• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
ICPSR Data Managment

ICPSR Data Managment



This is Part III of a workshop presented by ICPSR at IASSIST 2011. This section focuses on data management including data management plans, secure computing environments, and restricted data contract ...

This is Part III of a workshop presented by ICPSR at IASSIST 2011. This section focuses on data management including data management plans, secure computing environments, and restricted data contract management.



Total Views
Views on SlideShare
Embed Views



0 Embeds 0

No embeds



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

CC Attribution License

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment
  • The setting: as we’ve seen, increased demand for systems that manage and store sensitive (restricted) data.In January 2011, NSF requires 2-page data management plan as part of proposals.Data management has become a popular topic.
  • Explore live.Note that recording of DMP webinar is on this page.
  • 22 pages of guidelines and references even including a sample plan available for download.
  • FAQs consolidated from the webinars and from continuing discussions on DMPs into a blog where researchers and grant writers can read and contribute.
  • Keywords: data management plan; icpsr; icpsr data management planWhat will all this mean? Some things are clear, some things are unknown. Let’s talk about what’s clear.
  • Ingest refers to improvements in our internal (staff) computing systems – the VDEComputing in the cloud – our external (data user) computing systems – the SDEDistribution & Application – the RCS
  • The Restricted Use Contracting System (RCS) is built to serve three audiences:It enables processors to set up contracts for studies/datasets with restricted data, allowing them to enter terms of use into the system and indicate preferences as to contract behavior.It enables end users to apply for data electronically, tracking their paperwork and facilitating a somewhat complex process.It enables user support to manage individual contracts with users: verifying complete paperwork, transmitting data, and sending follow-up reminders.
  • Let’s take a peek into the RCS Portal – the data (end) user view at least.It’s a good idea to take a look at the FAQs and the application checklist first.
  • Wrap up

ICPSR Data Managment ICPSR Data Managment Presentation Transcript

  • ICPSR AT 50:Facilitating Research and Data Sharing
    Part III: Data Management
    IASSIST Vancouver, BC
    May 31, 2011
  • Data Management begins at 11:45
  • Data Management Agenda
    Data Management Plans
    Computing & Data Sharing in Secure Environments
    Managing Restricted Contracts
  • The Statement Heard Round the Research World:
    The National Science Foundation has released a new requirement for proposal submissions regarding the management of data generated using NSF support. Starting in January, 2011, all proposals must include a data management plan (DMP).
    The plan should be short, no more than two pages, and will be submitted as a supplementary document. The plan will need to address two main topics:
    What data are generated by your research?
    What is your plan for managing the data?
  • Data Management in Demand
    ICPSR conducts webinars on data management plans:
    November 8, 2010: 134 attend
    January 12, 2011: 535 attend
    February 17, 2011: 71 attend
  • ICPSR’s DMP Web Site
  • Guidelines for Download
  • ICPSR’s DMP Blog - FAQs
  • ICPSR’s DMP Statistics
    January 2011: 3,984 views
    January – April 2011: 7,802 views
    Where are they coming from?
    5,527 Direct (bookmarked, etc.)
    3,370 from Google search
    878 from NSF
  • Improving Data Management
    Potential increase in demand for data management services as a result of grant/contract requirements
    Increase in demand for processing, analysis, and distribution of sensitive data
    Resulted in improvements focused on secure computing and data sharing environments at ICPSR
  • Three Angles of Security
    Secure Ingest
    Secure Computing in the Cloud
    Secure Online Application & Tracking
  • ICPSRSecure Data Services
    We'd tell you more, but then we'd have to kill you.
  • Two services; one platform
    Secure Data Environment
    • Serves ICPSR staff
    • Protects against accidental data leakage
    • Uses firewalls, virtualized workstations to access content
    • Keeps the bad guys out
    Virtual Data Enclave
    • Serves ICPSR users
    • Protects against accidental data leakage
    • Uses firewalls, virtualized workstations to access content
    • Keeps the bad guys out
  • One technology platform to rule them all
  • Technology components
    • Needed to stand up the services quickly and with little working capital for investment
    • Selected a strategy of investing in storage, and "renting" access and security services
    EMC NS 120 Network Attached Storage device
    University of Michigan "desktop virtualization" product, the Virtual Desktop Infrastructure (VDI) service
    University of Michigan "firewall virtualization" product, the Virtual Firewall service
    • Leverages existing infrastructure at ICPSR and experience with EMC products
    • Two NAS units (NS 120 model)
    • Private NAS - home to all secure data
    • Semi-Private NAS - home to all other content, such as web site content, downloadable files, etc
    • Each unit is attached to a different virtual network (VLAN); more on this later
  • Staff install EMC fiber-channel-attached storage
  • Virtual Desktop Infrastructure Service
    • University of Michigan service
    • Information Technology Services is the provider
    • Virtualization as a Service (VaaS)
    • ICPSR was a pilot user
    • Enables access to content on the Private NAS via virtualized environment
    • Easier to update
    • Easier to secure
    • Enables more secure remote access
    • Uses the UMich Active Directory system for authentication, authorization, and accounting
    • Priced comparably to Amazon's cloud (EC2)
  • Staff access secure data through the SDE
  • Network topology
    • Former network topology was flat; every device had a routable IP address
    • New topology is highly segmented; seven VLANs
    • Physical systems - three VLANs
    • Public
    • Semi-Public
    • Private
    • Virtual systems - four VLANs
    • SDE
    • VDE
    • Summer Program virtual lab
    • Web site testing
  • Secure Data Environment
    • Content enters via our Deposit System
    • Content exits via one of two mechanisms
    • turnover for content entering Archival Storage and/or Dissemination systems
    • data airlock for other stuff
    • Both exit points can be monitored, controlled, reviewed, audited, etc.
    • Technology and strategic direction may be moving faster than culture
  • Staff react to new restrictions
  • Virtual Data Enclave
    • Not suitable for "enclave-only" data
    • Highly suitable for data ordinarily shared via a restricted-use agreement
    • Alternative to shipping out sensitive data on removable media and hoping that nothing goes wrong
    • Does shift cost burden (virtual workstation, storage) and risk burden (data security) from data analyst to data provider
    • Who pays?
    • How?
  • I have used the ICPSR VDE, and it is fantastic.
    Oz Noori - Detroit 1-8-7
    This is a paid celebratory endorsement
  • Restricted Use Contracting System (RCS)
    Enables data processors (internal) to set up contracts with restricted data with terms of use and contract behavior preferences
    Enables end-users to apply for restricted data online & track progress
    Enables ICPSR user support to manage contracts and track end-users
  • Overview of ICPSR’s RCS
  • Application Steps
  • 50 Years of Research Data
    Data Exploration
    Data Sharing
    Data Management
  • Presenter Contact Information
    Peter Granda – peterg@umich.edu
    Linda Detterman – lindamd@umich.edu
    Sanda Ionescu – sandai@umich.edu
    Elizabeth Moss – eammoss@umich.edu
    Steve Burling – srb@umich.edu
  • Enjoy Vancouver & IASSIST 2011!