Twelve quick tips for deploying a Beacon
Lauren A. Fromont,Mauricio Moldes,Michael Baudis,Anthony J. Brookes,Arcadi Navarro,Jordi Rambla
DOI: https://doi.org/10.1371/journal.pcbi.1011817
2024-03-02
PLoS Computational Biology
Abstract:In the age of data-driven biomedical research and clinical practice, the sharing of genomic and clinical data for health research and personalized medicine has become an important contributor to improved diagnosis and treatment. From the data owner's perspective, potential benefits include improved treatments, personalization of healthcare practice, and more effective control of disease proliferation. However, the requirement for high levels of data security to protect sensitive information presents a barrier to data discovery and sharing [1]. Beacon is designed to enable the benefits of data discovery while minimizing the associated risks. It is a Global Alliance for Genomics and Health (GA4GH) API specification (see Box 1 for a definition of key Beacon terminology), allowing easy discovery of sensitive data that require controlled (authorized) access [2]. It uses simple concepts and can be adapted to different use cases. The protocol is designed to respond to queries, such as the following: "Can you provide data about males, diagnosed with Type 2 diabetes, whose age of onset is below 30 years, and who carry mutations in the APOE gene?" Depending on the data controller's preferences over response granularity, the response options range from, "Yes, our data includes one or more" (boolean response), "Yes, we have 125" (count response), to "Yes, and here are some details about the 125 individuals that match your request" (detailed "record level" response). Discovery is the necessary first step in the sharing and reuse of data and other assets, and Beacon facilitates this by enabling federated discovery in any number of networks, as a complement to unwieldy central catalogs. Many beacons have already been successfully "lit" (deployed) across the globe (https://public.tableau.com/app/profile/elixir/viz/ELIXIRBeaconNetwork/Sheet1). This article is written to support data owners that might be interested in deploying a beacon to make their data discoverable while keeping them secure. Whatever your background is, this article will provide you with some tips to get you started. Specifically, we will review important steps to complete—and pitfalls to avoid—when deploying a beacon.
biochemical research methods,mathematical & computational biology