Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

ICPSR Data Managment


Published on

This is Part III of a workshop presented by ICPSR at IASSIST 2011. This section focuses on data management including data management plans, secure computing environments, and restricted data contract management.

Published in: Education
  • Be the first to comment

  • Be the first to like this

ICPSR Data Managment

  1. 1. ICPSR AT 50:Facilitating Research and Data Sharing<br />Part III: Data Management<br />IASSIST Vancouver, BC<br />May 31, 2011<br />
  2. 2. Data Management begins at 11:45<br />
  3. 3. Data Management Agenda<br />Data Management Plans<br />Computing & Data Sharing in Secure Environments<br />Managing Restricted Contracts<br />
  4. 4. The Statement Heard Round the Research World:<br />The National Science Foundation has released a new requirement for proposal submissions regarding the management of data generated using NSF support. Starting in January, 2011, all proposals must include a data management plan (DMP). <br />The plan should be short, no more than two pages, and will be submitted as a supplementary document. The plan will need to address two main topics: <br />What data are generated by your research? <br />What is your plan for managing the data? <br />
  5. 5. Data Management in Demand<br />ICPSR conducts webinars on data management plans:<br />November 8, 2010: 134 attend<br />January 12, 2011: 535 attend<br />February 17, 2011: 71 attend<br />
  6. 6. ICPSR’s DMP Web Site<br /><br />
  7. 7. Guidelines for Download<br />
  8. 8. ICPSR’s DMP Blog - FAQs<br /><br />
  9. 9. ICPSR’s DMP Statistics<br />January 2011: 3,984 views<br />January – April 2011: 7,802 views<br />Where are they coming from?<br />5,527 Direct (bookmarked, etc.)<br />3,370 from Google search<br />878 from NSF<br />
  10. 10. Improving Data Management<br />Potential increase in demand for data management services as a result of grant/contract requirements<br />Increase in demand for processing, analysis, and distribution of sensitive data<br />Resulted in improvements focused on secure computing and data sharing environments at ICPSR<br />
  11. 11. Three Angles of Security<br />Secure Ingest<br />Secure Computing in the Cloud<br />Secure Online Application & Tracking<br />
  12. 12. ICPSRSecure Data Services<br />We'd tell you more, but then we'd have to kill you.<br />
  13. 13. Two services; one platform<br />Secure Data Environment<br /><ul><li>Serves ICPSR staff
  14. 14. Protects against accidental data leakage
  15. 15. Uses firewalls, virtualized workstations to access content
  16. 16. Keeps the bad guys out </li></ul>Virtual Data Enclave<br /><ul><li>Serves ICPSR users
  17. 17. Protects against accidental data leakage
  18. 18. Uses firewalls, virtualized workstations to access content
  19. 19. Keeps the bad guys out</li></li></ul><li>One technology platform to rule them all<br />
  20. 20. Technology components<br /><ul><li>Needed to stand up the services quickly and with little working capital for investment
  21. 21. Selected a strategy of investing in storage, and "renting" access and security services</li></ul>EMC NS 120 Network Attached Storage device<br />University of Michigan "desktop virtualization" product, the Virtual Desktop Infrastructure (VDI) service<br />University of Michigan "firewall virtualization" product, the Virtual Firewall service<br />
  22. 22. EMC NAS <br /><ul><li>Leverages existing infrastructure at ICPSR and experience with EMC products
  23. 23. Two NAS units (NS 120 model)
  24. 24. Private NAS - home to all secure data
  25. 25. Semi-Private NAS - home to all other content, such as web site content, downloadable files, etc
  26. 26. Each unit is attached to a different virtual network (VLAN); more on this later</li></li></ul><li>Staff install EMC fiber-channel-attached storage<br />
  27. 27. Virtual Desktop Infrastructure Service<br /><ul><li>University of Michigan service
  28. 28. Information Technology Services is the provider
  29. 29. Virtualization as a Service (VaaS)
  30. 30. ICPSR was a pilot user
  31. 31. Enables access to content on the Private NAS via virtualized environment
  32. 32. Easier to update
  33. 33. Easier to secure
  34. 34. Enables more secure remote access
  35. 35. Uses the UMich Active Directory system for authentication, authorization, and accounting
  36. 36. Priced comparably to Amazon's cloud (EC2) </li></li></ul><li>Staff access secure data through the SDE<br />
  37. 37. Network topology<br /><ul><li>Former network topology was flat; every device had a routable IP address
  38. 38. New topology is highly segmented; seven VLANs
  39. 39. Physical systems - three VLANs
  40. 40. Public
  41. 41. Semi-Public
  42. 42. Private
  43. 43. Virtual systems - four VLANs
  44. 44. SDE
  45. 45. VDE
  46. 46. Summer Program virtual lab
  47. 47. Web site testing</li></li></ul><li>
  48. 48. Secure Data Environment<br /><ul><li>Content enters via our Deposit System
  49. 49. Content exits via one of two mechanisms
  50. 50. turnover for content entering Archival Storage and/or Dissemination systems
  51. 51. data airlock for other stuff
  52. 52. Both exit points can be monitored, controlled, reviewed, audited, etc.
  53. 53. Technology and strategic direction may be moving faster than culture</li></li></ul><li>Staff react to new restrictions<br />
  54. 54. Virtual Data Enclave<br /><ul><li>Not suitable for "enclave-only" data
  55. 55. Highly suitable for data ordinarily shared via a restricted-use agreement
  56. 56. Alternative to shipping out sensitive data on removable media and hoping that nothing goes wrong
  57. 57. Does shift cost burden (virtual workstation, storage) and risk burden (data security) from data analyst to data provider
  58. 58. Who pays?
  59. 59. How?</li></li></ul><li>I have used the ICPSR VDE, and it is fantastic.<br />Oz Noori - Detroit 1-8-7<br /> <br />This is a paid celebratory endorsement<br />
  60. 60. Restricted Use Contracting System (RCS)<br />Purpose<br />Enables data processors (internal) to set up contracts with restricted data with terms of use and contract behavior preferences<br />Enables end-users to apply for restricted data online & track progress<br />Enables ICPSR user support to manage contracts and track end-users<br />
  61. 61. Overview of ICPSR’s RCS<br />
  62. 62. Application Steps<br />
  63. 63. 50 Years of Research Data<br />Data Exploration<br />Data Sharing<br />Data Management<br />
  64. 64. Presenter Contact Information<br />Peter Granda –<br />Linda Detterman –<br />Sanda Ionescu –<br />Elizabeth Moss –<br />Steve Burling –<br />
  65. 65. Enjoy Vancouver & IASSIST 2011!<br />