277,661 research outputs found

    Privacy-preserving data sharing infrastructures for medical research: systematization and comparison

    Get PDF
    Background: Data sharing is considered a crucial part of modern medical research. Unfortunately, despite its advantages, it often faces obstacles, especially data privacy challenges. As a result, various approaches and infrastructures have been developed that aim to ensure that patients and research participants remain anonymous when data is shared. However, privacy protection typically comes at a cost, e.g. restrictions regarding the types of analyses that can be performed on shared data. What is lacking is a systematization making the trade-offs taken by different approaches transparent. The aim of the work described in this paper was to develop a systematization for the degree of privacy protection provided and the trade-offs taken by different data sharing methods. Based on this contribution, we categorized popular data sharing approaches and identified research gaps by analyzing combinations of promising properties and features that are not yet supported by existing approaches. Methods: The systematization consists of different axes. Three axes relate to privacy protection aspects and were adopted from the popular Five Safes Framework: (1) safe data, addressing privacy at the input level, (2) safe settings, addressing privacy during shared processing, and (3) safe outputs, addressing privacy protection of analysis results. Three additional axes address the usefulness of approaches: (4) support for de-duplication, to enable the reconciliation of data belonging to the same individuals, (5) flexibility, to be able to adapt to different data analysis requirements, and (6) scalability, to maintain performance with increasing complexity of shared data or common analysis processes. Results: Using the systematization, we identified three different categories of approaches: distributed data analyses, which exchange anonymous aggregated data, secure multi-party computation protocols, which exchange encrypted data, and data enclaves, which store pooled individual-level data in secure environments for access for analysis purposes. We identified important research gaps, including a lack of approaches enabling the de-duplication of horizontally distributed data or providing a high degree of flexibility. Conclusions: There are fundamental differences between different data sharing approaches and several gaps in their functionality that may be interesting to investigate in future work. Our systematization can make the properties of privacy-preserving data sharing infrastructures more transparent and support decision makers and regulatory authorities with a better understanding of the trade-offs taken

    Work in progress about enhancing the programmability and energy efficiency of storage in HPC and cloud environments

    Get PDF
    Proceedings of the First PhD Symposium on Sustainable Ultrascale Computing Systems (NESUS PhD 2016) Timisoara, Romania. February 8-11, 2016.We present the work in progress for the PhD thesis titled “Enhancing the programmability and energy efficiency of storage in HPC and cloud environments”. In this thesis, we focus on studying and optimizing data movement across different layers of the operating system’s I/O stack. We study the power consumption during I/O-intensive workloads using sophisticated software and hardware instrumentation, collecting time series data from internal ATX power lines that feed every system component, and several run-time operating system metrics. Data exploration and data analysis reveal for each I/O access pattern various power and performance regimes. These regimes show how power is used by the system as data moved through the I/O stack. We use this knowledge to build I/O power models that are able to predict power consumption for different I/O workloads, and optimize the CPU device driver that manage performance states to obtain great power savings (over 30%). Finally, we develop new mechanisms and abstractions that allow co-located virtual machines to share data with each other more efficiently. Our virtualized data sharing solution reduces data movement among virtual domains, leading to energy savings I/O performance improvements.European Cooperation in Science and Technology. COS

    Online help-seeking in communities of practice

    Get PDF
    Interactive online help systems are considered to be a fruitful supplement to traditional IT helpdesks, which are often overloaded. They often comprise user-generated FAQ collections playing the role of technology-based conceptual artifacts. Two main questions arise: how the conceptual artifacts should be used, and which factors influence their acceptance in a community of practice (CoP). Firstly, this paper offers a theoretical frame and a usage scenario for technology-based conceptual artifacts against the theoretical background of the academic help-seeking and CoP approach. Each of the two approaches is extensively covered by psychological and educational research literature, however their combination is not yet sufficiently investigated. Secondly, the paper proposes a research model explaining the acceptance of conceptual artifacts. The model includes users’ expectations towards the artifact, perceived social influence and users’ roles in the CoP as predictors of artifact use intention and actual usage. A correlational study conducted in an academic software users’ CoP and involving structural equations modeling validates the model, suggesting thus a research line that is worth further pursuing. For educational practice, the study suggests three ways of supporting knowledge sharing in CoPs, i.e. use of technology-based conceptual artifacts, roles and division of labor, and purposeful communication in CoPs

    Mobility: a double-edged sword for HSPA networks

    Get PDF
    This paper presents an empirical study on the performance of mobile High Speed Packet Access (HSPA, a 3.5G cellular standard) networks in Hong Kong via extensive field tests. Our study, from the viewpoint of end users, covers virtually all possible mobile scenarios in urban areas, including subways, trains, off-shore ferries and city buses. We have confirmed that mobility has largely negative impacts on the performance of HSPA networks, as fast-changing wireless environment causes serious service deterioration or even interruption. Meanwhile our field experiment results have shown unexpected new findings and thereby exposed new features of the mobile HSPA networks, which contradict commonly held views. We surprisingly find out that mobility can improve fairness of bandwidth sharing among users and traffic flows. Also the triggering and final results of handoffs in mobile HSPA networks are unpredictable and often inappropriate, thus calling for fast reacting fallover mechanisms. We have conducted in-depth research to furnish detailed analysis and explanations to what we have observed. We conclude that mobility is a double-edged sword for HSPA networks. To the best of our knowledge, this is the first public report on a large scale empirical study on the performance of commercial mobile HSPA networks

    Game-theoretic infrastructure sharing in multioperator cellular networks

    Get PDF
    ©2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.The introduction of fourth-generation wireless technologies has fueled the rapid development of cellular networks, significantly increasing the energy consumption and the expenditures of mobile network operators (MNOs). In addition, network underutilization during low-traffic periods (e.g., night zone) has motivated a new business model, namely, infrastructure sharing, which allows the MNOs to have their traffic served by other MNOs in the same geographic area, thus enabling them to switch off part of their network. In this paper, we propose a novel infrastructure-sharing algorithm for multioperator environments, which enables the deactivation of underutilized base stations during low-traffic periods. Motivated by the conflicting interests of the MNOs and the necessity for effective solutions, we introduce a game-theoretic framework that enables the MNOs to individually estimate the switching-off probabilities that reduce their expected financial cost. Our approach reaches dominant strategy equilibrium, which is the strategy that minimizes the cost of each player. Finally, we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved in multioperator environments, incentivizing the MNOs to apply the proposed scheme.Peer ReviewedPostprint (author's final draft
    • 

    corecore