Using blockchain to log genome dataset access: efficient storage and query

被引:11
|
作者
Gursoy, Gamze [1 ,2 ]
Bjornson, Robert [3 ,4 ]
Green, Molly E. [1 ,2 ]
Gerstein, Mark [1 ,2 ,4 ]
机构
[1] Yale Univ, Program Computat Biol & Bioinformat, New Haven, CT 06520 USA
[2] Yale Univ, Dept Mol Biochem & Biophys, New Haven, CT 06520 USA
[3] Yale Ctr Res Comp, New Haven, CT 06520 USA
[4] Yale Univ, Dept Comp Sci, POB 2158, New Haven, CT 06520 USA
基金
美国国家卫生研究院;
关键词
Blockchain; Secure storage; Genomic data access log; GENOTYPES; DATABASE;
D O I
10.1186/s12920-020-0716-z
中图分类号
Q3 [遗传学];
学科分类号
071007 ; 090102 ;
摘要
Background Genomic variants are considered sensitive information, revealing potentially private facts about individuals. Therefore, it is important to control access to such data. A key aspect of controlled access is secure storage and efficient query of access logs, for potential misuse. However, there are challenges to securing logs, such as designing against the consequences of "single points of failure". A potential approach to circumvent these challenges is blockchain technology, which is currently popular in cryptocurrency due to its properties of security, immutability, and decentralization. One of the tasks of the iDASH (Integrating Data for Analysis, Anonymization, and Sharing) Secure Genome Analysis Competition in 2018 was to develop time- and space-efficient blockchain-based ledgering solutions to log and query user activity accessing genomic datasets across multiple sites, using MultiChain. Methods MultiChain is a specific blockchain platform that offers "data streams" embedded in the chain for rapid and secure data storage. We devised a storage protocol taking advantage of the keys in the MultiChain data streams and created a data frame from the chain allowing efficient query. Our solution to the iDASH competition was selected as the winner at a workshop held in San Diego, CA in October 2018. Although our solution worked well in the challenge, it has the drawback that it requires downloading all the data from the chain and keeping it locally in memory for fast query. To address this, we provide an alternate "bigmem" solution that uses indices rather than local storage for rapid queries. Results We profiled the performance of both of our solutions using logs with 100,000 to 600,000 entries, both for querying the chain and inserting data into it. The challenge solution requires 12 seconds time and 120 Mb of memory for querying from 100,000 entries. The memory requirement increases linearly and reaches 470 MB for a chain with 600,000 entries. Although our alternate bigmem solution is slower and requires more memory (408 seconds and 250 MB, respectively, for 100,000 entries), the memory requirement increases at a slower rate and reaches only 360 MB for 600,000 entries. Conclusion Overall, we demonstrate that genomic access log files can be stored and queried efficiently with blockchain. Beyond this, our protocol potentially could be applied to other types of health data such as electronic health records.
引用
收藏
页数:9
相关论文
共 50 条
  • [41] A Storage Efficient Blockchain Model for Constrained Applications
    Rajendra, Yuvaraj
    Sahu, Sachin
    Subramanian, Venkatesan
    Shukla, Sandeep Kumar
    2021 THIRD INTERNATIONAL CONFERENCE ON BLOCKCHAIN COMPUTING AND APPLICATIONS (BCCA), 2021, : 73 - 80
  • [42] Efficient query evaluation through access-reordering
    Garcia, Steven
    Turpin, Andrew
    INFORMATION RETRIEVAL TECHNOLOGY, PROCEEDINGS, 2006, 4182 : 106 - 118
  • [43] Efficient and Verifiable Query Mechanism of DAG Blockchain Based on Learned Index
    Chang J.
    Lin L.
    Li B.
    Xiao J.
    Jin H.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (11): : 2455 - 2468
  • [44] Efficient Verifiable Boolean Range Query for Light Clients on Blockchain Database
    Gong, Jianpeng
    Wu, Jiaojiao
    Wang, Jianfeng
    Tan, Shichong
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2022, 2022, 13285 : 15 - 35
  • [45] Query Optimization Mechanism for Blockchain-Based Efficient Data Traceability
    Yuan, Xu
    Li, Fangbo
    Haider, Muhammad Zeeshan
    Ding, Feng
    Qi, Ange
    Yu, Shuo
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2023, PT VI, 2024, 14492 : 349 - 367
  • [46] Achieving Efficient and Secure Query in Blockchain-based Traceability Systems
    Lai, Chengzhe
    Wang, Yinzhen
    2022 19TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY & TRUST (PST), 2022,
  • [47] Efficient Security Policy Management Using Suspicious Rules Through Access Log Analysis
    El Hadj, Maryem Ait
    Khoumsi, Ahmed
    Benkaouz, Yahya
    Erradi, Mohammed
    NETWORKED SYSTEMS, NETYS 2019, 2019, 11704 : 250 - 266
  • [48] User authentication and access control to blockchain-based forensic log data
    Islam, Md. Ezazul
    Islam, Md. Rafiqul
    Chetty, Madhu
    Lim, Suryani
    Chadhar, Mehmood
    EURASIP JOURNAL ON INFORMATION SECURITY, 2023, 2023 (01)
  • [49] User authentication and access control to blockchain-based forensic log data
    Md. Ezazul Islam
    Md. Rafiqul Islam
    Madhu Chetty
    Suryani Lim
    Mehmood Chadhar
    EURASIP Journal on Information Security, 2023
  • [50] Efficient Distributed Authentication and Access Control System Management for Internet of Things Using Blockchain
    Djilali, Hadjer Benhadj
    Tandjaoui, Djamel
    MOBILE, SECURE, AND PROGRAMMABLE NETWORKING, 2019, 11557 : 51 - 60