Skip to main content

Table 7 The resource requirements of aggregation tasks

From: SVAT: Secure outsourcing of variant annotation and genotype aggregation

 

Time (Sec)

Peak memory (GB)

Disk space (GB)

Encryption (NIH/Owner)

\(M_{1}\)

54.4605

168.332

41.50772095

\(M_{2}\)

107.5746

 

83.01544189

Re-encryp. (Server)

\(M_{1}\)

20.4396

 

–

\(M_{2}\)

39.5913

 

–

Aggregation (Server)

4.7757

 

–

Decryption (Client)

0.1867

–

0.34

  1. Encryption is performed by the owner or the trusted entity, i.e., (NIH). The encrypted data is sent to the aggregation server. After the client requests the aggregation, the trusted entity generates the re-encryption key and sends it to the server. The genotype matrices are re-encrypted and aggregated by the server