Arshad Saadia, Arshad Junaid, Khan Muhammad Mubashir, Parkinson Simon
Department of Computer Science & IT, NED University of Engineering and Technology, Karachi, Pakistan.
School of Computing and Digital Technology, Birmingham City University, Birmingham, UK.
J Biomed Inform. 2021 Jul;119:103815. doi: 10.1016/j.jbi.2021.103815. Epub 2021 May 20.
DNA technology is rapidly moving towards digitization. Scientists use software tools and applications for sequencing, synthesizing, analyzing and sharing of DNA and genomic data, operate lab equipment and store genetic information in shared datastores. Using cutting-edge computing methods and techniques, researchers have decoded human genome, created organisms with new capabilities, automated drug development and transformed food safety. Such software applications are typically developed to progress scientific understanding and as such cyber security is never a concern for these applications. However, with the increasing commercialisation of DNA technologies, coupled with the sensitivity of DNA data, there is a need to adopt a security-by-design approach. In this paper we investigate bio-cyber security threats to genomic-DNA data and software applications making use of such data to advance scientific research. Specifically, we adopt an empirical approach to analyse and identify vulnerabilities within genomic-DNA databases and bioinformatics software applications that can lead to cyber-attacks affecting the confidentiality, integrity and availability of such sensitive data. We present a detailed analysis of these threats and highlight potential protection mechanisms to help researchers pursue these research directions.
DNA技术正迅速走向数字化。科学家使用软件工具和应用程序进行DNA和基因组数据的测序、合成、分析及共享,操作实验室设备,并将遗传信息存储在共享数据存储库中。通过使用前沿的计算方法和技术,研究人员已经解码了人类基因组,创造出具有新能力的生物体,实现了药物开发自动化,并变革了食品安全。此类软件应用程序通常是为增进科学理解而开发的,因此网络安全从来都不是这些应用程序所关注的问题。然而,随着DNA技术商业化程度的不断提高,再加上DNA数据的敏感性,有必要采用一种设计时考虑安全的方法。在本文中,我们研究了对基因组DNA数据以及利用此类数据推进科学研究的软件应用程序的生物网络安全威胁。具体而言,我们采用实证方法来分析和识别基因组DNA数据库及生物信息学软件应用程序中的漏洞,这些漏洞可能导致网络攻击,进而影响此类敏感数据的保密性、完整性和可用性。我们对这些威胁进行了详细分析,并强调了潜在的保护机制,以帮助研究人员探索这些研究方向。