
Shuaicheng Ma et al. RESEARCH Efficient logging and querying for Blockchain-based cross-site genomic dataset access audit Shuaicheng Ma1*, Yang Cao2 and Li Xiong1 Abstract Background: Genomic data have been collected by different institutions and companies and need to be shared for broader use. In a cross-site genomic data sharing system, a secure and transparent access control audit module plays an essential role in ensuring the accountability. A centralized access log audit system is vulnerable to the single point of attack and also lack transparency since the log could be tampered by a malicious system administrator or internal adversaries. Several studies have proposed blockchain-based access audit to solve this problem but without considering the efficiency of the audit queries. The 2018 iDASH competition first track provides us with an opportunity to design efficient logging and querying system for cross-site genomic dataset access audit. We designed a blockchain-based log system which can provide a light-weight and widely compatible module for existing blockchain platforms. The submitted solution won the third place of the competition. In this paper, we report the technical details in our system. Methods: We present two methods: baseline method and enhanced method. We started with the baseline method and then adjusted our implementation based on the competition evaluation criteria and characteristics of the log system. To overcome obstacles of indexing on the immutable Blockchain system, we designed a hierarchical timestamp structure which supports efficient range queries on the timestamp field. Results: We implemented our methods in Python3, tested the scalability, and compared the performance using the test data supplied by competition organizer. We successfully boosted the log retrieval speed for complex AND queries that contain multiple predicates. For the range query, we boosted the speed for at least one order of magnitude. The storage usage is reduced by 25%. Conclusion: We demonstrate that Blockchain can be used to build a time and space efficient log and query genomic dataset audit trail. Therefore, it provides a promising solution for sharing genomic data with accountability requirement across multiple sites. Keywords: Blockchain; Genome; Cross-site genomic datasets; Access log audit arXiv:1907.07303v2 [cs.DB] 26 Jul 2019 Background from under $100 to more than $2,000, depending on With the rapid development of biomedical and com- the nature and complexity of the test [4]. One can putational technologies, a large amount of genomic test her gene easily and cheaply by using services data sets have been collected and analyzed in national from DNA-testing companies such as Ancestry and and international projects such as Human Genome 23andMe. Given the above, genomic data sets have Project [1] , the HapMap project [2] and the Genotype- been scattered around the world in different institu- Tissue Expression (GTEx) project [3], which yielded tions and companies. On the other hand, the poten- invaluable research data and extended the boundary tial business value of genomic data and privacy con- of human knowledge. Thanks to the advance of com- cerns [5,6,7] hinder the sharing of cross-sites genomic puter technology, the cost of genomic testing is drop- data. Notably, the General Data Protection Regulation ping exponentially. Nowadays, the testing price ranges (GDPR) restricts the exchange of personal data. Un- *Correspondence: [email protected] der GDPR, such sensitive data only could be accessed 1Department of Computer Science, Emory University, 400 Dowman Dr, Atlanta, GA, USA after obtaining the consent of data subjects (i.e., the Full list of author information is available at the end of the article one who owns the data) and providing accountability Shuaicheng Ma et al. Page 2 of 11 audit. This requires that any cross-site genomic data Ref ID, User, Activity, Resource, the task is to design sharing system should be equipped with a secure and a time/space− efficient data structure and mechanisms transparent access control module. to store and retrieve the logs based on Multichain ver- Blockchain technology has received increasing atten- sion 1.0.4 [40]. tion because it provides a new paradigm of value ex- change. Although it stems from cryptocurrency, many Competition setup and requirement. It is required studies have investigated the adoption of blockchain in that each entry in the data access log must be saved different application scenarios beyond financial domain individually as one transaction (i.e., participants can- that typically involve multiple parties with conflict of not save the entire file in just one transaction), and interests such as personal data sharing [8,9, 10], sup- all log data and intermediate data (such as index or ply chain [11, 12, 13], identity management [14, 15] and cache) must be saved on-chain (no off-chain data stor- medical data management [16, 17, 18, 19, 20, 21, 22]. age allowed). Competition participants can determine They show that using blockchain technology can re- how to represent and store each log entry in trans- duce friction and increase transparency. A blockchain actions. It does not need to be a plain text copy of system has several notable features: decentralization, the log entry. Also, the query implementation should immutability and transparency. These are achieved by allow a user to search the log using any field of one cryptographic hash, consensus algorithm and many log entry (i.e., node, id, user, resource, activity, times- other innovations from previously unrelated fields such tamp, and a \reference id" referring to the id of the as cryptography and distributed computation [23]. original resource request), any \AND" combination Due to the space limitation, we do not introduce more (e.g., node AND id AND user AND resource), and details of blockchain technologies and refer interested any timestamp range (e.g., from 1522000002418 to readers to surveys on blockchain [24, 25, 26, 27, 28, 29, 1522000011441) using a command-line interface. Also, 30, 31]. the user should be able to sort the returning results in Several studies investigated blockchain-based access ascending/descending order with any field (e.g., times- log audit [32, 33, 34] (we introduce them in the next tamp). There will be 4 nodes in the blockchain net- section). They focus on how to achieve the immutabil- work, and 4 log files to be stored. Users should be able ity of the log. However, none of them investigated the to query the data from any of the 4 sites. Participants efficiency of logging and querying for a blockchain sys- can implement any algorithms to store, retrieve, and tem at the application layer. On the other hand, a present the log data correctly and efficiently. few recent studies [35, 36, 37, 38] from database com- munity consider a blockchain system as a distributed Evaluation Criteria. The logging/querying system database, and attempt to improve the performance of needs to demonstrate good performance (i.e., accu- such system by exploring new designs of bottom lay- rate query results) by using a testing dataset, which is ers (such as storage or transaction processing) of the different from the one provided for the participants. system. However, without considering the application The speed, storage/memory cost, and scalability of characteristics, such modifications on the back-end en- gine of the system may not have the desired perfor- each solution will be evaluated. The competition or- mance improvement on every application or even cause ganizer used the binary version of Multichain 1.0.4 on unexpected side effects. 64-bit Ubuntu 14.04 with the default parameters as the The 2018 iDASH competition first track, \Blockchain- test bed for fairness. No modification of the underly- based immutable logging and querying for cross-site ge- ing Multichain source code is allowed. The submitted nomic dataset access audit trail", provides us with an executable binaries should be non-interactive (i.e., de- opportunity to explore a light-weight and widely com- pend only on parameters with no input required while patible access audit module for existing blockchain it works), and should contain a readme file to specify platforms. Our submitted solution won the third place the parameters. The organizer tested all submissions of the competition. In this paper, we report the system using 4 virtual machines, each with 2-Core CPU, 8GB design and technical details in our solution. RAMs and 100GB storage. The competition task [39] Related work The goal of iDASH competition 2018 first track is The closest line of work to this competition is blockchain- to develop blockchain-based ledgering solutions to log based access log audit. Suzuki et al., [32] proposed a and query the user activities of accessing genomic method using blockchain as an audit-able communi- datasets across multiple sites. Concretely, given a ge- cation channel. This study is motivated by a similar nomic data access log file in which each entry in- problem studied in this paper: in a client-server sys- cludes seven attributes including Timestamp, Node, ID, tem, the logging on either server-side or client-side Shuaicheng Ma et al. Page 3 of 11 Figure 1 Overview of the logging system. Logging Query User System Insert MultiChain Blockchain API does not provide strict means of auditing, because the design a blockchain-based log system that can serve as host of the logging system could tamper the log. They a light-weight and widely compatible component for implemented a proof-of-concept system on top of Bit- the existing blockchain platforms. Especially, our so- coin by encoding the messages (i.e., API calls from lution is optimized for genomic dataset access auditing clients and Replies from the server) between clients under the requirements of the competition task. and the server into the transactions of bitcoin.
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages11 Page
-
File Size-