SlideShare a Scribd company logo
NEIC TRYGGVE – NORDIC SERVICES FOR SENSITIVE
DATA
Antti Pursula, antti.pursula@csc.fi
https://wiki.neic.no/tryggve
USE OF HUMAN DATA
IN BIOMEDICAL RESEARCH HAS GREAT POTENTIAL
PERSONALIZED MEDICINE
CURE OF DISEASES
IMPROVED LIFE QUALITY
Data is collected by:
 Biobanks
 Research institutes
 Large genome studies
 Register organizations,
 Hospitals,
 Personal health apps, etc.
Society benefits when
these data collections
are made available
for research!
PROTECT PRIVACY OF THE INDIVIDUAL
Research use of health data requires:
 Data protection
 Secure data transfer
 Secure analysis environments
 Ethical considerations
 Effective legislation
CHALLENGE IS TO PREVENT NON-AUTHORIZED USE OF DATA
WHILE UTILIZING THE DATA FOR THE BENEFIT OF SOCIETY AND INDIVIDUALS
Health and well-being data on
humans is sensitive, personal
data that needs to be protected,
even after de-identification
TRYGGVE PROJECT
COLLABORATION FOR SENSITIVE BIOMEDICAL DATA
 Project aims to strengthen biomedical
research by facilitating use of sensitive
data in cross-border projects
 Partners and funders are NeIC and ELIXIR
Nodes in Denmark, Finland, Norway and
Sweden
 3-year project with volume of ca. 100 PMs
/year (ends in Oct 2017)
 Project will build on strong existing
capacities and resources in Nordic
countries
MOBILITY
Enhancing cross-border mobility of:
data, users and analysis pipelines
ACCESSIBLE
Services for sensitive data should be
accessible to users across Nordics
regardless of their location
PRAGMATIC APPROACH
Implement solutions that support
various use cases and varying local
terms and conditions
TRYGGVE TARGETS
IN A NUTSHELL
SECURE COMPUTING
AND DATA ENVIRONMENTS
Tryggve service development relies on
secure computing and data environments
at ELIXIR Nodes at the participating
countries
TSD 2.0 service at USIT
Mosler service at NBIS
ePouta secure cloud at CSC
Computerome at DTU
SECURE CLOUD
Infrastructure for data and computing
(ePouta, Computerome)
SECURE REMOTE DESKTOP
backed up with computing resources
(TSD, Mosler, Computerome)
SECURE SYSTEMS
THE USER STAYS IN CONTROL
TAKING INTO USE EXTERNAL SECURE SERVICE DOES NOT IMPLY
TRANSFERRING THE CONTROL OVER THE DATA TO THE PROVIDER!
Where the data is analyzed or stored and who
has the control over the data are different things
Service providers offer secure environment
for storing and analyzing their data
Data handler contracts define the roles
GETTING STARTED
USING THE TRYGGVE SERVICES
 Aimed for Nordic
research teams
 Backed by ELIXIR Nodes
and NeIC
CURRENTLY ACTIVE USE CASES
Use of the systems not limited
To Nordic countries!
CALL FOR NEW USE CASES
CONTACT INFORMATION TO SERVICES ON THE TRYGGVE WEB
SITE
 Trans-Nordic Gene-
Environment Analyses in
Schizophrenia
 Scandinavian Genetics
Collaboration for Olink
Biomarkers
CASE EXAMPLE ON TRYGGVE SUPPORT
FOR A USE CASE
PROCESSING SENSITIVE DATA FOR
SCHIZOPHRENIA RESEARCH
More info and interview of Prof. Sullivan at
http://www.inthefieldstories.net/processing-
sensitive-data-for-schizophrenia-research/
 Research on the gene-environmental
interaction and causes for
schizophrenia, led by professor
Patrick Sullivan, KI.
 Large amount of samples are
available in the Nordic countries.
 Secure place to conduct harmonized
analyses is crucial.
 Professor Sullivan, with the assistance
of Tryggve security experts, is now
combining data sets from Denmark,
Norway, Sweden and Estonia to
create a joint data set with a total of
6000 cases and 8750 controls.
FUTURE VISIONS
FOR A COLLABORATIVE EFFORT
Create Data Platforms that are
internationally interoperable
 Support data submission, archiving
and sharing processes
 Integrate with secure cloud services for
data processing
 Enable sharing of data to third parties
who have the appropriate access
permissions
Creating such data platforms is a collaborative effort between (at least) the
research community, IT infrastructure providers and data collecting
organizations
EGA and LOCAL EGA
• European Genome-Phenome Archive (EGA) is a European secure
data archive for human data
– Hosted by EMBL-EBI in Hinxton, UK (original location), and CGR in
Barcelona
– Collects associated metadata with search functionality
– Data Access Committee (DAC) workflow for requesting access to data.
– REMS software originating from ELIXIR Finland / CSC planned to provide
digital process for managing entitlements
• Local EGA is an effort to build distributed Nodes of EGA in Europe
– Work task in ELIXIR EXCELERATE project
– Nordics support this with resources and coordination from Tryggve
– Submission and distribution of data via the node (Local EGA)
– Metadata search and permissions at central EGA
https://www.ebi.ac.uk/ega
LOCAL EGA PLAN IN THE ELIXIR EXCELERATE
PROJECT
• Target is to provide software infrastructure (Local EGA) that
allows Elixir Nodes, biobanks and institutions to:
– host controlled-access human data in a similar way to how the EGA is
currently doing
– share the publicly visible metadata with EGA in order to facilitate
discovery and findability
• It is assumed that there are restrictions on moving genomic raw
data or other sensitive data across borders/limits established by
national laws or institutions.
• The ELIXIR nodes hosting Local EGAs are planned to take care of
hardware, communications, and other infrastructure, also for
the management of such "facility”
PLANNED USE CASE: DATA ARCHIVE FOR
BIOBANKING
• Setting up a databank solution for Danish National Biobank to
facilitate submission, archival and access to digital data
• What Tryggve2 can do
– Support from the Nordic expertise by the local node (DTU /
Computerome)
– Dedicated person to support the case
– Joint development work on common components, especially Local EGA
– Influence overall development of Nordic secure e-infrastructure
• Additional components for wider adoption ?
– REMS provides complete process for managing entitlements
– CPRAS for data pseudonymization and anonymization
AUTHORIZATION MANAGEMENT WITH REMS
• REMS provides complete process for managing entitlements
• Demo available at https://remsdemo.csc.fi/
Principal
investigator
Applicant
Research group
Members of the
application
Metadata on
dataset 1&2
Dataset 1
Dataset 2
DAC 1
Approver
DAC 2
Approver
REMS
Workflow
Reports
Entitlements
IdP
IdP
IdP
SP
1. Apply
for access
4. Approve
5. Access
3. Circulate
to approver
2. Commit to
licence terms
SUMMARY
TRYGGVE PROVIDES SECURE SERVICES ACROSS BORDERS
A Secure private cloud is an
infrastructure operated solely to provide an
on demand specific use case service
transparent to the end user
 Nordic ELIXIR Nodes collaborate to
create a region where all the secure
services are accessible to users
regardless of their location
 Pragmatic: mobility of data, mobility of
users, mobility of pipelines
 Based on secure data and computing
environments in each participating
country
 Cross-border use cases are in
operation
CONTACT INFO
17
Project Manager:
Antti Pursula
antti.pursula@csc.fi
Website:https://wiki.neic.no
/Tryggve
Local contact points:
Denmark: Ali Syed (DTU)
alisyed@cbs.dtu.dk
Finland: Antti Pursula (CSC)
antti.pursula@csc.fi
Norway: Francesca Iozzi (UiO)
m.f.iozzi@usit.uio.no
Sweden: Niclas Jareborg (NBIS)
niclas.jareborg@bils.se

More Related Content

What's hot

EPSRC Policy Compliance: What researchers need to know
EPSRC Policy Compliance: What researchers need to knowEPSRC Policy Compliance: What researchers need to know
EPSRC Policy Compliance: What researchers need to know
Historic Environment Scotland
 
ELIXIR
ELIXIRELIXIR
Creating a Data Management Plan for your Grant Application
Creating a Data Management Plan for your Grant ApplicationCreating a Data Management Plan for your Grant Application
Creating a Data Management Plan for your Grant Application
Historic Environment Scotland
 
Research Data Services: The EUDAT B2SERVICE SUITE | www.eudat.eu |
Research Data Services: The EUDAT B2SERVICE SUITE | www.eudat.eu | Research Data Services: The EUDAT B2SERVICE SUITE | www.eudat.eu |
Research Data Services: The EUDAT B2SERVICE SUITE | www.eudat.eu |
EUDAT
 
Preparing Research Data for Sharing
Preparing Research Data for SharingPreparing Research Data for Sharing
Preparing Research Data for Sharing
London School of Hygiene and Tropical Medicine
 
Authentication Methods: Shibboleth
Authentication Methods: ShibbolethAuthentication Methods: Shibboleth
Authentication Methods: Shibboleth
EDINA, University of Edinburgh
 
RJ Broker: Automating Delivery of Research Output to Repositories
RJ Broker: Automating Delivery of Research Output to RepositoriesRJ Broker: Automating Delivery of Research Output to Repositories
RJ Broker: Automating Delivery of Research Output to Repositories
EDINA, University of Edinburgh
 
Nif tdr project webinar mehnert
Nif tdr project webinar mehnertNif tdr project webinar mehnert
Nif tdr project webinar mehnert
ARDC
 
Accessing data for research: data publishing pathways and the Five Safes
Accessing data for research: data publishing pathways and the Five SafesAccessing data for research: data publishing pathways and the Five Safes
Accessing data for research: data publishing pathways and the Five Safes
Louise Corti
 
Research Data (and Software) Management at Imperial: (Everything you need to ...
Research Data (and Software) Management at Imperial: (Everything you need to ...Research Data (and Software) Management at Imperial: (Everything you need to ...
Research Data (and Software) Management at Imperial: (Everything you need to ...
Sarah Anna Stewart
 
Secure Lab at the UK Data Service
Secure Lab at the UK Data ServiceSecure Lab at the UK Data Service
Secure Lab at the UK Data Service
Jisc RDM
 
COBWEB, AIP-6, and Access Management Federations
COBWEB, AIP-6, and Access Management FederationsCOBWEB, AIP-6, and Access Management Federations
COBWEB, AIP-6, and Access Management Federations
EDINA, University of Edinburgh
 
Eidc data centre support
Eidc data centre supportEidc data centre support
Eidc data centre support
Chris Collins
 
ESDIN - OGC Web Services Shibboleth Interoperability Experiment (OSI)
ESDIN - OGC Web Services Shibboleth Interoperability Experiment (OSI)ESDIN - OGC Web Services Shibboleth Interoperability Experiment (OSI)
ESDIN - OGC Web Services Shibboleth Interoperability Experiment (OSI)
EDINA, University of Edinburgh
 
SafeNet: Progress and Data Gathering
SafeNet: Progress and Data GatheringSafeNet: Progress and Data Gathering
SafeNet: Progress and Data Gathering
EDINA, University of Edinburgh
 
Preparing research data for sharing
Preparing research data for sharingPreparing research data for sharing
Preparing research data for sharing
London School of Hygiene and Tropical Medicine
 
Managing sensitive data at the University of Bristol
Managing sensitive data at the University of BristolManaging sensitive data at the University of Bristol
Managing sensitive data at the University of Bristol
Jisc RDM
 
ERA CoBioTech Data Management Webinar
ERA CoBioTech Data Management WebinarERA CoBioTech Data Management Webinar
ERA CoBioTech Data Management Webinar
FAIRDOM
 
EUDAT Research Data Management | www.eudat.eu |
EUDAT Research Data Management | www.eudat.eu | EUDAT Research Data Management | www.eudat.eu |
EUDAT Research Data Management | www.eudat.eu |
EUDAT
 
Use of data in safe havens: ethics and reproducibility issues
Use of data in safe havens: ethics and reproducibility issuesUse of data in safe havens: ethics and reproducibility issues
Use of data in safe havens: ethics and reproducibility issues
Louise Corti
 

What's hot (20)

EPSRC Policy Compliance: What researchers need to know
EPSRC Policy Compliance: What researchers need to knowEPSRC Policy Compliance: What researchers need to know
EPSRC Policy Compliance: What researchers need to know
 
ELIXIR
ELIXIRELIXIR
ELIXIR
 
Creating a Data Management Plan for your Grant Application
Creating a Data Management Plan for your Grant ApplicationCreating a Data Management Plan for your Grant Application
Creating a Data Management Plan for your Grant Application
 
Research Data Services: The EUDAT B2SERVICE SUITE | www.eudat.eu |
Research Data Services: The EUDAT B2SERVICE SUITE | www.eudat.eu | Research Data Services: The EUDAT B2SERVICE SUITE | www.eudat.eu |
Research Data Services: The EUDAT B2SERVICE SUITE | www.eudat.eu |
 
Preparing Research Data for Sharing
Preparing Research Data for SharingPreparing Research Data for Sharing
Preparing Research Data for Sharing
 
Authentication Methods: Shibboleth
Authentication Methods: ShibbolethAuthentication Methods: Shibboleth
Authentication Methods: Shibboleth
 
RJ Broker: Automating Delivery of Research Output to Repositories
RJ Broker: Automating Delivery of Research Output to RepositoriesRJ Broker: Automating Delivery of Research Output to Repositories
RJ Broker: Automating Delivery of Research Output to Repositories
 
Nif tdr project webinar mehnert
Nif tdr project webinar mehnertNif tdr project webinar mehnert
Nif tdr project webinar mehnert
 
Accessing data for research: data publishing pathways and the Five Safes
Accessing data for research: data publishing pathways and the Five SafesAccessing data for research: data publishing pathways and the Five Safes
Accessing data for research: data publishing pathways and the Five Safes
 
Research Data (and Software) Management at Imperial: (Everything you need to ...
Research Data (and Software) Management at Imperial: (Everything you need to ...Research Data (and Software) Management at Imperial: (Everything you need to ...
Research Data (and Software) Management at Imperial: (Everything you need to ...
 
Secure Lab at the UK Data Service
Secure Lab at the UK Data ServiceSecure Lab at the UK Data Service
Secure Lab at the UK Data Service
 
COBWEB, AIP-6, and Access Management Federations
COBWEB, AIP-6, and Access Management FederationsCOBWEB, AIP-6, and Access Management Federations
COBWEB, AIP-6, and Access Management Federations
 
Eidc data centre support
Eidc data centre supportEidc data centre support
Eidc data centre support
 
ESDIN - OGC Web Services Shibboleth Interoperability Experiment (OSI)
ESDIN - OGC Web Services Shibboleth Interoperability Experiment (OSI)ESDIN - OGC Web Services Shibboleth Interoperability Experiment (OSI)
ESDIN - OGC Web Services Shibboleth Interoperability Experiment (OSI)
 
SafeNet: Progress and Data Gathering
SafeNet: Progress and Data GatheringSafeNet: Progress and Data Gathering
SafeNet: Progress and Data Gathering
 
Preparing research data for sharing
Preparing research data for sharingPreparing research data for sharing
Preparing research data for sharing
 
Managing sensitive data at the University of Bristol
Managing sensitive data at the University of BristolManaging sensitive data at the University of Bristol
Managing sensitive data at the University of Bristol
 
ERA CoBioTech Data Management Webinar
ERA CoBioTech Data Management WebinarERA CoBioTech Data Management Webinar
ERA CoBioTech Data Management Webinar
 
EUDAT Research Data Management | www.eudat.eu |
EUDAT Research Data Management | www.eudat.eu | EUDAT Research Data Management | www.eudat.eu |
EUDAT Research Data Management | www.eudat.eu |
 
Use of data in safe havens: ethics and reproducibility issues
Use of data in safe havens: ethics and reproducibility issuesUse of data in safe havens: ethics and reproducibility issues
Use of data in safe havens: ethics and reproducibility issues
 

Similar to 170131 tryggve-at ssi-biobanks-ap

161129 tryggve-at niasc-biobanks
161129 tryggve-at niasc-biobanks161129 tryggve-at niasc-biobanks
161129 tryggve-at niasc-biobanks
anttipursula
 
Sinnott Paper
Sinnott PaperSinnott Paper
Sinnott Paper
Johanna Green
 
ELIXIR
ELIXIRELIXIR
Eudat presentation nov2013 | www.eudat.eu |
Eudat presentation nov2013 | www.eudat.eu | Eudat presentation nov2013 | www.eudat.eu |
Eudat presentation nov2013 | www.eudat.eu |
EUDAT
 
Application of Assent in the safe - Networkshop44
Application of Assent in the safe -  Networkshop44Application of Assent in the safe -  Networkshop44
Application of Assent in the safe - Networkshop44
Jisc
 
SomeSlides
SomeSlidesSomeSlides
SomeSlides
guestd60742
 
The BlueBRIDGE approach to collaborative research
The BlueBRIDGE approach to collaborative researchThe BlueBRIDGE approach to collaborative research
The BlueBRIDGE approach to collaborative research
Blue BRIDGE
 
BeSTGRID OpenGridForum 29 GIN session
BeSTGRID OpenGridForum 29 GIN sessionBeSTGRID OpenGridForum 29 GIN session
BeSTGRID OpenGridForum 29 GIN session
Nick Jones
 
BigInsight seminar on Practical Privacy-Preserving Distributed Statistical Co...
BigInsight seminar on Practical Privacy-Preserving Distributed Statistical Co...BigInsight seminar on Practical Privacy-Preserving Distributed Statistical Co...
BigInsight seminar on Practical Privacy-Preserving Distributed Statistical Co...
Statistisk sentralbyrå
 
Archiver at CS3 - Cloud Storage Synchronization and Sharing Services
Archiver at CS3 - Cloud Storage Synchronization and Sharing ServicesArchiver at CS3 - Cloud Storage Synchronization and Sharing Services
Archiver at CS3 - Cloud Storage Synchronization and Sharing Services
Archiver
 
Hybrid Cloud storage deployment models: ARCHIVER presentation at the CS3 Work...
Hybrid Cloud storage deployment models: ARCHIVER presentation at the CS3 Work...Hybrid Cloud storage deployment models: ARCHIVER presentation at the CS3 Work...
Hybrid Cloud storage deployment models: ARCHIVER presentation at the CS3 Work...
Archiver
 
NordForsk Open Access Reykjavik 14-15/8-2014:NeIC
NordForsk Open Access Reykjavik 14-15/8-2014:NeICNordForsk Open Access Reykjavik 14-15/8-2014:NeIC
NordForsk Open Access Reykjavik 14-15/8-2014:NeIC
NordForsk
 
AusCover portal presentation
AusCover portal presentationAusCover portal presentation
AusCover portal presentation
TERN Australia
 
CINECA webinar slides: Data Gravity in the Life Sciences: Lessons learned fro...
CINECA webinar slides: Data Gravity in the Life Sciences: Lessons learned fro...CINECA webinar slides: Data Gravity in the Life Sciences: Lessons learned fro...
CINECA webinar slides: Data Gravity in the Life Sciences: Lessons learned fro...
CINECAProject
 
big_data_casestudies_2.ppt
big_data_casestudies_2.pptbig_data_casestudies_2.ppt
big_data_casestudies_2.ppt
vishal choudhary
 
Gergely Sipos (EGI): Exploiting scientific data in the international context ...
Gergely Sipos (EGI): Exploiting scientific data in the international context ...Gergely Sipos (EGI): Exploiting scientific data in the international context ...
Gergely Sipos (EGI): Exploiting scientific data in the international context ...
Gergely Sipos
 
Using e-Infrastructures for Biodiversity Conservation
Using e-Infrastructures for Biodiversity ConservationUsing e-Infrastructures for Biodiversity Conservation
Using e-Infrastructures for Biodiversity Conservation
Blue BRIDGE
 
ELIXIR and data grand challenges in life sciences
ELIXIR and data grand challenges in life sciencesELIXIR and data grand challenges in life sciences
ELIXIR and data grand challenges in life sciences
Rafael C. Jimenez
 
The Developing Needs for e-infrastructures
The Developing Needs for e-infrastructuresThe Developing Needs for e-infrastructures
The Developing Needs for e-infrastructures
guest0dc425
 
The Largest General Translational Informatics Public Private Partnership to Date
The Largest General Translational Informatics Public Private Partnership to DateThe Largest General Translational Informatics Public Private Partnership to Date
The Largest General Translational Informatics Public Private Partnership to Date
Laura Berry
 

Similar to 170131 tryggve-at ssi-biobanks-ap (20)

161129 tryggve-at niasc-biobanks
161129 tryggve-at niasc-biobanks161129 tryggve-at niasc-biobanks
161129 tryggve-at niasc-biobanks
 
Sinnott Paper
Sinnott PaperSinnott Paper
Sinnott Paper
 
ELIXIR
ELIXIRELIXIR
ELIXIR
 
Eudat presentation nov2013 | www.eudat.eu |
Eudat presentation nov2013 | www.eudat.eu | Eudat presentation nov2013 | www.eudat.eu |
Eudat presentation nov2013 | www.eudat.eu |
 
Application of Assent in the safe - Networkshop44
Application of Assent in the safe -  Networkshop44Application of Assent in the safe -  Networkshop44
Application of Assent in the safe - Networkshop44
 
SomeSlides
SomeSlidesSomeSlides
SomeSlides
 
The BlueBRIDGE approach to collaborative research
The BlueBRIDGE approach to collaborative researchThe BlueBRIDGE approach to collaborative research
The BlueBRIDGE approach to collaborative research
 
BeSTGRID OpenGridForum 29 GIN session
BeSTGRID OpenGridForum 29 GIN sessionBeSTGRID OpenGridForum 29 GIN session
BeSTGRID OpenGridForum 29 GIN session
 
BigInsight seminar on Practical Privacy-Preserving Distributed Statistical Co...
BigInsight seminar on Practical Privacy-Preserving Distributed Statistical Co...BigInsight seminar on Practical Privacy-Preserving Distributed Statistical Co...
BigInsight seminar on Practical Privacy-Preserving Distributed Statistical Co...
 
Archiver at CS3 - Cloud Storage Synchronization and Sharing Services
Archiver at CS3 - Cloud Storage Synchronization and Sharing ServicesArchiver at CS3 - Cloud Storage Synchronization and Sharing Services
Archiver at CS3 - Cloud Storage Synchronization and Sharing Services
 
Hybrid Cloud storage deployment models: ARCHIVER presentation at the CS3 Work...
Hybrid Cloud storage deployment models: ARCHIVER presentation at the CS3 Work...Hybrid Cloud storage deployment models: ARCHIVER presentation at the CS3 Work...
Hybrid Cloud storage deployment models: ARCHIVER presentation at the CS3 Work...
 
NordForsk Open Access Reykjavik 14-15/8-2014:NeIC
NordForsk Open Access Reykjavik 14-15/8-2014:NeICNordForsk Open Access Reykjavik 14-15/8-2014:NeIC
NordForsk Open Access Reykjavik 14-15/8-2014:NeIC
 
AusCover portal presentation
AusCover portal presentationAusCover portal presentation
AusCover portal presentation
 
CINECA webinar slides: Data Gravity in the Life Sciences: Lessons learned fro...
CINECA webinar slides: Data Gravity in the Life Sciences: Lessons learned fro...CINECA webinar slides: Data Gravity in the Life Sciences: Lessons learned fro...
CINECA webinar slides: Data Gravity in the Life Sciences: Lessons learned fro...
 
big_data_casestudies_2.ppt
big_data_casestudies_2.pptbig_data_casestudies_2.ppt
big_data_casestudies_2.ppt
 
Gergely Sipos (EGI): Exploiting scientific data in the international context ...
Gergely Sipos (EGI): Exploiting scientific data in the international context ...Gergely Sipos (EGI): Exploiting scientific data in the international context ...
Gergely Sipos (EGI): Exploiting scientific data in the international context ...
 
Using e-Infrastructures for Biodiversity Conservation
Using e-Infrastructures for Biodiversity ConservationUsing e-Infrastructures for Biodiversity Conservation
Using e-Infrastructures for Biodiversity Conservation
 
ELIXIR and data grand challenges in life sciences
ELIXIR and data grand challenges in life sciencesELIXIR and data grand challenges in life sciences
ELIXIR and data grand challenges in life sciences
 
The Developing Needs for e-infrastructures
The Developing Needs for e-infrastructuresThe Developing Needs for e-infrastructures
The Developing Needs for e-infrastructures
 
The Largest General Translational Informatics Public Private Partnership to Date
The Largest General Translational Informatics Public Private Partnership to DateThe Largest General Translational Informatics Public Private Partnership to Date
The Largest General Translational Informatics Public Private Partnership to Date
 

Recently uploaded

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 

Recently uploaded (20)

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 

170131 tryggve-at ssi-biobanks-ap

  • 1. NEIC TRYGGVE – NORDIC SERVICES FOR SENSITIVE DATA Antti Pursula, antti.pursula@csc.fi https://wiki.neic.no/tryggve
  • 2. USE OF HUMAN DATA IN BIOMEDICAL RESEARCH HAS GREAT POTENTIAL PERSONALIZED MEDICINE CURE OF DISEASES IMPROVED LIFE QUALITY Data is collected by:  Biobanks  Research institutes  Large genome studies  Register organizations,  Hospitals,  Personal health apps, etc. Society benefits when these data collections are made available for research!
  • 3. PROTECT PRIVACY OF THE INDIVIDUAL Research use of health data requires:  Data protection  Secure data transfer  Secure analysis environments  Ethical considerations  Effective legislation CHALLENGE IS TO PREVENT NON-AUTHORIZED USE OF DATA WHILE UTILIZING THE DATA FOR THE BENEFIT OF SOCIETY AND INDIVIDUALS Health and well-being data on humans is sensitive, personal data that needs to be protected, even after de-identification
  • 4. TRYGGVE PROJECT COLLABORATION FOR SENSITIVE BIOMEDICAL DATA  Project aims to strengthen biomedical research by facilitating use of sensitive data in cross-border projects  Partners and funders are NeIC and ELIXIR Nodes in Denmark, Finland, Norway and Sweden  3-year project with volume of ca. 100 PMs /year (ends in Oct 2017)  Project will build on strong existing capacities and resources in Nordic countries
  • 5. MOBILITY Enhancing cross-border mobility of: data, users and analysis pipelines ACCESSIBLE Services for sensitive data should be accessible to users across Nordics regardless of their location PRAGMATIC APPROACH Implement solutions that support various use cases and varying local terms and conditions TRYGGVE TARGETS IN A NUTSHELL
  • 6. SECURE COMPUTING AND DATA ENVIRONMENTS Tryggve service development relies on secure computing and data environments at ELIXIR Nodes at the participating countries TSD 2.0 service at USIT Mosler service at NBIS ePouta secure cloud at CSC Computerome at DTU SECURE CLOUD Infrastructure for data and computing (ePouta, Computerome) SECURE REMOTE DESKTOP backed up with computing resources (TSD, Mosler, Computerome)
  • 7. SECURE SYSTEMS THE USER STAYS IN CONTROL TAKING INTO USE EXTERNAL SECURE SERVICE DOES NOT IMPLY TRANSFERRING THE CONTROL OVER THE DATA TO THE PROVIDER! Where the data is analyzed or stored and who has the control over the data are different things Service providers offer secure environment for storing and analyzing their data Data handler contracts define the roles
  • 8. GETTING STARTED USING THE TRYGGVE SERVICES  Aimed for Nordic research teams  Backed by ELIXIR Nodes and NeIC CURRENTLY ACTIVE USE CASES Use of the systems not limited To Nordic countries! CALL FOR NEW USE CASES CONTACT INFORMATION TO SERVICES ON THE TRYGGVE WEB SITE  Trans-Nordic Gene- Environment Analyses in Schizophrenia  Scandinavian Genetics Collaboration for Olink Biomarkers
  • 9. CASE EXAMPLE ON TRYGGVE SUPPORT FOR A USE CASE PROCESSING SENSITIVE DATA FOR SCHIZOPHRENIA RESEARCH More info and interview of Prof. Sullivan at http://www.inthefieldstories.net/processing- sensitive-data-for-schizophrenia-research/  Research on the gene-environmental interaction and causes for schizophrenia, led by professor Patrick Sullivan, KI.  Large amount of samples are available in the Nordic countries.  Secure place to conduct harmonized analyses is crucial.  Professor Sullivan, with the assistance of Tryggve security experts, is now combining data sets from Denmark, Norway, Sweden and Estonia to create a joint data set with a total of 6000 cases and 8750 controls.
  • 10. FUTURE VISIONS FOR A COLLABORATIVE EFFORT Create Data Platforms that are internationally interoperable  Support data submission, archiving and sharing processes  Integrate with secure cloud services for data processing  Enable sharing of data to third parties who have the appropriate access permissions Creating such data platforms is a collaborative effort between (at least) the research community, IT infrastructure providers and data collecting organizations
  • 11. EGA and LOCAL EGA • European Genome-Phenome Archive (EGA) is a European secure data archive for human data – Hosted by EMBL-EBI in Hinxton, UK (original location), and CGR in Barcelona – Collects associated metadata with search functionality – Data Access Committee (DAC) workflow for requesting access to data. – REMS software originating from ELIXIR Finland / CSC planned to provide digital process for managing entitlements • Local EGA is an effort to build distributed Nodes of EGA in Europe – Work task in ELIXIR EXCELERATE project – Nordics support this with resources and coordination from Tryggve – Submission and distribution of data via the node (Local EGA) – Metadata search and permissions at central EGA
  • 13. LOCAL EGA PLAN IN THE ELIXIR EXCELERATE PROJECT • Target is to provide software infrastructure (Local EGA) that allows Elixir Nodes, biobanks and institutions to: – host controlled-access human data in a similar way to how the EGA is currently doing – share the publicly visible metadata with EGA in order to facilitate discovery and findability • It is assumed that there are restrictions on moving genomic raw data or other sensitive data across borders/limits established by national laws or institutions. • The ELIXIR nodes hosting Local EGAs are planned to take care of hardware, communications, and other infrastructure, also for the management of such "facility”
  • 14. PLANNED USE CASE: DATA ARCHIVE FOR BIOBANKING • Setting up a databank solution for Danish National Biobank to facilitate submission, archival and access to digital data • What Tryggve2 can do – Support from the Nordic expertise by the local node (DTU / Computerome) – Dedicated person to support the case – Joint development work on common components, especially Local EGA – Influence overall development of Nordic secure e-infrastructure • Additional components for wider adoption ? – REMS provides complete process for managing entitlements – CPRAS for data pseudonymization and anonymization
  • 15. AUTHORIZATION MANAGEMENT WITH REMS • REMS provides complete process for managing entitlements • Demo available at https://remsdemo.csc.fi/ Principal investigator Applicant Research group Members of the application Metadata on dataset 1&2 Dataset 1 Dataset 2 DAC 1 Approver DAC 2 Approver REMS Workflow Reports Entitlements IdP IdP IdP SP 1. Apply for access 4. Approve 5. Access 3. Circulate to approver 2. Commit to licence terms
  • 16. SUMMARY TRYGGVE PROVIDES SECURE SERVICES ACROSS BORDERS A Secure private cloud is an infrastructure operated solely to provide an on demand specific use case service transparent to the end user  Nordic ELIXIR Nodes collaborate to create a region where all the secure services are accessible to users regardless of their location  Pragmatic: mobility of data, mobility of users, mobility of pipelines  Based on secure data and computing environments in each participating country  Cross-border use cases are in operation
  • 17. CONTACT INFO 17 Project Manager: Antti Pursula antti.pursula@csc.fi Website:https://wiki.neic.no /Tryggve Local contact points: Denmark: Ali Syed (DTU) alisyed@cbs.dtu.dk Finland: Antti Pursula (CSC) antti.pursula@csc.fi Norway: Francesca Iozzi (UiO) m.f.iozzi@usit.uio.no Sweden: Niclas Jareborg (NBIS) niclas.jareborg@bils.se