SlideShare a Scribd company logo
1 of 25
Nordic IT Services for
Sensitive Research Data
The Nordic Tryggve project
wiki.neic.no/Tryggve
Trusted Nordic Infrastructure
2
Tryggve – collaboration for sensitive biomedical data
3
• Project aims to strengthen Nordic biomedical research by
facilitating use of sensitive data in cross-border projects
• Partners and funders are NeIC and ELIXIR Nodes in Denmark,
Finland, Norway and Sweden
• Project will build on strong existing capacities and resources in
Nordic countries
Mission and goals
Tryggve develops services for biomedical researchers on Nordic scale
to allow secure, efficient and easy utilization of sensitive data for
research
What this means in practice:
• Provide secure and efficient analysis environments for sensitive
research data
• Support the process for accessing and moving the data
• Provide access to Nordic secure systems
• Empower Nordic research through use cases
• Transfer knowledge within Nordic developers and service providers
4
Nordic perspective
• Tryggve is a project in NeIC project portfolio
– NeIC = Nordic e-Infrastructure Collaboration
– Organization that facilitates the development and operation of high-
quality e-infrastructure solutions in areas of joint Nordic interest
– Organizational unit under NordForsk
• Collaboration between NeIC Tryggve and NordForsk funded projects
brings added opportunities to support joint Nordic interests. For
example
– NordForsk funded projects defining use cases for the Tryggve project.
– Tryggve providing access, advice and support on using secure systems
for processing data across borders
5
Tryggve works on 6 themes
1. Technical development
2. Interoperability of systems
3. Process development
4. Legal framework
5. Use cases
6. Communication and outreach
6
1. Technical development
7
1. Technical development
Provide secure computing environment for analysis of sensitive data.
• “Building blocks”
– TSD 2.0 service at USIT, Norway
– Mosler service at BILS, Sweden
– ePouta IaaS at CSC, Finland
– Computerome at DTU, Denmark
• All of the above have been launched for users
• Variety in the systems involved offers flexibility to handle different
user demands
• Legal issues for accessing and/or moving data across countries
under investigation
8
1. Secure systems – Control and ownership of data
• Where the data is analyzed or stored; and who has the control over
the data are different things.
• The user stays in control. Service providers offer secure
environment for storing and analyzing the data.
• Data handler contract defines the roles.
Taking into use some of the secure systems does not imply
transferring the control over, or ownership of the data
9
1. Secure systems – How to access
• The secure systems are available now.
• Access through Tryggve use cases, or directly from the providers
• Tryggve use case:
– gives access free-of-charge for limited time (to pilot use the system)
AND include support / development activities
– users are from several Nordic countries (“Nordic solution”)
– need access to a system in another country
• More information at Tryggve home page wiki.neic.no/tryggve
10
2. Interoperability of systems
11
2. Interoperability of systems
Improve joint use of Nordic secure systems.
• Development supporting interoperability:
– Data transfer service
– Portable software installations (Dockers and Virtual Machines)
– Accessing computing backend across countries
– Investigate common authentication and authorization mechanisms
• Existing tools will be utilized to support interoperability, including:
– Tool and Resource Registry at ELIXIR Denmark
– REMS authorization management system at ELIXIR Finland
12
2. Interoperability: Portable software installations
• Users must be able to bring own software in the secure systems
• Important to be sure that exactly same workflow is executed at
different environments
• Service providers have limited resources for installing software
• Solution: Portable easy to deploy software installations
• Docker Containers within secure environments are being tested
13
• Secure file transfer based
on secure FTP
• No need to store
temporary copies on
user’s local computer
• Can be used for moving
data between Tryggve
systems, or to interface
with external repositories
14
2. Interoperability:
Data transfer
2. Interoperability: Shared computing resources
• Aim: Enable use of secure IaaS resources across Nordics.
• Case: Provide computing resources from ePouta (Finland) for
Mosler service (Sweden)
• Mosler offers remote desktop for processing sensitive data, and
ePouta offers cloud infrastructure
– Connect systems with dedicated network
– ePouta provides secure private virtual cluster for Mosler to
utilize
• Proof-of-concept for future cases
15
3. Process development
16
3. Process development
Improve accessibility of services and share best-practices in service
operations
• Tasks supporting development of processes:
– improving (or harmonizing) customer contract processes
– joint code of conduct for managing sensitive data
– sharing knowledge on technologies and software components
– sharing experiences in IT security and security reviews
– interacting with register data holders, biobanks, etc.
17
4. Legal environment
18
4. Legal environment
Assess legal framework relevant for use of sensitive data in research,
and provide guidelines to fulfill legal requirements for trans-Nordic
studies.
• Activities include:
– assessing relevant legislation in Nordic and EU level
– analyzing legal requirements and conditions in some of the use cases
– preparing guidelines for researchers on the regulations
– looking into specific questions, such as moving data across countries
19
20
5. Use cases
5. Use cases
Implement and support concrete use cases to facilitate great
research and to connect project to actual user demands.
• Tryggve use case is part of a real research project aimed to
support the researchers in handling and analysis of sensitive data.
– at the same time, development of services in Tryggve is influenced by
the experiences gained from the pilot users / use cases.
• Use cases can be proposed at any time.
• (simple) process for proposing use cases documented at
wiki.neic.no/Tryggve#Use_cases
21
What does Tryggve offer for pilot users?
• The proposers of accepted use cases will receive:
– Access to secure data processing systems (for a limited time, and up
to a reasonable amount of disk space and computing resources)
– Expert assistance from Tryggve
– Possibility for targeted service development to enable the use case
• All this will be provided free of charge for the use cases
– No funding for proposers of accepted use cases is included
• What we expect from researchers involved in a use case
– Participation in discussions to specify the users’ needs
– Feedback for services
22
5. Use Case proposal form available on web site
23
More information at https://wiki.neic.no/Tryggve#Use_cases
Tryggve and Nordic Biobanks
• Tryggve as a Nordic project can have a role in bridging the gap
between researchers and IT services.
• Including further development of the underlying systems.
• Services for Nordic Biobank community could include
– efficient and secure processing environment for sensitive data
– extending Biobanks own resources
– project-based storing and sharing of data
– packaging software stack for easier installation
– etc.
Use cases defined by Biobanks would be a way forward.
24
Thank you
25
Antti Pursula
Tryggve Project Manager
NeIC / CSC – IT Center for Science
antti.pursula@csc.fi
Twitter: @AnttiPursula
Web site: wiki.neic.no/Tryggve
Subscribe to Tryggve monthly
newsletter on the web site

More Related Content

What's hot

Secure data management, analysis, infrastructure and policy in an internation...
Secure data management, analysis, infrastructure and policy in an internation...Secure data management, analysis, infrastructure and policy in an internation...
Secure data management, analysis, infrastructure and policy in an internation...Carolyn Ten Holter
 
Ticer summer school_24_aug06
Ticer summer school_24_aug06Ticer summer school_24_aug06
Ticer summer school_24_aug06SayDotCom.com
 
Turning FAIR into Reality - Key Concepts in the EC FAIR Data Expert Group Report
Turning FAIR into Reality - Key Concepts in the EC FAIR Data Expert Group ReportTurning FAIR into Reality - Key Concepts in the EC FAIR Data Expert Group Report
Turning FAIR into Reality - Key Concepts in the EC FAIR Data Expert Group Reportdri_ireland
 
SGCI HICSS50 Presentation
SGCI HICSS50 PresentationSGCI HICSS50 Presentation
SGCI HICSS50 Presentationmaytaldahan
 
A collaborative approach to "filling the digital preservation gap" for Resear...
A collaborative approach to "filling the digital preservation gap" for Resear...A collaborative approach to "filling the digital preservation gap" for Resear...
A collaborative approach to "filling the digital preservation gap" for Resear...Jenny Mitcham
 
What will global innovators do with the next Innovation Platform?
What will global innovators do with the next Innovation Platform?What will global innovators do with the next Innovation Platform?
What will global innovators do with the next Innovation Platform?Open Networking Summits
 
Providing support and services for researchers in good data governance
Providing support and services for researchers in good data governanceProviding support and services for researchers in good data governance
Providing support and services for researchers in good data governanceRobin Rice
 
Creating a Data Management Plan for your Grant Application
Creating a Data Management Plan for your Grant ApplicationCreating a Data Management Plan for your Grant Application
Creating a Data Management Plan for your Grant ApplicationHistoric Environment Scotland
 
Securing, storing and enabling safe access to data
Securing, storing and enabling safe access to dataSecuring, storing and enabling safe access to data
Securing, storing and enabling safe access to dataRobin Rice
 
Csiro 20180313 tdr_ands_webinar-data access portal
Csiro 20180313 tdr_ands_webinar-data access portalCsiro 20180313 tdr_ands_webinar-data access portal
Csiro 20180313 tdr_ands_webinar-data access portalARDC
 
ADA - CoretrustSeal webinar presentation
ADA - CoretrustSeal webinar presentation ADA - CoretrustSeal webinar presentation
ADA - CoretrustSeal webinar presentation ARDC
 
Core Trust Seal for Trustworthy Data Repositories, 2018-04-19
Core Trust Seal for Trustworthy Data Repositories, 2018-04-19Core Trust Seal for Trustworthy Data Repositories, 2018-04-19
Core Trust Seal for Trustworthy Data Repositories, 2018-04-19Ciarán Quinn
 
Frances Burton on sensitive data
Frances Burton on sensitive dataFrances Burton on sensitive data
Frances Burton on sensitive dataJisc RDM
 
A brief intro to cloud9
A brief intro to cloud9A brief intro to cloud9
A brief intro to cloud9Alf Tornatore
 
Research Data (and Software) Management at Imperial: (Everything you need to ...
Research Data (and Software) Management at Imperial: (Everything you need to ...Research Data (and Software) Management at Imperial: (Everything you need to ...
Research Data (and Software) Management at Imperial: (Everything you need to ...Sarah Anna Stewart
 

What's hot (20)

Secure data management, analysis, infrastructure and policy in an internation...
Secure data management, analysis, infrastructure and policy in an internation...Secure data management, analysis, infrastructure and policy in an internation...
Secure data management, analysis, infrastructure and policy in an internation...
 
Ticer summer school_24_aug06
Ticer summer school_24_aug06Ticer summer school_24_aug06
Ticer summer school_24_aug06
 
Turning FAIR into Reality - Key Concepts in the EC FAIR Data Expert Group Report
Turning FAIR into Reality - Key Concepts in the EC FAIR Data Expert Group ReportTurning FAIR into Reality - Key Concepts in the EC FAIR Data Expert Group Report
Turning FAIR into Reality - Key Concepts in the EC FAIR Data Expert Group Report
 
SGCI HICSS50 Presentation
SGCI HICSS50 PresentationSGCI HICSS50 Presentation
SGCI HICSS50 Presentation
 
A collaborative approach to "filling the digital preservation gap" for Resear...
A collaborative approach to "filling the digital preservation gap" for Resear...A collaborative approach to "filling the digital preservation gap" for Resear...
A collaborative approach to "filling the digital preservation gap" for Resear...
 
What will global innovators do with the next Innovation Platform?
What will global innovators do with the next Innovation Platform?What will global innovators do with the next Innovation Platform?
What will global innovators do with the next Innovation Platform?
 
Providing support and services for researchers in good data governance
Providing support and services for researchers in good data governanceProviding support and services for researchers in good data governance
Providing support and services for researchers in good data governance
 
Creating a Data Management Plan for your Grant Application
Creating a Data Management Plan for your Grant ApplicationCreating a Data Management Plan for your Grant Application
Creating a Data Management Plan for your Grant Application
 
Securing, storing and enabling safe access to data
Securing, storing and enabling safe access to dataSecuring, storing and enabling safe access to data
Securing, storing and enabling safe access to data
 
Madsen Digital Preservation Policy & Strategy
Madsen Digital Preservation Policy & StrategyMadsen Digital Preservation Policy & Strategy
Madsen Digital Preservation Policy & Strategy
 
Csiro 20180313 tdr_ands_webinar-data access portal
Csiro 20180313 tdr_ands_webinar-data access portalCsiro 20180313 tdr_ands_webinar-data access portal
Csiro 20180313 tdr_ands_webinar-data access portal
 
ADA - CoretrustSeal webinar presentation
ADA - CoretrustSeal webinar presentation ADA - CoretrustSeal webinar presentation
ADA - CoretrustSeal webinar presentation
 
White Manipulating Metadata to Enhance Access
White Manipulating Metadata to Enhance AccessWhite Manipulating Metadata to Enhance Access
White Manipulating Metadata to Enhance Access
 
Core Trust Seal for Trustworthy Data Repositories, 2018-04-19
Core Trust Seal for Trustworthy Data Repositories, 2018-04-19Core Trust Seal for Trustworthy Data Repositories, 2018-04-19
Core Trust Seal for Trustworthy Data Repositories, 2018-04-19
 
eHealth projects in Sierre – Khresmoi
eHealth projects in Sierre – KhresmoieHealth projects in Sierre – Khresmoi
eHealth projects in Sierre – Khresmoi
 
Frances Burton on sensitive data
Frances Burton on sensitive dataFrances Burton on sensitive data
Frances Burton on sensitive data
 
A brief intro to cloud9
A brief intro to cloud9A brief intro to cloud9
A brief intro to cloud9
 
Trm Trusted Repositories
Trm Trusted RepositoriesTrm Trusted Repositories
Trm Trusted Repositories
 
Research Data (and Software) Management at Imperial: (Everything you need to ...
Research Data (and Software) Management at Imperial: (Everything you need to ...Research Data (and Software) Management at Imperial: (Everything you need to ...
Research Data (and Software) Management at Imperial: (Everything you need to ...
 
Security overview at Lancaster University
Security overview at Lancaster UniversitySecurity overview at Lancaster University
Security overview at Lancaster University
 

Similar to 151111 tryggve-nordic biobank

161129 tryggve-at niasc-biobanks
161129 tryggve-at niasc-biobanks161129 tryggve-at niasc-biobanks
161129 tryggve-at niasc-biobanksanttipursula
 
The National Archives cloud storage and digital preservation
The National Archives cloud storage and digital preservationThe National Archives cloud storage and digital preservation
The National Archives cloud storage and digital preservationThe-National-Archives
 
Research Data Services: The EUDAT B2SERVICE SUITE | www.eudat.eu |
Research Data Services: The EUDAT B2SERVICE SUITE | www.eudat.eu | Research Data Services: The EUDAT B2SERVICE SUITE | www.eudat.eu |
Research Data Services: The EUDAT B2SERVICE SUITE | www.eudat.eu | EUDAT
 
SDN evolution: the view from academia. Dr Brendan Jennings, TSSG
SDN evolution: the view from academia. Dr Brendan Jennings, TSSGSDN evolution: the view from academia. Dr Brendan Jennings, TSSG
SDN evolution: the view from academia. Dr Brendan Jennings, TSSGWalton Institute
 
Research Data Services @ Edinburgh: MANTRA & Edinburgh DataShare
Research Data Services @ Edinburgh: MANTRA & Edinburgh DataShareResearch Data Services @ Edinburgh: MANTRA & Edinburgh DataShare
Research Data Services @ Edinburgh: MANTRA & Edinburgh DataShareHistoric Environment Scotland
 
Australian Ecosystems Science Cloud
Australian Ecosystems Science CloudAustralian Ecosystems Science Cloud
Australian Ecosystems Science CloudTERN Australia
 
Birgit Plietzsch “RDM within research computing support” SALCTG June 2013
Birgit Plietzsch “RDM within research computing support” SALCTG June 2013Birgit Plietzsch “RDM within research computing support” SALCTG June 2013
Birgit Plietzsch “RDM within research computing support” SALCTG June 2013SALCTG
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
Smartie - Project overview
Smartie - Project overview Smartie - Project overview
Smartie - Project overview DunavNET
 
Synergy 2014 - Syn122 Moving Australian National Research into the Cloud
Synergy 2014 - Syn122 Moving Australian National Research into the CloudSynergy 2014 - Syn122 Moving Australian National Research into the Cloud
Synergy 2014 - Syn122 Moving Australian National Research into the CloudCitrix
 
e-infrastructural needs to support informatics
e-infrastructural needs to support informaticse-infrastructural needs to support informatics
e-infrastructural needs to support informaticsDavid Wallom
 
Utilising Cloud Computing for Research through Infrastructure, Software and D...
Utilising Cloud Computing for Research through Infrastructure, Software and D...Utilising Cloud Computing for Research through Infrastructure, Software and D...
Utilising Cloud Computing for Research through Infrastructure, Software and D...David Wallom
 
EOSC-hub service portfolio
EOSC-hub service portfolioEOSC-hub service portfolio
EOSC-hub service portfolioEOSC-hub project
 
Aditess ltd a Cyprus start up
Aditess ltd a Cyprus start up Aditess ltd a Cyprus start up
Aditess ltd a Cyprus start up NIKOLAOS KOUTRAS
 
ERA CoBioTech Data Management Webinar
ERA CoBioTech Data Management WebinarERA CoBioTech Data Management Webinar
ERA CoBioTech Data Management WebinarFAIRDOM
 
Wednesday 6 May: Hand me the data! What you should know as a humanities resea...
Wednesday 6 May: Hand me the data! What you should know as a humanities resea...Wednesday 6 May: Hand me the data! What you should know as a humanities resea...
Wednesday 6 May: Hand me the data! What you should know as a humanities resea...WARCnet
 
Cloud computing: Legal and ethical issues in library and information services
Cloud computing: Legal and ethical issues in library and information servicesCloud computing: Legal and ethical issues in library and information services
Cloud computing: Legal and ethical issues in library and information servicese-Marefa
 

Similar to 151111 tryggve-nordic biobank (20)

161129 tryggve-at niasc-biobanks
161129 tryggve-at niasc-biobanks161129 tryggve-at niasc-biobanks
161129 tryggve-at niasc-biobanks
 
The National Archives cloud storage and digital preservation
The National Archives cloud storage and digital preservationThe National Archives cloud storage and digital preservation
The National Archives cloud storage and digital preservation
 
Research Data Services: The EUDAT B2SERVICE SUITE | www.eudat.eu |
Research Data Services: The EUDAT B2SERVICE SUITE | www.eudat.eu | Research Data Services: The EUDAT B2SERVICE SUITE | www.eudat.eu |
Research Data Services: The EUDAT B2SERVICE SUITE | www.eudat.eu |
 
SDN evolution: the view from academia. Dr Brendan Jennings, TSSG
SDN evolution: the view from academia. Dr Brendan Jennings, TSSGSDN evolution: the view from academia. Dr Brendan Jennings, TSSG
SDN evolution: the view from academia. Dr Brendan Jennings, TSSG
 
Information Systems
Information SystemsInformation Systems
Information Systems
 
Research Data Services @ Edinburgh: MANTRA & Edinburgh DataShare
Research Data Services @ Edinburgh: MANTRA & Edinburgh DataShareResearch Data Services @ Edinburgh: MANTRA & Edinburgh DataShare
Research Data Services @ Edinburgh: MANTRA & Edinburgh DataShare
 
Australian Ecosystems Science Cloud
Australian Ecosystems Science CloudAustralian Ecosystems Science Cloud
Australian Ecosystems Science Cloud
 
Birgit Plietzsch “RDM within research computing support” SALCTG June 2013
Birgit Plietzsch “RDM within research computing support” SALCTG June 2013Birgit Plietzsch “RDM within research computing support” SALCTG June 2013
Birgit Plietzsch “RDM within research computing support” SALCTG June 2013
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Smartie - Project overview
Smartie - Project overview Smartie - Project overview
Smartie - Project overview
 
Synergy 2014 - Syn122 Moving Australian National Research into the Cloud
Synergy 2014 - Syn122 Moving Australian National Research into the CloudSynergy 2014 - Syn122 Moving Australian National Research into the Cloud
Synergy 2014 - Syn122 Moving Australian National Research into the Cloud
 
e-infrastructural needs to support informatics
e-infrastructural needs to support informaticse-infrastructural needs to support informatics
e-infrastructural needs to support informatics
 
Cloud slide
Cloud slideCloud slide
Cloud slide
 
Utilising Cloud Computing for Research through Infrastructure, Software and D...
Utilising Cloud Computing for Research through Infrastructure, Software and D...Utilising Cloud Computing for Research through Infrastructure, Software and D...
Utilising Cloud Computing for Research through Infrastructure, Software and D...
 
EOSC-hub service portfolio
EOSC-hub service portfolioEOSC-hub service portfolio
EOSC-hub service portfolio
 
Aditess ltd a Cyprus start up
Aditess ltd a Cyprus start up Aditess ltd a Cyprus start up
Aditess ltd a Cyprus start up
 
ERA CoBioTech Data Management Webinar
ERA CoBioTech Data Management WebinarERA CoBioTech Data Management Webinar
ERA CoBioTech Data Management Webinar
 
Wednesday 6 May: Hand me the data! What you should know as a humanities resea...
Wednesday 6 May: Hand me the data! What you should know as a humanities resea...Wednesday 6 May: Hand me the data! What you should know as a humanities resea...
Wednesday 6 May: Hand me the data! What you should know as a humanities resea...
 
Cloud computing: Legal and ethical issues in library and information services
Cloud computing: Legal and ethical issues in library and information servicesCloud computing: Legal and ethical issues in library and information services
Cloud computing: Legal and ethical issues in library and information services
 
EGI Services
EGI Services EGI Services
EGI Services
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central BankingThe Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central BankingSelcen Ozturkcan
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central BankingThe Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central Banking
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 

151111 tryggve-nordic biobank

  • 1. Nordic IT Services for Sensitive Research Data The Nordic Tryggve project wiki.neic.no/Tryggve
  • 3. Tryggve – collaboration for sensitive biomedical data 3 • Project aims to strengthen Nordic biomedical research by facilitating use of sensitive data in cross-border projects • Partners and funders are NeIC and ELIXIR Nodes in Denmark, Finland, Norway and Sweden • Project will build on strong existing capacities and resources in Nordic countries
  • 4. Mission and goals Tryggve develops services for biomedical researchers on Nordic scale to allow secure, efficient and easy utilization of sensitive data for research What this means in practice: • Provide secure and efficient analysis environments for sensitive research data • Support the process for accessing and moving the data • Provide access to Nordic secure systems • Empower Nordic research through use cases • Transfer knowledge within Nordic developers and service providers 4
  • 5. Nordic perspective • Tryggve is a project in NeIC project portfolio – NeIC = Nordic e-Infrastructure Collaboration – Organization that facilitates the development and operation of high- quality e-infrastructure solutions in areas of joint Nordic interest – Organizational unit under NordForsk • Collaboration between NeIC Tryggve and NordForsk funded projects brings added opportunities to support joint Nordic interests. For example – NordForsk funded projects defining use cases for the Tryggve project. – Tryggve providing access, advice and support on using secure systems for processing data across borders 5
  • 6. Tryggve works on 6 themes 1. Technical development 2. Interoperability of systems 3. Process development 4. Legal framework 5. Use cases 6. Communication and outreach 6
  • 8. 1. Technical development Provide secure computing environment for analysis of sensitive data. • “Building blocks” – TSD 2.0 service at USIT, Norway – Mosler service at BILS, Sweden – ePouta IaaS at CSC, Finland – Computerome at DTU, Denmark • All of the above have been launched for users • Variety in the systems involved offers flexibility to handle different user demands • Legal issues for accessing and/or moving data across countries under investigation 8
  • 9. 1. Secure systems – Control and ownership of data • Where the data is analyzed or stored; and who has the control over the data are different things. • The user stays in control. Service providers offer secure environment for storing and analyzing the data. • Data handler contract defines the roles. Taking into use some of the secure systems does not imply transferring the control over, or ownership of the data 9
  • 10. 1. Secure systems – How to access • The secure systems are available now. • Access through Tryggve use cases, or directly from the providers • Tryggve use case: – gives access free-of-charge for limited time (to pilot use the system) AND include support / development activities – users are from several Nordic countries (“Nordic solution”) – need access to a system in another country • More information at Tryggve home page wiki.neic.no/tryggve 10
  • 12. 2. Interoperability of systems Improve joint use of Nordic secure systems. • Development supporting interoperability: – Data transfer service – Portable software installations (Dockers and Virtual Machines) – Accessing computing backend across countries – Investigate common authentication and authorization mechanisms • Existing tools will be utilized to support interoperability, including: – Tool and Resource Registry at ELIXIR Denmark – REMS authorization management system at ELIXIR Finland 12
  • 13. 2. Interoperability: Portable software installations • Users must be able to bring own software in the secure systems • Important to be sure that exactly same workflow is executed at different environments • Service providers have limited resources for installing software • Solution: Portable easy to deploy software installations • Docker Containers within secure environments are being tested 13
  • 14. • Secure file transfer based on secure FTP • No need to store temporary copies on user’s local computer • Can be used for moving data between Tryggve systems, or to interface with external repositories 14 2. Interoperability: Data transfer
  • 15. 2. Interoperability: Shared computing resources • Aim: Enable use of secure IaaS resources across Nordics. • Case: Provide computing resources from ePouta (Finland) for Mosler service (Sweden) • Mosler offers remote desktop for processing sensitive data, and ePouta offers cloud infrastructure – Connect systems with dedicated network – ePouta provides secure private virtual cluster for Mosler to utilize • Proof-of-concept for future cases 15
  • 17. 3. Process development Improve accessibility of services and share best-practices in service operations • Tasks supporting development of processes: – improving (or harmonizing) customer contract processes – joint code of conduct for managing sensitive data – sharing knowledge on technologies and software components – sharing experiences in IT security and security reviews – interacting with register data holders, biobanks, etc. 17
  • 19. 4. Legal environment Assess legal framework relevant for use of sensitive data in research, and provide guidelines to fulfill legal requirements for trans-Nordic studies. • Activities include: – assessing relevant legislation in Nordic and EU level – analyzing legal requirements and conditions in some of the use cases – preparing guidelines for researchers on the regulations – looking into specific questions, such as moving data across countries 19
  • 21. 5. Use cases Implement and support concrete use cases to facilitate great research and to connect project to actual user demands. • Tryggve use case is part of a real research project aimed to support the researchers in handling and analysis of sensitive data. – at the same time, development of services in Tryggve is influenced by the experiences gained from the pilot users / use cases. • Use cases can be proposed at any time. • (simple) process for proposing use cases documented at wiki.neic.no/Tryggve#Use_cases 21
  • 22. What does Tryggve offer for pilot users? • The proposers of accepted use cases will receive: – Access to secure data processing systems (for a limited time, and up to a reasonable amount of disk space and computing resources) – Expert assistance from Tryggve – Possibility for targeted service development to enable the use case • All this will be provided free of charge for the use cases – No funding for proposers of accepted use cases is included • What we expect from researchers involved in a use case – Participation in discussions to specify the users’ needs – Feedback for services 22
  • 23. 5. Use Case proposal form available on web site 23 More information at https://wiki.neic.no/Tryggve#Use_cases
  • 24. Tryggve and Nordic Biobanks • Tryggve as a Nordic project can have a role in bridging the gap between researchers and IT services. • Including further development of the underlying systems. • Services for Nordic Biobank community could include – efficient and secure processing environment for sensitive data – extending Biobanks own resources – project-based storing and sharing of data – packaging software stack for easier installation – etc. Use cases defined by Biobanks would be a way forward. 24
  • 25. Thank you 25 Antti Pursula Tryggve Project Manager NeIC / CSC – IT Center for Science antti.pursula@csc.fi Twitter: @AnttiPursula Web site: wiki.neic.no/Tryggve Subscribe to Tryggve monthly newsletter on the web site