulekci, M.O.; Woodruff, D.P.; Sahinalp, S.C. Sketching algorithms for genomic data analysis and querying in a secure enclave. Nat. Methods 2020, 17, 295–301. [Google Scholar] [CrossRef]
  19. Pascoal, T.; Decouchant, J.; Boutet, A.; Veríssimo, P. DyPS: Dynamic, Private and Secure GWAS. In Proceedings of the Privacy Enhancing Technologies (PoPETS), Online, 12–16 July 2021; Volume 2, pp. 214–234. [Google Scholar]
  20. Price, A.L.; Patterson, N.J.; Plenge, R.M.; Weinblatt, M.E.; Shadick, N.A.; Reich, D. Principal Components Analysis Corrects for Stratification in Genome-Wide Association Studies. Nat. Genet. 2006, 38, 904–909. [Google Scholar] [CrossRef] [PubMed]
  21. Simmons, S.; Sahinalp, C.; Berger, B. Enabling Privacy-Preserving GWASs in Heterogeneous Human Populations. Cell Syst. 2016, 3, 54–61. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  22. Mittos, A.; Malin, B.; Cristofaro, E.D. Systematizing Genomic Privacy Research—A Critical Analysis. arXiv 2017, arXiv:abs/1712.02193. [Google Scholar]
  23. Galinsky, K.J.; Bhatia, G.; Loh, P.R.; Georgiev, S.; Mukherjee, S.; Patterson, N.J.; Price, A.L. Fast Principal-Component Analysis Reveals Convergent Evolution of ADH1B in Europe and East Asia. Am. J. Hum. Genet. 2016, 98, 456–472. [Google Scholar] [CrossRef] [Green Version]
  24. Kang, H.M.; Sul, J.H.; Service, S.K.; Zaitlen, N.A.; Kong, S.Y.; Freimer, N.B.; Sabatti, C.; Eskin, E. Variance component model to account for sample structure in genome-wide association studies. Nat. Genet. 2010, 42, 348–354. [Google Scholar] [CrossRef] [Green Version]
  25. Devlin, B.; Roeder, K. Genomic Control for Association Studies. Biometrics 1999, 55, 997–1004. [Google Scholar] [CrossRef] [PubMed]
  26. Bogdanov, D. Sharemind: Programmable Secure Computations with Practical Applications. Ph.D. Thesis, University of Tartu, Tartu, Estonia, 2013. [Google Scholar]
  27. Cramer, R.; Damgård, I.; Nielsen, J. Secure Multiparty Computation and Secret Sharing; Cambridge University Press: New York, NY, USA, 2015. [Google Scholar]
  28. Archer, D.W.; Bogdanov, D.; Lindell, Y.; Kamm, L.; Nielsen, K.; Pagter, J.I.; Smart, N.P.; Wright, R.N. From Keys to Databases—Real-World Applications of Secure Multi-Party Computation. Comput. J. 2018, 61, 1749–1771. [Google Scholar] [CrossRef] [Green Version]
  29. Hastings, M.; Hemenway, B.; Noble, D.; Zdancewic, S. SoK: General Purpose Compilers for Secure Multi-Party Computation. In Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 19–23 May 2019; pp. 1220–1237. [Google Scholar]
  30. Randmets, J. An Overview of Vulnerabilities and Mitigations of Intel SGX Applications; Technical Report D-2-116; Cybernetica AS: Tallinn, Estonia, 2021. [Google Scholar]
  31. Bogdanov, D.; Kamm, L.; Laur, S.; Sokk, V. Rmind: A tool for cryptographically secure statistical analysis. IEEE Trans. Depend. Secur. Comput. 2016, 15, 481–495. [Google Scholar] [CrossRef] [Green Version]
  32. Bogdanov, D.; Laur, S.; Talviste, R. A Practical Analysis of Oblivious Sorting Algorithms for Secure Multi-party Computation. In Proceedings of the 19th Nordic Conference on Secure IT Systems (NordSec 2014), Tromsø, Norway, 15–17 October 2014; LNCS; Springer: Cham, Switzerland, 2014; Volume 8788, pp. 59–74. [Google Scholar]
  33. Golub, G.H.; Van Loan, C.F. Matrix Computations, 4th ed.; John Hopkins University Press: Baltimore, MD, USA, 2013. [Google Scholar]
  34. Laud, P.; Randmets, J. A Domain-Specific Language for Low-Level Secure Multiparty Computation Protocols. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (ACM 2015), Denver, CO, USA, 12–16 October 2015; pp. 1492–1503. [Google Scholar]
  35. Randmets, J. Programming Languages for Secure Multi-Party Computation Application Development. Ph.D. Thesis, University of Tartu, Tartu, Estonia, 2017. [Google Scholar]
  36. Bogdanov, D.; Niitsoo, M.; Toft, T.; Willemson, J. High-performance secure multi-party computation for data mining applications. Int. J. Inf. Secur. 2012, 11, 403–418. [Google Scholar] [CrossRef]
Table 1. Example genotype dataset and phenotype vector for GWAS.
Table 1. Example genotype dataset and phenotype vector for GWAS.
Donor ID S N P 1 S N P 2 S N P m Phenotype Vector y
D 1 0100
D 2 1001
D n 2021
Table 2. Genotype distribution for the Cochran-Armitage trend test.
Table 2. Genotype distribution for the Cochran-Armitage trend test.
Group A A A B B B Total
Case r 0 r 1 r 2 R
Control s 0 s 1 s 2 S
Total n 0 n 1 n 2 N
Table 3. Benchmark results for privacy-preserving EIGENSTRAT.
Table 3. Benchmark results for privacy-preserving EIGENSTRAT.
Subtask1500 SNPs2000 SNPs5000 SNPs20,000 SNPs2000 SNPs2000 SNPs
217 Donors217 Donors217 Donors217 Donors434 Donors868 Donors
Table preparation67.4 s85.4 s218.4 s865.1 s161.6 s347.0 s
GS-PCA182.8 s187.9 s183.3 s704.8 s685.8 s2606.0 s
Stratification control1365.9 s1849.5 s4520.2 s18,684.3 s6214.4 s22,112.0 s
Test statistics136.2 s174.5 s436.6 s1681.7 s344.2 s675.4 s
Total1752.4 s2297.2 s5358.4 s21,413.2 s7406.0 s25,740.4 s
(29.2 min)(38.3 min)(89.3 min)(5.95 h)(2.06 h)(7.15 h)
Table 4. Benchmark results for privacy-preserving FastPCA.
Table 4. Benchmark results for privacy-preserving FastPCA.
Subtask1500 SNPs2000 SNPs5000 SNPs20,000 SNPs2000 SNPs2000 SNPs
217 Donors217 Donors217 Donors217 Donors434 Donors868 Donors
Table preparation75.7 s102.1 s247.9 s1000.8 s198.1 s393.9 s
PCA using random2482.0 s3290.9 s7920.7 s31,355.6 s6194.8 s11,900.2 s
matrix theory
Stratification control216.3 s293.7 s707.3 s2800.8 s564.9 s1139.3 s
Test statistics159.1 s204.9 s505.6 s1998.5 s407.9 s815.6 s
Total2933.0 s3891.5 s9381.5 s37,155.7 s7365.7 s14,249.0 s
(48.9 min)(64.9 min)(2.61 h)(10.32 h)(2.04 h)(3.96 h)
Table 5. Benchmark results for privacy-preserving EMMAX.
Table 5. Benchmark results for privacy-preserving EMMAX.
Subtask1000 SNPs5000 SNPs20,000 SNPs1000 SNPs1000 SNPs
217 Donors217 Donors217 Donors100 Donors434 Donors
Table preparation44.7 s239.3 s891.0 s24.7 s89.8 s
Kinship matrix700.0 s3420.2 s13,988.5 s173.3 s2844.0 s
GS-PCA14,241.6 s14,209.2 s14,239.3 s1912.8 s104,067.3 s
Maximum likelihood4934.3 s21,381.8 s81,961.9 s1147.5 s23,185.7 s
Test statistics0.4 s1.7 s7.6 s0.4 s0.4 s
Total19,920.9 s39,252.5 s111,088.3 s3258.7 s130,187.1 s
(5.53 h)(10.90 h)(30.86 h)(54.3 min)(36.2 h)
Table 6. Benchmark results for privacy-preserving genomic control.
Table 6. Benchmark results for privacy-preserving genomic control.
Subtask5000 SNPs300,000 SNPs300,000 SNPs300,000 SNPs
217 Donors217 Donors434 Donors661 Donors
Table preparation33.8 s1912.3 s3619.5 s5451.1 s
Cochran–Armitage test0.3 s24.1 s23.5 s23.8 s
Stratification control0.9 s83.3 s83.4 s83.6 s
Total34.9 s2019.7 s3726.4 s5558.5 s
(0.6 min)(33.7 min)(62.1 min)(92.6 min)
Table 7. Benchmark results for the HI implementations of EIGENSTRAT and EMMAX.
Table 7. Benchmark results for the HI implementations of EIGENSTRAT and EMMAX.
SubtaskEIGENSTRATEMMAX
2000 SNPs5000 SNPs20,000 SNPs2000 SNPs1000 SNPs5000 SNPs
217 Donors217 Donors217 Donors868 Donors217 Donors217 Donors
Table preparation101 ms253 ms1600 ms272 ms28 ms215 ms
Kinship matrix219 ms606 ms2642 ms3552 ms111 ms609 ms
GS-PCA46 ms53 ms69 ms735 ms4202 ms4220 ms
Stratification control/443 ms1337 ms15675 ms2782 ms
Maximum likelihood 26 ms25 ms
Test statistics74 ms175 ms2489 ms442 ms409 ms2076 ms
Total883 ms2424 ms22475 ms7783 ms4776 ms7145 ms
Table 8. Comparison of the Sharemind MPC and HI implementations of privacy-preserving GWAS algorithms with stratification control.
Table 8. Comparison of the Sharemind MPC and HI implementations of privacy-preserving GWAS algorithms with stratification control.
ExperimentData SizeMPCHIIf HI Was 100 Times Slower
EIGENSTRAT5000 SNPs5358.4 s2.42 s242 s
200 donors(89.3 min)
EMMAX5000 SNPs87,400 s7.14 s714 s
200 donors(24.3 h)
Genomic control300,000 SNPs2096.5 s15.11 s∼20 s
200 donors(35 min)(reading input data)(reading input data)
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Ostrak, A.; Randmets, J.; Sokk, V.; Laur, S.; Kamm, L. Implementing Privacy-Preserving Genotype Analysis with Consideration for Population Stratification. Cryptography 2021, 5, 21. https://doi.org/10.3390/cryptography5030021

AMA Style

Ostrak A, Randmets J, Sokk V, Laur S, Kamm L. Implementing Privacy-Preserving Genotype Analysis with Consideration for Population Stratification. Cryptography. 2021; 5(3):21. https://doi.org/10.3390/cryptography5030021

Chicago/Turabian Style

Ostrak, Andre, Jaak Randmets, Ville Sokk, Sven Laur, and Liina Kamm. 2021. "Implementing Privacy-Preserving Genotype Analysis with Consideration for Population Stratification" Cryptography 5, no. 3: 21. https://doi.org/10.3390/cryptography5030021

APA Style

Ostrak, A., Randmets, J., Sokk, V., Laur, S., & Kamm, L. (2021). Implementing Privacy-Preserving Genotype Analysis with Consideration for Population Stratification. Cryptography, 5(3), 21. https://doi.org/10.3390/cryptography5030021

Article Metrics

Back to TopTop