70 likes | 200 Views
Enterprise Data Decentralized Control, Data Security and Privacy. Data Encryption Information Sharing/ Protection of Research Data Next Steps Michael Pickett - Duke. Data Encryption – Some Tools. Linux EncFS AES-128/256 or Blowfish http://arg0.net/wiki/encfs
E N D
Enterprise Data Decentralized Control, Data Security and Privacy • Data Encryption • Information Sharing/Protection of Research Data • Next Steps Michael Pickett - Duke
Data Encryption – Some Tools • Linux EncFS AES-128/256 or Blowfish • http://arg0.net/wiki/encfs • Mac FileVault – AES-128 • http://www.apple.com/macosx/features/filevault/ • Windows (XP SP1+) Encrypting File System – AES-256 or 3DES • http://www.windowsecurity.com/articles/Where_Does_EFS_Fit_into_your_Security_Plan.html
Information Sharing/Protection of Research Data • NSB - LONG-LIVED DIGITAL DATA COLLECTIONS • http://www.nsf.gov/nsb/documents/2005/LLDDC_report.pdf
NSB - LONG-LIVED DIGITAL DATA COLLECTIONS • What data do we not want to lose? • Data deemed useful over long period (data we would desire to migrate across tech generations) • Importance defined by peers (e.g. Protein Data Bank) • Metadata required to make the raw data useful and to replicate findings (derived data?) • Are we worried about intruders altering data that our researchers collect or use?
Current Policy Examples • Earth/Ocean Sciences – 2 yrs to deposit in national data center • Cognitive Brain Science – 1 year to deposit in library or data archive • NIH – grant must include data sharing plan if > $500K (data to replicate – not summaries) & PI keeps data for 3 years after grant ends
The Future • Recommendation 4: The NSF should require that research proposals for activities that will generate digital data, especially long-lived data, should state such intentions in the proposal so that peer reviewers can evaluate a proposed data management plan. • Building policy and infrastructure to help researchers do this will be a competitive advantage (for securing faculty and grants)
Next Steps • Are security breaches at colleges and universities on the rise? • What are we doing to address the protection (privacy, security, integrity) of information? • Are there things we should be doing differently than industry and government? • What infrastructure (technology, procedures, policy, templates) should we provide for our schools?