Your SlideShare is downloading. ×
ICPSR Data Managment
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

ICPSR Data Managment

675

Published on

This is Part III of a workshop presented by ICPSR at IASSIST 2011. This section focuses on data management including data management plans, secure computing environments, and restricted data contract …

This is Part III of a workshop presented by ICPSR at IASSIST 2011. This section focuses on data management including data management plans, secure computing environments, and restricted data contract management.

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
675
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • The setting: as we’ve seen, increased demand for systems that manage and store sensitive (restricted) data.In January 2011, NSF requires 2-page data management plan as part of proposals.Data management has become a popular topic.
  • Explore live.Note that recording of DMP webinar is on this page.
  • 22 pages of guidelines and references even including a sample plan available for download.
  • FAQs consolidated from the webinars and from continuing discussions on DMPs into a blog where researchers and grant writers can read and contribute.
  • Keywords: data management plan; icpsr; icpsr data management planWhat will all this mean? Some things are clear, some things are unknown. Let’s talk about what’s clear.
  • Ingest refers to improvements in our internal (staff) computing systems – the VDEComputing in the cloud – our external (data user) computing systems – the SDEDistribution & Application – the RCS
  • The Restricted Use Contracting System (RCS) is built to serve three audiences:It enables processors to set up contracts for studies/datasets with restricted data, allowing them to enter terms of use into the system and indicate preferences as to contract behavior.It enables end users to apply for data electronically, tracking their paperwork and facilitating a somewhat complex process.It enables user support to manage individual contracts with users: verifying complete paperwork, transmitting data, and sending follow-up reminders.
  • Let’s take a peek into the RCS Portal – the data (end) user view at least.It’s a good idea to take a look at the FAQs and the application checklist first.
  • Wrap up
  • Transcript

    • 1. ICPSR AT 50:Facilitating Research and Data Sharing
      Part III: Data Management
      IASSIST Vancouver, BC
      May 31, 2011
    • 2. Data Management begins at 11:45
    • 3. Data Management Agenda
      Data Management Plans
      Computing & Data Sharing in Secure Environments
      Managing Restricted Contracts
    • 4. The Statement Heard Round the Research World:
      The National Science Foundation has released a new requirement for proposal submissions regarding the management of data generated using NSF support. Starting in January, 2011, all proposals must include a data management plan (DMP).
      The plan should be short, no more than two pages, and will be submitted as a supplementary document. The plan will need to address two main topics:
      What data are generated by your research?
      What is your plan for managing the data?
    • 5. Data Management in Demand
      ICPSR conducts webinars on data management plans:
      November 8, 2010: 134 attend
      January 12, 2011: 535 attend
      February 17, 2011: 71 attend
    • 6. ICPSR’s DMP Web Site
      www.icpsr.umich.edu/ICPSR/dmp/
    • 7. Guidelines for Download
    • 8. ICPSR’s DMP Blog - FAQs
      http://datamanagementplans.blogspot.com/
    • 9. ICPSR’s DMP Statistics
      January 2011: 3,984 views
      January – April 2011: 7,802 views
      Where are they coming from?
      5,527 Direct (bookmarked, etc.)
      3,370 from Google search
      878 from NSF
    • 10. Improving Data Management
      Potential increase in demand for data management services as a result of grant/contract requirements
      Increase in demand for processing, analysis, and distribution of sensitive data
      Resulted in improvements focused on secure computing and data sharing environments at ICPSR
    • 11. Three Angles of Security
      Secure Ingest
      Secure Computing in the Cloud
      Secure Online Application & Tracking
    • 12. ICPSRSecure Data Services
      We'd tell you more, but then we'd have to kill you.
    • 13. Two services; one platform
      Secure Data Environment
      • Serves ICPSR staff
      • 14. Protects against accidental data leakage
      • 15. Uses firewalls, virtualized workstations to access content
      • 16. Keeps the bad guys out
      Virtual Data Enclave
      • Serves ICPSR users
      • 17. Protects against accidental data leakage
      • 18. Uses firewalls, virtualized workstations to access content
      • 19. Keeps the bad guys out
    • One technology platform to rule them all
    • 20. Technology components
      • Needed to stand up the services quickly and with little working capital for investment
      • 21. Selected a strategy of investing in storage, and "renting" access and security services
      EMC NS 120 Network Attached Storage device
      University of Michigan "desktop virtualization" product, the Virtual Desktop Infrastructure (VDI) service
      University of Michigan "firewall virtualization" product, the Virtual Firewall service
    • 22. EMC NAS
      • Leverages existing infrastructure at ICPSR and experience with EMC products
      • 23. Two NAS units (NS 120 model)
      • 24. Private NAS - home to all secure data
      • 25. Semi-Private NAS - home to all other content, such as web site content, downloadable files, etc
      • 26. Each unit is attached to a different virtual network (VLAN); more on this later
    • Staff install EMC fiber-channel-attached storage
    • 27. Virtual Desktop Infrastructure Service
      • University of Michigan service
      • 28. Information Technology Services is the provider
      • 29. Virtualization as a Service (VaaS)
      • 30. ICPSR was a pilot user
      • 31. Enables access to content on the Private NAS via virtualized environment
      • 32. Easier to update
      • 33. Easier to secure
      • 34. Enables more secure remote access
      • 35. Uses the UMich Active Directory system for authentication, authorization, and accounting
      • 36. Priced comparably to Amazon's cloud (EC2)
    • Staff access secure data through the SDE
    • 37. Network topology
      • Former network topology was flat; every device had a routable IP address
      • 38. New topology is highly segmented; seven VLANs
      • 39. Physical systems - three VLANs
      • 40. Public
      • 41. Semi-Public
      • 42. Private
      • 43. Virtual systems - four VLANs
      • 44. SDE
      • 45. VDE
      • 46. Summer Program virtual lab
      • 47. Web site testing
    • 48. Secure Data Environment
      • Content enters via our Deposit System
      • 49. Content exits via one of two mechanisms
      • 50. turnover for content entering Archival Storage and/or Dissemination systems
      • 51. data airlock for other stuff
      • 52. Both exit points can be monitored, controlled, reviewed, audited, etc.
      • 53. Technology and strategic direction may be moving faster than culture
    • Staff react to new restrictions
    • 54. Virtual Data Enclave
      • Not suitable for "enclave-only" data
      • 55. Highly suitable for data ordinarily shared via a restricted-use agreement
      • 56. Alternative to shipping out sensitive data on removable media and hoping that nothing goes wrong
      • 57. Does shift cost burden (virtual workstation, storage) and risk burden (data security) from data analyst to data provider
      • 58. Who pays?
      • 59. How?
    • I have used the ICPSR VDE, and it is fantastic.
      Oz Noori - Detroit 1-8-7
       
      This is a paid celebratory endorsement
    • 60. Restricted Use Contracting System (RCS)
      Purpose
      Enables data processors (internal) to set up contracts with restricted data with terms of use and contract behavior preferences
      Enables end-users to apply for restricted data online & track progress
      Enables ICPSR user support to manage contracts and track end-users
    • 61. Overview of ICPSR’s RCS
    • 62. Application Steps
    • 63. 50 Years of Research Data
      Data Exploration
      Data Sharing
      Data Management
    • 64. Presenter Contact Information
      Peter Granda – peterg@umich.edu
      Linda Detterman – lindamd@umich.edu
      Sanda Ionescu – sandai@umich.edu
      Elizabeth Moss – eammoss@umich.edu
      Steve Burling – srb@umich.edu
    • 65. Enjoy Vancouver & IASSIST 2011!

    ×