SlideShare a Scribd company logo
Service development for
sensitive research data
The Nordic Tryggve project
Antti Pursula, Project Manager
wiki.neic.no/Tryggve
Robust Nordic Infrastructure
2
Tryggve – collaboration for sensitive biomedical data
3
• Project aims to strengthen Nordic biomedical research by
facilitating use of sensitive data in cross-border projects
• Collaborators and funders are NeIC and ELIXIR Nodes in Denmark,
Finland, Norway and Sweden
• Project will build on strong existing capacities and resources in
Nordic countries
Motivation and Goals
• Motivation: Enable and strengthen biomedical research
• Main goals:
• Provide secure analysis environment for sensitive research data
• Enable cross-border sharing of sensitive data among collaborators
• Empower Nordic research projects
• Transfer knowledge between developers and service providers
4
Tryggve works on 6 themes
1. Technical development
2. Interoperability of systems
3. Process development
4. Legal framework
5. Use cases
6. Communication and outreach
5
1. Technical development
6
1. Technical development
• Purpose: Provide secure computing environment for analysis of
sensitive data.
• “Building blocks”
– TSD 2.0 service at USIT, Norway
– Mosler service at BILS, Sweden
– ePouta IaaS at CSC, Finland
– Computerome at DTU, Denmark
• All of the above have been launched for users
• Variety in the systems involved offers flexibility to handle different
user demands
7
2. Interoperability of systems
8
2. Interoperability of systems
• Purpose: Improve joint use of Nordic secure systems.
• Development supporting interoperability:
– Data transfer service
– Portable software installations
– Shared computing resources
– Investigate common authentication and authorization mechanisms
• Existing tools will be utilized to support interoperability, including:
– Tool and Resource Registry at ELIXIR Denmark
– REMS authorization management system at ELIXIR Finland
9
• Secure file transfer based
on secure FTP
• No need to store
temporary copies on
user’s local computer
• Can be used for moving
data between Tryggve
systems, or to interface
with external repositories
10
2. Interoperability:
Data transfer
[www.docker.com]
2. Interoperability: Portable software installations
• Users must be able to bring own software pipelines in the secure
systems, while making sure that exactly same workflow is
executed at different environments
• Service providers have limited resources for installing individual
pipelines
• Proposed solution is to provide portable software installations
• Docker Containers within secure environments are being tested
11
2. Interoperability: Shared computing resources
• Aim: Enable use of secure IaaS resources across Nordics.
• Case: Provide computing resources from ePouta (Finland) for
Mosler service (Sweden)
• Mosler offers PaaS environment for processing sensitive data, and
ePouta offers IaaS resources
– Connect systems with dedicated network
– ePouta provides secure private virtual cluster for Mosler to utilize
• Proof-of-concept for future use cases
12
3. Process development
13
3. Process development
• Purpose: Improve accessibility of services and share best-practices
in service operations
• Tasks supporting development of processes:
– sharing knowledge on technologies and software components
– optimizing account delivery process (2-factor authentication)
– sharing experiences in IT security and security reviews
– improving (or harmonizing) customer contract processes
– possibilities for resource sharing (funding) across countries
14
4. Legal environment
15
4. Legal environment
• Purpose: Assess legal framework relevant for use of sensitive data
in research, and provide guidelines to fulfill legal requirements
for trans-Nordic studies.
• Activities include:
– assessing relevant legislation in Nordic and EU level
– analysing legal requirements and conditions in some of the use cases
16
17
5. Use cases
5. Use cases
• Purpose: Implement and support concrete use cases to facilitate
great research and to connect project to actual user demands.
• Open call for Nordic use cases.
• Two use cases currently active (June 2015):
– Trans-Nordic Gene-Environment Analyses
– Improved Sharing and Analysis Environments for Big Biobank Data
• (simple) process to propose use cases documented at
wiki.neic.no/wiki/Tryggve#Use_cases
18
5. Use Case proposal form available on web site
19
More information at https://wiki.neic.no/Tryggve#Use_cases
6. Communication and Outreach
20
6. Communication and Outreach
• Purpose: Inform Nordic communities about the opportunities
provided by Tryggve developments
• Means:
– Presentations at events
– Monthly newsletter
– Twitter and Slideshare
– Project web page at NeIC wiki
– Communication with the Reference group
– Articles, flyers and web news items
• Information collected in web
https://wiki.neic.no/Tryggve
21
Thank you
22
Antti Pursula
Project Manager
CSC – IT Center for Science Ltd
antti.pursula@csc.fi
Twitter: @AnttiPursula
wiki.neic.no/Tryggve

More Related Content

What's hot

Research Data Services: The EUDAT B2SERVICE SUITE | www.eudat.eu |
Research Data Services: The EUDAT B2SERVICE SUITE | www.eudat.eu | Research Data Services: The EUDAT B2SERVICE SUITE | www.eudat.eu |
Research Data Services: The EUDAT B2SERVICE SUITE | www.eudat.eu |
EUDAT
 
Creating a Data Management Plan for your Grant Application
Creating a Data Management Plan for your Grant ApplicationCreating a Data Management Plan for your Grant Application
Creating a Data Management Plan for your Grant Application
Historic Environment Scotland
 
Secure Lab at the UK Data Service
Secure Lab at the UK Data ServiceSecure Lab at the UK Data Service
Secure Lab at the UK Data Service
Jisc RDM
 
Preparing Research Data for Sharing
Preparing Research Data for SharingPreparing Research Data for Sharing
Preparing Research Data for Sharing
London School of Hygiene and Tropical Medicine
 
ELIXIR
ELIXIRELIXIR
Turning FAIR into Reality - Key Concepts in the EC FAIR Data Expert Group Report
Turning FAIR into Reality - Key Concepts in the EC FAIR Data Expert Group ReportTurning FAIR into Reality - Key Concepts in the EC FAIR Data Expert Group Report
Turning FAIR into Reality - Key Concepts in the EC FAIR Data Expert Group Report
dri_ireland
 
Managing sensitive data at the University of Bristol
Managing sensitive data at the University of BristolManaging sensitive data at the University of Bristol
Managing sensitive data at the University of Bristol
Jisc RDM
 
Authentication Methods: Shibboleth
Authentication Methods: ShibbolethAuthentication Methods: Shibboleth
Authentication Methods: Shibboleth
EDINA, University of Edinburgh
 
COBWEB, AIP-6, and Access Management Federations
COBWEB, AIP-6, and Access Management FederationsCOBWEB, AIP-6, and Access Management Federations
COBWEB, AIP-6, and Access Management Federations
EDINA, University of Edinburgh
 
SafeNet: Progress and Data Gathering
SafeNet: Progress and Data GatheringSafeNet: Progress and Data Gathering
SafeNet: Progress and Data Gathering
EDINA, University of Edinburgh
 
ESDIN - OGC Web Services Shibboleth Interoperability Experiment (OSI)
ESDIN - OGC Web Services Shibboleth Interoperability Experiment (OSI)ESDIN - OGC Web Services Shibboleth Interoperability Experiment (OSI)
ESDIN - OGC Web Services Shibboleth Interoperability Experiment (OSI)
EDINA, University of Edinburgh
 
Use of data in safe havens: ethics and reproducibility issues
Use of data in safe havens: ethics and reproducibility issuesUse of data in safe havens: ethics and reproducibility issues
Use of data in safe havens: ethics and reproducibility issues
Louise Corti
 
ERA CoBioTech Data Management Webinar
ERA CoBioTech Data Management WebinarERA CoBioTech Data Management Webinar
ERA CoBioTech Data Management Webinar
FAIRDOM
 
Security overview at Lancaster University
Security overview at Lancaster UniversitySecurity overview at Lancaster University
Security overview at Lancaster University
Lancaster University Library
 
Managing Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_SharedManaging Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Rob Daley
 
Complying with EPSRC policy: An LSHTM case study
Complying with EPSRC policy: An LSHTM case studyComplying with EPSRC policy: An LSHTM case study
Complying with EPSRC policy: An LSHTM case study
GarethKnight
 
DIRISA for Open Data and Open Science/Anwar Vahed
DIRISA for Open Data and Open Science/Anwar VahedDIRISA for Open Data and Open Science/Anwar Vahed
DIRISA for Open Data and Open Science/Anwar Vahed
African Open Science Platform
 
Preparing research data for sharing
Preparing research data for sharingPreparing research data for sharing
Preparing research data for sharing
London School of Hygiene and Tropical Medicine
 
Research data spring: a consortial approach to RDM within SaS
Research data spring: a consortial approach to RDM within SaSResearch data spring: a consortial approach to RDM within SaS
Research data spring: a consortial approach to RDM within SaS
Jisc RDM
 
Sharing COVID-19 research data: the role for digital preservation
Sharing COVID-19 research data: the role for digital preservationSharing COVID-19 research data: the role for digital preservation
Sharing COVID-19 research data: the role for digital preservation
dri_ireland
 

What's hot (20)

Research Data Services: The EUDAT B2SERVICE SUITE | www.eudat.eu |
Research Data Services: The EUDAT B2SERVICE SUITE | www.eudat.eu | Research Data Services: The EUDAT B2SERVICE SUITE | www.eudat.eu |
Research Data Services: The EUDAT B2SERVICE SUITE | www.eudat.eu |
 
Creating a Data Management Plan for your Grant Application
Creating a Data Management Plan for your Grant ApplicationCreating a Data Management Plan for your Grant Application
Creating a Data Management Plan for your Grant Application
 
Secure Lab at the UK Data Service
Secure Lab at the UK Data ServiceSecure Lab at the UK Data Service
Secure Lab at the UK Data Service
 
Preparing Research Data for Sharing
Preparing Research Data for SharingPreparing Research Data for Sharing
Preparing Research Data for Sharing
 
ELIXIR
ELIXIRELIXIR
ELIXIR
 
Turning FAIR into Reality - Key Concepts in the EC FAIR Data Expert Group Report
Turning FAIR into Reality - Key Concepts in the EC FAIR Data Expert Group ReportTurning FAIR into Reality - Key Concepts in the EC FAIR Data Expert Group Report
Turning FAIR into Reality - Key Concepts in the EC FAIR Data Expert Group Report
 
Managing sensitive data at the University of Bristol
Managing sensitive data at the University of BristolManaging sensitive data at the University of Bristol
Managing sensitive data at the University of Bristol
 
Authentication Methods: Shibboleth
Authentication Methods: ShibbolethAuthentication Methods: Shibboleth
Authentication Methods: Shibboleth
 
COBWEB, AIP-6, and Access Management Federations
COBWEB, AIP-6, and Access Management FederationsCOBWEB, AIP-6, and Access Management Federations
COBWEB, AIP-6, and Access Management Federations
 
SafeNet: Progress and Data Gathering
SafeNet: Progress and Data GatheringSafeNet: Progress and Data Gathering
SafeNet: Progress and Data Gathering
 
ESDIN - OGC Web Services Shibboleth Interoperability Experiment (OSI)
ESDIN - OGC Web Services Shibboleth Interoperability Experiment (OSI)ESDIN - OGC Web Services Shibboleth Interoperability Experiment (OSI)
ESDIN - OGC Web Services Shibboleth Interoperability Experiment (OSI)
 
Use of data in safe havens: ethics and reproducibility issues
Use of data in safe havens: ethics and reproducibility issuesUse of data in safe havens: ethics and reproducibility issues
Use of data in safe havens: ethics and reproducibility issues
 
ERA CoBioTech Data Management Webinar
ERA CoBioTech Data Management WebinarERA CoBioTech Data Management Webinar
ERA CoBioTech Data Management Webinar
 
Security overview at Lancaster University
Security overview at Lancaster UniversitySecurity overview at Lancaster University
Security overview at Lancaster University
 
Managing Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_SharedManaging Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_Shared
 
Complying with EPSRC policy: An LSHTM case study
Complying with EPSRC policy: An LSHTM case studyComplying with EPSRC policy: An LSHTM case study
Complying with EPSRC policy: An LSHTM case study
 
DIRISA for Open Data and Open Science/Anwar Vahed
DIRISA for Open Data and Open Science/Anwar VahedDIRISA for Open Data and Open Science/Anwar Vahed
DIRISA for Open Data and Open Science/Anwar Vahed
 
Preparing research data for sharing
Preparing research data for sharingPreparing research data for sharing
Preparing research data for sharing
 
Research data spring: a consortial approach to RDM within SaS
Research data spring: a consortial approach to RDM within SaSResearch data spring: a consortial approach to RDM within SaS
Research data spring: a consortial approach to RDM within SaS
 
Sharing COVID-19 research data: the role for digital preservation
Sharing COVID-19 research data: the role for digital preservationSharing COVID-19 research data: the role for digital preservation
Sharing COVID-19 research data: the role for digital preservation
 

Similar to 150618 tryggve update

NordForsk Open Access Reykjavik 14-15/8-2014:NeIC
NordForsk Open Access Reykjavik 14-15/8-2014:NeICNordForsk Open Access Reykjavik 14-15/8-2014:NeIC
NordForsk Open Access Reykjavik 14-15/8-2014:NeIC
NordForsk
 
Research Data Services @ Edinburgh: MANTRA & Edinburgh DataShare
Research Data Services @ Edinburgh: MANTRA & Edinburgh DataShareResearch Data Services @ Edinburgh: MANTRA & Edinburgh DataShare
Research Data Services @ Edinburgh: MANTRA & Edinburgh DataShare
Historic Environment Scotland
 
161129 tryggve-at niasc-biobanks
161129 tryggve-at niasc-biobanks161129 tryggve-at niasc-biobanks
161129 tryggve-at niasc-biobanks
anttipursula
 
COMSODE networking session at ICT Lisbon 2015
COMSODE networking session at ICT Lisbon 2015COMSODE networking session at ICT Lisbon 2015
COMSODE networking session at ICT Lisbon 2015
Comsode - FP7 project
 
Big Data Europe: SC6 Workshop 3: The European Research Data Landscape: Opport...
Big Data Europe: SC6 Workshop 3: The European Research Data Landscape: Opport...Big Data Europe: SC6 Workshop 3: The European Research Data Landscape: Opport...
Big Data Europe: SC6 Workshop 3: The European Research Data Landscape: Opport...
BigData_Europe
 
RDM & ELNs @ Edinburgh
RDM & ELNs @ EdinburghRDM & ELNs @ Edinburgh
RDM & ELNs @ Edinburgh
EDINA, University of Edinburgh
 
Sensitive Data Workshop
Sensitive Data WorkshopSensitive Data Workshop
Sensitive Data Workshop
EUDAT
 
Research Data Management: Why is it important?
Research Data Management: Why is it  important?Research Data Management: Why is it  important?
Research Data Management: Why is it important?
EDINA, University of Edinburgh
 
Information Systems
Information SystemsInformation Systems
Information Systems
Pasquale Pagano
 
Application of Assent in the safe - Networkshop44
Application of Assent in the safe -  Networkshop44Application of Assent in the safe -  Networkshop44
Application of Assent in the safe - Networkshop44
Jisc
 
RDM Programme at University of Edinburgh
RDM Programme at University of EdinburghRDM Programme at University of Edinburgh
RDM Programme at University of Edinburgh
Historic Environment Scotland
 
Research Data (and Software) Management at Imperial: (Everything you need to ...
Research Data (and Software) Management at Imperial: (Everything you need to ...Research Data (and Software) Management at Imperial: (Everything you need to ...
Research Data (and Software) Management at Imperial: (Everything you need to ...
Sarah Anna Stewart
 
EOSC-hub service portfolio
EOSC-hub service portfolioEOSC-hub service portfolio
EOSC-hub service portfolio
EOSC-hub project
 
Tutorial on Hybrid Data Infrastructures: D4Science as a case study
Tutorial on Hybrid Data Infrastructures: D4Science as a case studyTutorial on Hybrid Data Infrastructures: D4Science as a case study
Tutorial on Hybrid Data Infrastructures: D4Science as a case study
Blue BRIDGE
 
Wednesday 6 May: Hand me the data! What you should know as a humanities resea...
Wednesday 6 May: Hand me the data! What you should know as a humanities resea...Wednesday 6 May: Hand me the data! What you should know as a humanities resea...
Wednesday 6 May: Hand me the data! What you should know as a humanities resea...
WARCnet
 
Utilising Cloud Computing for Research through Infrastructure, Software and D...
Utilising Cloud Computing for Research through Infrastructure, Software and D...Utilising Cloud Computing for Research through Infrastructure, Software and D...
Utilising Cloud Computing for Research through Infrastructure, Software and D...
David Wallom
 
CLARIAH Toogdag 2018: A distributed network of digital heritage information
CLARIAH Toogdag 2018: A distributed network of digital heritage informationCLARIAH Toogdag 2018: A distributed network of digital heritage information
CLARIAH Toogdag 2018: A distributed network of digital heritage information
Enno Meijers
 
RDM@Edinburgh
RDM@EdinburghRDM@Edinburgh
Hybrid Cloud storage deployment models: ARCHIVER presentation at the CS3 Work...
Hybrid Cloud storage deployment models: ARCHIVER presentation at the CS3 Work...Hybrid Cloud storage deployment models: ARCHIVER presentation at the CS3 Work...
Hybrid Cloud storage deployment models: ARCHIVER presentation at the CS3 Work...
Archiver
 
RDM@Edinburgh
RDM@EdinburghRDM@Edinburgh

Similar to 150618 tryggve update (20)

NordForsk Open Access Reykjavik 14-15/8-2014:NeIC
NordForsk Open Access Reykjavik 14-15/8-2014:NeICNordForsk Open Access Reykjavik 14-15/8-2014:NeIC
NordForsk Open Access Reykjavik 14-15/8-2014:NeIC
 
Research Data Services @ Edinburgh: MANTRA & Edinburgh DataShare
Research Data Services @ Edinburgh: MANTRA & Edinburgh DataShareResearch Data Services @ Edinburgh: MANTRA & Edinburgh DataShare
Research Data Services @ Edinburgh: MANTRA & Edinburgh DataShare
 
161129 tryggve-at niasc-biobanks
161129 tryggve-at niasc-biobanks161129 tryggve-at niasc-biobanks
161129 tryggve-at niasc-biobanks
 
COMSODE networking session at ICT Lisbon 2015
COMSODE networking session at ICT Lisbon 2015COMSODE networking session at ICT Lisbon 2015
COMSODE networking session at ICT Lisbon 2015
 
Big Data Europe: SC6 Workshop 3: The European Research Data Landscape: Opport...
Big Data Europe: SC6 Workshop 3: The European Research Data Landscape: Opport...Big Data Europe: SC6 Workshop 3: The European Research Data Landscape: Opport...
Big Data Europe: SC6 Workshop 3: The European Research Data Landscape: Opport...
 
RDM & ELNs @ Edinburgh
RDM & ELNs @ EdinburghRDM & ELNs @ Edinburgh
RDM & ELNs @ Edinburgh
 
Sensitive Data Workshop
Sensitive Data WorkshopSensitive Data Workshop
Sensitive Data Workshop
 
Research Data Management: Why is it important?
Research Data Management: Why is it  important?Research Data Management: Why is it  important?
Research Data Management: Why is it important?
 
Information Systems
Information SystemsInformation Systems
Information Systems
 
Application of Assent in the safe - Networkshop44
Application of Assent in the safe -  Networkshop44Application of Assent in the safe -  Networkshop44
Application of Assent in the safe - Networkshop44
 
RDM Programme at University of Edinburgh
RDM Programme at University of EdinburghRDM Programme at University of Edinburgh
RDM Programme at University of Edinburgh
 
Research Data (and Software) Management at Imperial: (Everything you need to ...
Research Data (and Software) Management at Imperial: (Everything you need to ...Research Data (and Software) Management at Imperial: (Everything you need to ...
Research Data (and Software) Management at Imperial: (Everything you need to ...
 
EOSC-hub service portfolio
EOSC-hub service portfolioEOSC-hub service portfolio
EOSC-hub service portfolio
 
Tutorial on Hybrid Data Infrastructures: D4Science as a case study
Tutorial on Hybrid Data Infrastructures: D4Science as a case studyTutorial on Hybrid Data Infrastructures: D4Science as a case study
Tutorial on Hybrid Data Infrastructures: D4Science as a case study
 
Wednesday 6 May: Hand me the data! What you should know as a humanities resea...
Wednesday 6 May: Hand me the data! What you should know as a humanities resea...Wednesday 6 May: Hand me the data! What you should know as a humanities resea...
Wednesday 6 May: Hand me the data! What you should know as a humanities resea...
 
Utilising Cloud Computing for Research through Infrastructure, Software and D...
Utilising Cloud Computing for Research through Infrastructure, Software and D...Utilising Cloud Computing for Research through Infrastructure, Software and D...
Utilising Cloud Computing for Research through Infrastructure, Software and D...
 
CLARIAH Toogdag 2018: A distributed network of digital heritage information
CLARIAH Toogdag 2018: A distributed network of digital heritage informationCLARIAH Toogdag 2018: A distributed network of digital heritage information
CLARIAH Toogdag 2018: A distributed network of digital heritage information
 
RDM@Edinburgh
RDM@EdinburghRDM@Edinburgh
RDM@Edinburgh
 
Hybrid Cloud storage deployment models: ARCHIVER presentation at the CS3 Work...
Hybrid Cloud storage deployment models: ARCHIVER presentation at the CS3 Work...Hybrid Cloud storage deployment models: ARCHIVER presentation at the CS3 Work...
Hybrid Cloud storage deployment models: ARCHIVER presentation at the CS3 Work...
 
RDM@Edinburgh
RDM@EdinburghRDM@Edinburgh
RDM@Edinburgh
 

Recently uploaded

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 

Recently uploaded (20)

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 

150618 tryggve update

  • 1. Service development for sensitive research data The Nordic Tryggve project Antti Pursula, Project Manager wiki.neic.no/Tryggve
  • 3. Tryggve – collaboration for sensitive biomedical data 3 • Project aims to strengthen Nordic biomedical research by facilitating use of sensitive data in cross-border projects • Collaborators and funders are NeIC and ELIXIR Nodes in Denmark, Finland, Norway and Sweden • Project will build on strong existing capacities and resources in Nordic countries
  • 4. Motivation and Goals • Motivation: Enable and strengthen biomedical research • Main goals: • Provide secure analysis environment for sensitive research data • Enable cross-border sharing of sensitive data among collaborators • Empower Nordic research projects • Transfer knowledge between developers and service providers 4
  • 5. Tryggve works on 6 themes 1. Technical development 2. Interoperability of systems 3. Process development 4. Legal framework 5. Use cases 6. Communication and outreach 5
  • 7. 1. Technical development • Purpose: Provide secure computing environment for analysis of sensitive data. • “Building blocks” – TSD 2.0 service at USIT, Norway – Mosler service at BILS, Sweden – ePouta IaaS at CSC, Finland – Computerome at DTU, Denmark • All of the above have been launched for users • Variety in the systems involved offers flexibility to handle different user demands 7
  • 9. 2. Interoperability of systems • Purpose: Improve joint use of Nordic secure systems. • Development supporting interoperability: – Data transfer service – Portable software installations – Shared computing resources – Investigate common authentication and authorization mechanisms • Existing tools will be utilized to support interoperability, including: – Tool and Resource Registry at ELIXIR Denmark – REMS authorization management system at ELIXIR Finland 9
  • 10. • Secure file transfer based on secure FTP • No need to store temporary copies on user’s local computer • Can be used for moving data between Tryggve systems, or to interface with external repositories 10 2. Interoperability: Data transfer
  • 11. [www.docker.com] 2. Interoperability: Portable software installations • Users must be able to bring own software pipelines in the secure systems, while making sure that exactly same workflow is executed at different environments • Service providers have limited resources for installing individual pipelines • Proposed solution is to provide portable software installations • Docker Containers within secure environments are being tested 11
  • 12. 2. Interoperability: Shared computing resources • Aim: Enable use of secure IaaS resources across Nordics. • Case: Provide computing resources from ePouta (Finland) for Mosler service (Sweden) • Mosler offers PaaS environment for processing sensitive data, and ePouta offers IaaS resources – Connect systems with dedicated network – ePouta provides secure private virtual cluster for Mosler to utilize • Proof-of-concept for future use cases 12
  • 14. 3. Process development • Purpose: Improve accessibility of services and share best-practices in service operations • Tasks supporting development of processes: – sharing knowledge on technologies and software components – optimizing account delivery process (2-factor authentication) – sharing experiences in IT security and security reviews – improving (or harmonizing) customer contract processes – possibilities for resource sharing (funding) across countries 14
  • 16. 4. Legal environment • Purpose: Assess legal framework relevant for use of sensitive data in research, and provide guidelines to fulfill legal requirements for trans-Nordic studies. • Activities include: – assessing relevant legislation in Nordic and EU level – analysing legal requirements and conditions in some of the use cases 16
  • 18. 5. Use cases • Purpose: Implement and support concrete use cases to facilitate great research and to connect project to actual user demands. • Open call for Nordic use cases. • Two use cases currently active (June 2015): – Trans-Nordic Gene-Environment Analyses – Improved Sharing and Analysis Environments for Big Biobank Data • (simple) process to propose use cases documented at wiki.neic.no/wiki/Tryggve#Use_cases 18
  • 19. 5. Use Case proposal form available on web site 19 More information at https://wiki.neic.no/Tryggve#Use_cases
  • 20. 6. Communication and Outreach 20
  • 21. 6. Communication and Outreach • Purpose: Inform Nordic communities about the opportunities provided by Tryggve developments • Means: – Presentations at events – Monthly newsletter – Twitter and Slideshare – Project web page at NeIC wiki – Communication with the Reference group – Articles, flyers and web news items • Information collected in web https://wiki.neic.no/Tryggve 21
  • 22. Thank you 22 Antti Pursula Project Manager CSC – IT Center for Science Ltd antti.pursula@csc.fi Twitter: @AnttiPursula wiki.neic.no/Tryggve

Editor's Notes

  1. Ice-breaker Urho, designed in collaboration by Finns and Swedes. Still running after 40 years in service.
  2. TSD design -> Mosler ; Thinlinc user interface ; OpenStack
  3. TSD design -> Mosler ; Thinlinc user interface ; OpenStack
  4. currently 76 subscribers to newsletter
  5. currently 76 subscribers to newsletter