ICPSR Data Managment

812
-1

Published on

This is Part III of a workshop presented by ICPSR at IASSIST 2011. This section focuses on data management including data management plans, secure computing environments, and restricted data contract management.

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
812
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • The setting: as we’ve seen, increased demand for systems that manage and store sensitive (restricted) data.In January 2011, NSF requires 2-page data management plan as part of proposals.Data management has become a popular topic.
  • Explore live.Note that recording of DMP webinar is on this page.
  • 22 pages of guidelines and references even including a sample plan available for download.
  • FAQs consolidated from the webinars and from continuing discussions on DMPs into a blog where researchers and grant writers can read and contribute.
  • Keywords: data management plan; icpsr; icpsr data management planWhat will all this mean? Some things are clear, some things are unknown. Let’s talk about what’s clear.
  • Ingest refers to improvements in our internal (staff) computing systems – the VDEComputing in the cloud – our external (data user) computing systems – the SDEDistribution & Application – the RCS
  • The Restricted Use Contracting System (RCS) is built to serve three audiences:It enables processors to set up contracts for studies/datasets with restricted data, allowing them to enter terms of use into the system and indicate preferences as to contract behavior.It enables end users to apply for data electronically, tracking their paperwork and facilitating a somewhat complex process.It enables user support to manage individual contracts with users: verifying complete paperwork, transmitting data, and sending follow-up reminders.
  • Let’s take a peek into the RCS Portal – the data (end) user view at least.It’s a good idea to take a look at the FAQs and the application checklist first.
  • Wrap up
  • ICPSR Data Managment

    1. 1. ICPSR AT 50:Facilitating Research and Data Sharing<br />Part III: Data Management<br />IASSIST Vancouver, BC<br />May 31, 2011<br />
    2. 2. Data Management begins at 11:45<br />
    3. 3. Data Management Agenda<br />Data Management Plans<br />Computing & Data Sharing in Secure Environments<br />Managing Restricted Contracts<br />
    4. 4. The Statement Heard Round the Research World:<br />The National Science Foundation has released a new requirement for proposal submissions regarding the management of data generated using NSF support. Starting in January, 2011, all proposals must include a data management plan (DMP). <br />The plan should be short, no more than two pages, and will be submitted as a supplementary document. The plan will need to address two main topics: <br />What data are generated by your research? <br />What is your plan for managing the data? <br />
    5. 5. Data Management in Demand<br />ICPSR conducts webinars on data management plans:<br />November 8, 2010: 134 attend<br />January 12, 2011: 535 attend<br />February 17, 2011: 71 attend<br />
    6. 6. ICPSR’s DMP Web Site<br />www.icpsr.umich.edu/ICPSR/dmp/<br />
    7. 7. Guidelines for Download<br />
    8. 8. ICPSR’s DMP Blog - FAQs<br />http://datamanagementplans.blogspot.com/<br />
    9. 9. ICPSR’s DMP Statistics<br />January 2011: 3,984 views<br />January – April 2011: 7,802 views<br />Where are they coming from?<br />5,527 Direct (bookmarked, etc.)<br />3,370 from Google search<br />878 from NSF<br />
    10. 10. Improving Data Management<br />Potential increase in demand for data management services as a result of grant/contract requirements<br />Increase in demand for processing, analysis, and distribution of sensitive data<br />Resulted in improvements focused on secure computing and data sharing environments at ICPSR<br />
    11. 11. Three Angles of Security<br />Secure Ingest<br />Secure Computing in the Cloud<br />Secure Online Application & Tracking<br />
    12. 12. ICPSRSecure Data Services<br />We'd tell you more, but then we'd have to kill you.<br />
    13. 13. Two services; one platform<br />Secure Data Environment<br /><ul><li>Serves ICPSR staff
    14. 14. Protects against accidental data leakage
    15. 15. Uses firewalls, virtualized workstations to access content
    16. 16. Keeps the bad guys out </li></ul>Virtual Data Enclave<br /><ul><li>Serves ICPSR users
    17. 17. Protects against accidental data leakage
    18. 18. Uses firewalls, virtualized workstations to access content
    19. 19. Keeps the bad guys out</li></li></ul><li>One technology platform to rule them all<br />
    20. 20. Technology components<br /><ul><li>Needed to stand up the services quickly and with little working capital for investment
    21. 21. Selected a strategy of investing in storage, and "renting" access and security services</li></ul>EMC NS 120 Network Attached Storage device<br />University of Michigan "desktop virtualization" product, the Virtual Desktop Infrastructure (VDI) service<br />University of Michigan "firewall virtualization" product, the Virtual Firewall service<br />
    22. 22. EMC NAS <br /><ul><li>Leverages existing infrastructure at ICPSR and experience with EMC products
    23. 23. Two NAS units (NS 120 model)
    24. 24. Private NAS - home to all secure data
    25. 25. Semi-Private NAS - home to all other content, such as web site content, downloadable files, etc
    26. 26. Each unit is attached to a different virtual network (VLAN); more on this later</li></li></ul><li>Staff install EMC fiber-channel-attached storage<br />
    27. 27. Virtual Desktop Infrastructure Service<br /><ul><li>University of Michigan service
    28. 28. Information Technology Services is the provider
    29. 29. Virtualization as a Service (VaaS)
    30. 30. ICPSR was a pilot user
    31. 31. Enables access to content on the Private NAS via virtualized environment
    32. 32. Easier to update
    33. 33. Easier to secure
    34. 34. Enables more secure remote access
    35. 35. Uses the UMich Active Directory system for authentication, authorization, and accounting
    36. 36. Priced comparably to Amazon's cloud (EC2) </li></li></ul><li>Staff access secure data through the SDE<br />
    37. 37. Network topology<br /><ul><li>Former network topology was flat; every device had a routable IP address
    38. 38. New topology is highly segmented; seven VLANs
    39. 39. Physical systems - three VLANs
    40. 40. Public
    41. 41. Semi-Public
    42. 42. Private
    43. 43. Virtual systems - four VLANs
    44. 44. SDE
    45. 45. VDE
    46. 46. Summer Program virtual lab
    47. 47. Web site testing</li></li></ul><li>
    48. 48. Secure Data Environment<br /><ul><li>Content enters via our Deposit System
    49. 49. Content exits via one of two mechanisms
    50. 50. turnover for content entering Archival Storage and/or Dissemination systems
    51. 51. data airlock for other stuff
    52. 52. Both exit points can be monitored, controlled, reviewed, audited, etc.
    53. 53. Technology and strategic direction may be moving faster than culture</li></li></ul><li>Staff react to new restrictions<br />
    54. 54. Virtual Data Enclave<br /><ul><li>Not suitable for "enclave-only" data
    55. 55. Highly suitable for data ordinarily shared via a restricted-use agreement
    56. 56. Alternative to shipping out sensitive data on removable media and hoping that nothing goes wrong
    57. 57. Does shift cost burden (virtual workstation, storage) and risk burden (data security) from data analyst to data provider
    58. 58. Who pays?
    59. 59. How?</li></li></ul><li>I have used the ICPSR VDE, and it is fantastic.<br />Oz Noori - Detroit 1-8-7<br /> <br />This is a paid celebratory endorsement<br />
    60. 60. Restricted Use Contracting System (RCS)<br />Purpose<br />Enables data processors (internal) to set up contracts with restricted data with terms of use and contract behavior preferences<br />Enables end-users to apply for restricted data online & track progress<br />Enables ICPSR user support to manage contracts and track end-users<br />
    61. 61. Overview of ICPSR’s RCS<br />
    62. 62. Application Steps<br />
    63. 63. 50 Years of Research Data<br />Data Exploration<br />Data Sharing<br />Data Management<br />
    64. 64. Presenter Contact Information<br />Peter Granda – peterg@umich.edu<br />Linda Detterman – lindamd@umich.edu<br />Sanda Ionescu – sandai@umich.edu<br />Elizabeth Moss – eammoss@umich.edu<br />Steve Burling – srb@umich.edu<br />
    65. 65. Enjoy Vancouver & IASSIST 2011!<br />
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×