scholarly journals Increasing protected data accessibility for age-related cataract research using a semi-automated honest broker

2019 ◽  
Vol 2 (3) ◽  
pp. 115-132
Author(s):  
Samaikya Valluripally ◽  
Murugesan Raju ◽  
Prasad Calyam ◽  
Mauro Lemus ◽  
Soumya Purohit ◽  
...  

Ophthalmology researchers are becoming increasingly reliant on protected data sets to find new trends and enhance patient care. However, there is an inherent lack of trust in the current healthcare community ecosystem between the data custodians (i.e., health care organizations and hospitals) and data consumers (i.e., researchers and clinicians). This typically results in a manual governance approach that causes slow data accessibility for researchers due to concerns such as ensuring auditability for any authorization of data consumers, and assurance to ensure compliance with health data security standards. In this paper, we address this issue of long-drawn data accessibility by proposing a semi-automated “honest broker” framework that can be implemented in an online health application. The framework establishes trust between the data consumers and the custodians by: 1. improving the eiciency in compliance checking for data consumer requests using a risk assessment technique; 2. incorporating auditability for consumers to access protected data by including a custodian-in-the-loop only when essential; and 3. increasing the speed of large-volume data actions (such as view, copy, modify, and delete) using a popular common data model. Via an ophthalmology case study involving an age-related cataract research use case in a community cloud testbed, we demonstrate how our solution approach can be implemented in practice to improve timely data access and secure computation of protected data for ultimately achieving data-driven eye health insights.

2020 ◽  
Vol 245 ◽  
pp. 06042
Author(s):  
Oliver Gutsche ◽  
Igor Mandrichenko

A columnar data representation is known to be an efficient way for data storage, specifically in cases when the analysis is often done based only on a small fragment of the available data structures. A data representation like Apache Parquet is a step forward from a columnar representation, which splits data horizontally to allow for easy parallelization of data analysis. Based on the general idea of columnar data storage, working on the [LDRD Project], we have developed a striped data representation, which, we believe, is better suited to the needs of High Energy Physics data analysis. A traditional columnar approach allows for efficient data analysis of complex structures. While keeping all the benefits of columnar data representations, the striped mechanism goes further by enabling easy parallelization of computations without requiring special hardware. We will present an implementation and some performance characteristics of such a data representation mechanism using a distributed no-SQL database or a local file system, unified under the same API and data representation model. The representation is efficient and at the same time simple so that it allows for a common data model and APIs for wide range of underlying storage mechanisms such as distributed no-SQL databases and local file systems. Striped storage adopts Numpy arrays as its basic data representation format, which makes it easy and efficient to use in Python applications. The Striped Data Server is a web service, which allows to hide the server implementation details from the end user, easily exposes data to WAN users, and allows to utilize well known and developed data caching solutions to further increase data access efficiency. We are considering the Striped Data Server as the core of an enterprise scale data analysis platform for High Energy Physics and similar areas of data processing. We have been testing this architecture with a 2TB dataset from a CMS dark matter search and plan to expand it to multiple 100 TB or even PB scale. We will present the striped format, Striped Data Server architecture and performance test results.


Author(s):  
Shirley Wong ◽  
Victoria Schuckel ◽  
Simon Thompson ◽  
David Ford ◽  
Ronan Lyons ◽  
...  

IntroductionThere is no power for change greater than a community discovering what it cares about.1 The Health Data Platform (HDP) will democratize British Columbia’s (population of approximately 4.6 million) health sector data by creating common enabling infrastructure that supports cross-organization analytics and research used by both decision makers and cademics. HDP will provide streamlined, proportionate processes that provide timelier access to data with increased transparency for the data consumer and provide shared data related services that elevate best practices by enabling consistency across data contributors, while maintaining continued stewardship of their data. HDP will be built in collaboration with Swansea University following an agile pragmatic approach starting with a minimum viable product. Objectives and ApproachBuild a data sharing environment that harnesses the data and the understanding and expertise about health data across academe, decision makers, and clinicians in the province by: Enabling a common harmonized approach across the sector on: Data stewardship Data access Data security and privacy Data management Data standards To: Enhance data consumer data access experience Increase process consistency and transparency Reduce burden of liberating data from a data source Build trust in the data and what it is telling us and therefore the decisions made Increase data accessibility safely and responsibly Working within the jurisdiction’s existing legislation, the Five Safes Privacy and Security Framework will be implemented, tailored to address the requirements of data contributors. ResultsThe minimum viable product will provide the necessary enabling infrastructure including governance to enable timelier access, safely to administrative data to a limited set of data consumers. The MVP will be expanded with another release planned for early 2021. Conclusion / ImplicationsCollaboration with Swansea University has enabled BC to accelerate its journey to increasing timelier access to data, safely and increasing the maturity of analytics by creating the enabling infrastructure that promotes collaboration and sharing of data and data approaches. 1 Margaret Wheatley


Author(s):  
Koen Bruynseels

Abstract Synthetic biology, as an engineering approach to biological systems, has the potential to disruptively innovate the development of vaccines, therapeutics, and diagnostics. Data accessibility and differences in data-usage capabilities are important factors in shaping this innovation landscape. In this paper, the data that underpin synthetic biology responses to the COVID-19 pandemic are analyzed as positional information goods—goods whose value depends on exclusivity. The positionality of biological data impacts the ability to guide innovations toward societally preferred goals. From both an ethical and economic point of view, positionality can lead to suboptimal as well as beneficial situations. When aiming for responsible innovation (i.e. embedding societal deliberation in the innovation process), it is important to consider hurdles and facilitators in data access and use. Central governance and knowledge commons provide routes to mitigate the negative effects of data positionality.


2019 ◽  
Vol 15 (3/4) ◽  
pp. 174-198
Author(s):  
A. Abdollahi Nami ◽  
L. Rajabion

Purpose A mobile ad hoc network (MANET) enables providers and customers to communicate without a fixed infrastructure. Databases are extended on MANETs to have easy data access and update. As the energy and mobility limitations of both servers and clients affect the availability of data in MANETs, these data are replicated. The purpose of this paper is to provide a literature review of data replication issues and classify the available strategies based on the issues they addressed. Design/methodology/approach The selected articles are reviewed based on the defined criteria. Also, the differences, the advantages and disadvantages of these techniques are described. The methods in the literature can be categorized into three groups, including cluster-based, location-based and group-based mechanisms. Findings High flexibility and data consistency are the features of cluster-based mechanisms. The location-based mechanisms are also appropriate for replica allocation, and they mostly have low network traffic and delay. Also, the group-based mechanism has high data accessibility compared to other mechanisms. Data accessibility and time have got more attention to data replication techniques. Scalability as an important parameter must be considered more in the future. The reduction of storage cost in MANETs is the main goal of data replication. Researchers have to consider the cost parameter when another parameter will be influenced. Research limitations/implications Data replication in MANETs has been covered in different available sources such as Web pages, technical reports, academic publications and editorial notes. The articles published in national journals and conferences are ignored in this study. This study includes articles from academic main international journals to get the best capability. Originality/value The paper reviews the past and the state-of-the-art mechanisms in data replication in MANET. Exclusively, data replication’s main goal, existing challenges, research terminologies and mechanisms in MANET are summarized using the answers to the research questions. This method will help researchers in the future to develop more effective data replication method in MANET.


2019 ◽  
Vol 9 (1) ◽  
Author(s):  
Enrico Borrelli ◽  
Riccardo Sacconi ◽  
Gerd Klose ◽  
Luis de Sisternes ◽  
Francesco Bandello ◽  
...  

AbstractThis study explored whether rotational three-dimensional (3D) visualization of optical coherence tomography angiography (OCTA) volume data may yield valuable information regarding type 3 macular neovascularization (MNV). In this retrospective, cross-sectional study, we collected data from 15 eyes (13 patients) with treatment-naïve type 3 MNV in their post-nascent stage and age-related macular degeneration (AMD). Subjects were imaged with the SS-OCT system (PLEX Elite 9000, Carl Zeiss Meditec Inc., Dublin, CA, USA). The OCTA volume data were processed with a prototype volume projection removal algorithm and then analyzed using volumetric visualization techniques in order to obtain a 3D visualization of the region occupied by type 3 MNV. The two-dimensional and three-dimensional OCTA images were investigated. Mean ± SD age was 75.1 ± 7.4 years. BCVA was 0.42 ± 0.21 LogMAR in the study eyes. Considering the cohort of analyzed eyes, on rotational 3D OCTA images, a total of 35 neovascular lesions (vs 22 lesions detected on 2D OCTA images) rising from the deep vascular complex and variably spanning the outer retinal layers and eventually reaching the RPE/sub-RPE space were detected. Nine of 35 lesions had a saccular shape, while the remaining cases had a filiform shape. On rotational 3D OCTA images, these lesions were inclined on the three planes, instead of perpendicular to the RPE/Bruch’s membrane. In conclusion, this study used an algorithm to obtain rotational three-dimensional visualization of type 3 MNV. This approach seems to increase the detection rate for these lesions and to be useful to offer new insight into type 3 MNV.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Jin Li ◽  
Songqi Wu ◽  
Yundan Yang ◽  
Fenghui Duan ◽  
Hui Lu ◽  
...  

In the process of sharing data, the costless replication of electric energy data leads to the problem of uncontrolled data and the difficulty of third-party access verification. This paper proposes a controlled sharing mechanism of data based on the consortium blockchain. The data flow range is controlled by the data isolation mechanism between channels provided by the consortium blockchain by constructing a data storage consortium chain to achieve trusted data storage, combining attribute-based encryption to complete data access control and meet the demands for granular data accessibility control and secure sharing; the data flow transfer ledger is built to record the original data life cycle management and effectively record the data transfer process of each data controller. Taking the application scenario of electric energy data sharing as an example, the scheme is designed and simulated on the Linux system and Hyperledger Fabric. Experimental results have verified that the mechanism can effectively control the scope of access to electrical energy data and realize the control of the data by the data owner.


2006 ◽  
Vol 07 (01) ◽  
pp. 75-89 ◽  
Author(s):  
TAKAHIRO HARA

To improve data accessibility in ad hoc networks, we have proposed a few methods of replicating data items on mobile hosts by considering the data access frequencies from mobile hosts to each data item and the network topology. In this paper, we address techniques to manage locations of data items or replicas and efficiently forward access requests to the locations. In order to manage locations of data items efficiently, a key issues is predicting the locations of data items that dynamically change. To predict the locations of data items, we use the information on replica allocation at every relocation time and the logs of past data accesses.


2021 ◽  
Author(s):  
Magesh Kasthuri ◽  
Hitarshi Buch ◽  
Krishna Moorthy ◽  
Vinod Panicker

Data access is inevitable in today’s world and it is prone to threat attacks and hence data security is utmost important for any enterprise to handle industrial solutions. The economics of data being used across the industries rapidly growing in current digital world so the potential data related threats is also rapidly growing. Data security is an integrated solution component for any Enterprise solution but with the growing demand on data security and potential threat handling, Data Security as a Service (DSaaS)f is a new model widely accepted in modern age architecture in Blockchain and Big Data world combining the power of cloud based security services, decentralized network in Blockchain and tamper-proof ledger management. Any Enterprise Security architecture comprises of how data is handled in a secured way and how integration between services (consumers/producers or API interaction or any middleware services) handles data between them. Hence it is inevitable to that future technology adoption should include Data Security-as-a-service for zero-trust solution design complying with compliance and security standards for industry.


2006 ◽  
Vol 2 (4) ◽  
pp. 193-209 ◽  
Author(s):  
Mieso K. Denko ◽  
Hua Lu

A mobile ad hoc network (MANET) is a collection of wireless mobile nodes that forms a temporary network without the aid of a fixed communication infrastructure. Since every node can be mobile and network topology changes can occur frequently, node disconnection is a common mode of operation in MANETs. Providing reliable data access and message delivery is a challenge in this dynamic network environment. Caching and replica allocation within the network can improve data accessibility by storing the data and accessing them locally. However, maintaining data consistency among replicas becomes a challenging problem. Hence, balancing data accessibility and consistency is an important step toward data management in MANETs. In this paper, we propose a replica-based data-storage mechanism and undelivered-message queue schemes to provide reliable data storage and dissemination. We also propose replica update strategies to maintain data consistency while improving data accessibility. These solutions are based on a clustered MANET where nodes in the network are divided into small groups that are suitable for localized data management. The goal is to reduce communication overhead, support localized computation, and enhance scalability. A simulation environment was built using an NS-2 network simulator to evaluate the performance of the proposed schemes. The results show that our schemes distribute replicas effectively, provide high data accessibility rates and maintain consistency.


Sign in / Sign up

Export Citation Format

Share Document