Protecting sensitive research data and meeting researchers needs: Duke University's Protected Network
نویسندگان
چکیده
Research use of sensitive information – personally identifiable information (PII), protected health information (PHI), commercial or proprietary data, and the like – is increasing as researchers’ skill with “big data” matures. Duke University’s Protected Network is an environment with technical controls in place that provide research groups with essential pieces of security measures needed for studies using sensitive information. The environment uses virtualization and authorization groups extensively to isolate data, provide elasticity of resources, and flexibly meet a range of computational requirements within tightly controlled network boundaries. Since its beginning in 2011, the environment has supported about 200 research projects and groups and has served as a foundation for specialized and protected IT infrastructures in the social sciences, population studies, and medical research. This article lays out key features of the development of the Protected Network and outlines the IT infrastructure design and organizational features that Duke has used in establishing this resource for researchers. It consists of four sections: 1. Context, 2. Infrastructure, 3. Authentication and identity management, and 4. The infrastructure as a “platform.” * Mark R. DeLong is Director of Research Computing, Office of Information Technology, Duke University, 334 Blackwell Street, Durham, NC 27701 (email: [email protected]); Andy Ingham is Senior IT Analyst, Office of Information Technology, Duke University, 334 Blackwell Street, Durham, NC, 27701 (email: [email protected]); Robert Carter is IT Consultant, Identity Management, Office of Information Technology, Duke University, 334 Blackweel Street, Durham, NC 27701 (email: [email protected]); Rachel Franke is Associate Director, Research Data Security, Social Science Research Institute, Duke University, Campus Box 90989, Durham NC 27708 (email [email protected]); Michael Wehrle is Analyst Programmer II, Social Science Research Institute, Duke University, Campus Box 90989, Durham NC 27708 (email: [email protected]); Richard Biever is Chief Information Security Officer, Duke University, 334 Blackwell Street, Durham, NC 27701 ([email protected]); Charley Kneifel is Senior Technical Director, Office of Information Technology, Duke University, 334 Blackwell Street, Durham, NC 27701 (email: [email protected]). Research and products reported in this article were supported by NSF grants ACI1246042, CNS-1243315, ACI-1440588, and ACI-1443014.
منابع مشابه
Enhancing research in a family medicine program: one institution's story.
BACKGROUND AND OBJECTIVES To enhance research productivity among East Tennessee State University's faculty, the Department of Family Medicine developed and implemented a multi-component initiative to expand multidisciplinary primary care research. METHODS The research support infrastructure expanded to include a family physician research director, three PhD faculty researchers, two research a...
متن کاملInvestigation through and Clustering the Information Needs and Information Seeking Behavior of Seminary and University Students of Khorasan-e- Razavi with Neural Network Analysis
Background and Aim: This study aims to investigate and clustering the information needs and information seeking behavior of seminary and university students using neural network analysis in Khorasan-e- Razavi. Methods: The quantitative study is an applied and descriptive survey conducted with neural networks analysis. Data were collected by a questionnaire based on the information needs and inf...
متن کاملMeeting the Needs of Gifted and Talented Students: Case Study of a Virtual Learning Lab in a Rural Middle School
Abstract Researchers used case study methods to investigate a virtual learning lab (VLL) in a rural school district that was created in 2011 as a way to better meet the unique needs of exceptional students who are considered gifted. Data were collected through focus groups, classroom observations, interviews, and reviewing relevant documents. Topics include an in-depth explication of the learni...
متن کاملNORC Data Enclave
Launched in 2006, the NORC Data Enclave provides a confidential, protected environment within which authorized researchers can access sensitive microdata remotely. While public-use data can be disseminated in a variety of ways, fewer options exist for sharing sensitive microdata that have not been fully de-identified for public use. Some data producers have sufficient economies of scale to deve...
متن کاملConcealing Secrets in Embedded Processors Designs
Side-channel analysis (SCA) attacks pose a serious threat to embedded systems. So far, the research on masking as a countermeasure against SCA focuses merely on cryptographic algorithms, and has either been implemented for particular hardware or software implementations. However, the drawbacks of protecting specific implementations are the lack of flexibility in terms of used algorithms, the im...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1710.03317 شماره
صفحات -
تاریخ انتشار 2017