A Blockchain-Enabled Deep Learning Framework for Secure Omics Data Sharing and Attack Detection
DOI:
https://doi.org/10.65879/3070-5789.2025.01.04Keywords:
Omics security, blockchain, Ethereum, smart contracts, data integrity, access control, LSTM, intrusion detection, anomaly detection, bioinformaticsAbstract
Securing omics datasets against tampering and misuse is essential for reproducible research and privacy. We present a defense-in-depth framework that combines Ethereum smart contracts for tamper evidence, provenance, and fine-grained access with a Long Short-Term Memory (LSTM) intrusion detection system that models event sequences to flag abnormal behavior. Raw omics files remain off-chain; their SHA-256 digests and permissions are recorded on-chain. Authorized consumers obtain contract-mediated tokens to fetch encrypted data, recompute hashes, and verify integrity. The intrusion detection system (IDS) ingests blockchain transactions and storage access logs in sliding windows to detect bursts, probing, and insider over-access. We implement the system on a permissioned Ethereum network and evaluate it with a simulated case study using public gene-expression files and scripted attacks. All post-registration data modifications were detected at verification time (100% integrity detection). Behavioral attacks were identified with 95% precision and 90% recall, reducing false alarms to 1% of windows and outperforming a rules-only baseline (80% precision, 75% recall). Transaction latency and resource costs remained modest. These results demonstrate a practical path to trustworthy omics sharing that unites cryptographic immutability with monitoring. Our design supports consent enforcement and lays groundwork for extensions such as Merkle-root batching, key rotation, and federated or transformer-based detectors.
References
[1] All of Us Research Program Genomics Investigators. Genomic data in the All of Us Research Program. Nature 2024; 627(8003): 340-346.
[2] Gymrek M, McGuire AL, Golan D, Halperin E, Erlich Y. Identifying personal genomes by surname inference. Science 2013; 339(6117): 321-324.
https://doi.org/10.1126/science.1229566
[3] Verizon 2025 Data Breach Investigations Report [Internet] 2025 May 5 [cited 2025 Oct 16]. Available from: https://www.verizon.com/business/resources/reports/dbir/ (Executive summary PDF available).
[4] Kent K, Souppaya M. Guide to Computer Security Log Management. NIST Spe- cial Publication 800-92 [Internet]. Gaithersburg (MD): National Institute of Standards and Technology; 2006 Sep [cited 2025 Oct 16]. doi: 10.6028/NIST.SP.800-92. Available from: https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-92.pdf
[5] Knoppers BM. Framework for responsible sharing of genomic and health-related data. HUGO Journal 2014; 8: 3.
https://doi.org/10.1186/s11568-014-0003-1
[6] National Institute of Standards and Technology. FIPS PUB 180-4: Secure Hash Standard (SHS) [Internet]. Gaithersburg (MD): NIST; 2015 Aug [cited 2025 Oct 16]. Available from: https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.180-4.pdf
[7] Wood G. Ethereum: A Secure Decentralised Generalised Transaction Ledger (Yel- low Paper). Shanghai version [Internet] 2025 Feb 4 [cited 2025 Oct 16]. Available from: https://ethereum.github.io/yellowpaper/paper.pdf
[8] Azaria A, Ekblaw A, Vieira T, Lippman A. MedRec: Using blockchain for medical data access and permission management. In: 2016 2nd International Conference on Open and Big Data (OBD). IEEE; 2016; pp. 25-30.
https://doi.org/10.1109/OBD.2016.11
[9] Dubovitskaya A, Xu Z, Ryu S, Schumacher M, Wang F. Secure and trustable electronic medical records sharing using blockchain. AMIA Annu Symp Proc 2018; 2017: 650-659.
[10] Enterprise Ethereum Alliance. Enterprise Ethereum Alliance Client Specification v7 [In- ternet] 2022 Nov 21 [cited 2025 Oct 16]. Available from: https://entethalliance.github.io/client- spec/spec.html
[11] Baliga A, Subhod I, Kamat P, Chatterjee S. Performance evaluation of the Quo- rum blockchain platform. arXiv [Preprint] 2018 Jul 19. arXiv: 1809.03421. Available from: https://arxiv.org/abs/1809.03421
[12] Du M, Li F, Zheng G, Srikumar V. DeepLog: Anomaly detection and diagnosis from system logs through deep learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS ’17). New York: ACM; 2017; pp. 1285-1298.
https://doi.org/10.1145/3133956.3134015
[13] Landauer M, Onder S, Skopik F, Wurzenberger M. Deep learning for anomaly detection in log data: A survey. Machine Learning with Applications 2023; 12: 100470.
https://doi.org/10.1016/j.mlwa.2023.100470
[14] Acar A, Aksu H, Uluagac AS, Conti M. A survey on homomorphic encryption schemes: Theory and implementation. ACM Computing Surveys 2018; 51(4): 79.
https://doi.org/10.1145/3214303
[15] Szilágyi P. EIP-225: Clique proof-of-authority consensus protocol. Ethereum Improve- ment Proposals 2017 Mar 6. Available from: https://eips.ethereum.org/EIPS/eip-225
[16] Hyperledger Besu. Configure IBFT 2.0 consensus. Besu Documentation. Up- dated 2025 Jul 31. Available from: https://besu.hyperledger.org/private-networks/how- to/configure/consensus/ibft
[17] OpenZeppelin. Access Control — OpenZeppelin Contracts v5.x documentation 2023-2025. Available from: https://docs.openzeppelin.com/contracts/5.x/access-control
[18] OpenZeppelin. Utils API (includes Pausable, ReentrancyGuard) — OpenZeppelin Con- tracts v5.x docs 2023-2025. Available from: https://docs.openzeppelin.com/contracts/5.x/api/utils
[19] Chainstack Docs. eth_subscribe("logs") — real-time subscription to contract events 2024-2025. Available from: https://docs.chainstack.com/reference/ethereum-native-subscribe- logs
[20] Dworkin M. NIST SP 800-38D: Recommendation for Block Cipher Modes of Opera- tion—GCM and GMAC. Gaithersburg (MD): NIST; 2007.
https://doi.org/10.6028/NIST.SP.800-38d
[21] Benet J. IPFS—Content Addressed, Versioned, P2P File System. arXiv 2014; arXiv: 1407.3561.
[22] Laurie B, Langley A, Kasper E. RFC 6962: Certificate Transparency. IETF; 2013.
https://doi.org/10.17487/rfc6962
[23] Bloemen R, Logvinov L, Evans J. EIP-712: Typed structured data hashing and signing. Ethereum Improvement Proposals 2017 Sep 12. Available from: https://eips.ethereum.org/EIPS/eip- 712
[24] European Union. General Data Protection Regulation (GDPR) — Article 4(5) “Pseudonymisation” 2016. Available from: https://gdpr-info.eu/art-4-gdpr/
[25] ENISA. Pseudonymisation techniques and best practices 2019 Dec 3. Available from: https://www.enisa.europa.eu/ publications/pseudonymisation-techniques-and-best-practices
[26] Ba J, Kiros JR, Hinton GE. Layer Normalization. arXiv 2016; arXiv: 1607.06450. Available from: https://arxiv.org/abs/1607.06450
[27] Srivastava N, Hinton G, Krizhevsky A, Sutskever I, Salakh-utdinov R. Dropout: A simple way to prevent neural networks from overfitting. J Mach Learn Res 2014; 15: 1929-1958.
[28] Lin TY, Goyal P, Girshick R, He K, Dollár P. Focal Loss for Dense Object Detection. Proc IEEE ICCV 2017: 2999-3007.
https://doi.org/10.1109/ICCV.2017.324
[29] Kingma DP, Ba J. Adam: A Method for Stochastic Optimization. arXiv 2014; arXiv: 1412.6980. Available from: https://arxiv.org/abs/1412.6980
[30] Saito T, Rehmsmeier M. The precision-recall plot is more informative than the ROC plot when evaluating binary classifiers on imbalanced datasets. PLoS One 2015; 10(3): e0118432.
https://doi.org/10.1371/journal.pone.0118432
[31] Efron B, Tibshirani RJ. An Introduction to the Bootstrap. New York: Chapman & Hall/CRC; 1993.
https://doi.org/10.1007/978-1-4899-4541-9
[32] Trail of Bits (Crytic). Slither: Static Analyzer for Solidity and Vyper. GitHub repository. Available from: https://github.com/crytic/slither
[33] ConsenSys Diligence. Mythril: Security analysis tool for EVM smart contracts. GitHub repository. Available from: https://github.com/ConsenSys/mythril
[34] Safe (formerly Gnosis Safe). Safe Docs — Multisignature smart-contract wallet docu- mentation 2025. Available from: https://docs.safe.global/
[35] Roosan D, Khou T, Pham B, Li Y, Ashakin MR, Khan HM, Khan R, Haider MR. Quantum AI-based blockchain security for drug discovery. In: 7th International Conference on Innovation in Artificial Intelligence (ICIAI 2025); 2025 Mar 13-15; Singapore. Available from: https://www.iciai.org
[36] Hai F, Nirzhor S, Khan R, and Roosan D. Enhancing biosecurity in tamper-resistant large language models with quantum gradient descent. In: DATA 2025; 2025 Jun 11-13; Bilbao, Spain.
https://doi.org/10.5220/0013553100003967
[37] Roosan D, Khan R, Ashakin MR, Khou T, Nirzhor S, Haider MR. Quantum variational transformer model for enhanced cancer classification. arXiv [Preprint] 2025; arXiv: 2506.21641.
https://doi.org/10.3233/ATDE250557
[38] Roosan D, Ashakin MR, Khan R, Khan HM, Khou T, Carnasciali M, Haider MR. Variational Quantum Circuits for Molecular Classification Using Graph Neural Network. In: International Conference on Quantum Communications, Networking, and Computing (QCNC 2025); 2025 Mar 31-Apr 2; Nara, Japan. (Accepted paper listing).
https://doi.org/10.1109/QCNC64685.2025.00074
[39] Groth J. On the size of pairing-based non-interactive arguments. In: Advances in Cryptology—EUROCRYPT 2016. Lecture Notes in Computer Science. Springer; 2016; pp. 305-326. (Groth16 zk-SNARK).
https://doi.org/10.1007/978-3-662-49896-5_11
[40] Guo H, Yuan S, Wu X. LogBERT: Log anomaly detection via BERT. arXiv [Preprint] 2021; arXiv: 2103.04475. Available from: https://ar5iv.labs.arxiv.org/html/2103.04475.
[41] National Institute of Standards and Technology (NIST). FIPS 203: Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM). Gaithersburg (MD): NIST; 2024 Aug 13. Available from: https://csrc.nist.gov/pubs/fips/203/final (PDF: nvlpubs.nist.gov/nistpubs/fips/nist.fips.203.pdf).
[42] National Institute of Standards and Technology (NIST). FIPS 204: Module-Lattice-Based Digital Signature Standard (ML-DSA). Gaithersburg (MD): NIST; 2024 Aug 13. Available from: https://csrc.nist.gov/pubs/fips/204/final (PDF: nvlpubs.nist.gov/nistpubs/fips/nist.fips.204.pdf).
[43] Alexander CA, Wang L. Cyber Forensics on Advanced Technology Platforms. Journal of Cybersecurity, Digital Forensics and Jurisprudence 2025; 1.
[44] Rajkarnikar J, Poudel N, Rahimi N. Unsupervised Anomaly Detection in OpenStack Logs via Fine-Tuned RoBERTa Embeddings. Journal of Cybersecurity, Digital Forensics and Jurisprudence 2025; 1.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.