scholarly journals Data Sharing Across Osteoarthritis Research Groups and Disciplines: Opportunities and Challenges

2020 ◽  
Author(s):  
Jill Evans ◽  
Paul Biggs ◽  
Mark Elliott

Abstract Background: Osteoarthritis is a heterogeneous condition characterised by a wide variety of factors and represents a worldwide healthcare challenge. There are multiple clinical and research specialisms involved in the diagnosis, prognosis and treatment of osteoarthritis, and there may be opportunities to share or pool data which are currently not being utilised. However, there are challenges to doing so which require carefully structured solutions and partnership working.Methods: Interviews were conducted with nine experts from various fields within osteoarthritis research. A semi-structured approach was used, and thematic analysis applied to the results.Results: Generally, osteoarthritis researchers were supportive of data sharing, provided it is done responsibly and without impacting data integrity. Benefits identified included increasing typically low-powered data, the potential for machine learning opportunities, and the potential for improved patient outcomes. However, a number of challenges were identified, in particular related to; data security, data harmonisation, storage costs, ethical considerations and governance.Conclusions: There is clear support for increased data sharing and partnership working in osteoarthritis research. Further investigation will be required to navigate the complex issues identified; however, it is clear that collaborative opportunities should be better facilitated and there may be innovative ways to do this. It is also clear that nomenclature within different disciplines could be better streamlined, to improve existing opportunities to harmonise data.

2019 ◽  
Vol 13 (4) ◽  
pp. 356-363
Author(s):  
Yuezhong Wu ◽  
Wei Chen ◽  
Shuhong Chen ◽  
Guojun Wang ◽  
Changyun Li

Background: Cloud storage is generally used to provide on-demand services with sufficient scalability in an efficient network environment, and various encryption algorithms are typically applied to protect the data in the cloud. However, it is non-trivial to obtain the original data after encryption and efficient methods are needed to access the original data. Methods: In this paper, we propose a new user-controlled and efficient encrypted data sharing model in cloud storage. It preprocesses user data to ensure the confidentiality and integrity based on triple encryption scheme of CP-ABE ciphertext access control mechanism and integrity verification. Moreover, it adopts secondary screening program to achieve efficient ciphertext retrieval by using distributed Lucene technology and fine-grained decision tree. In this way, when a trustworthy third party is introduced, the security and reliability of data sharing can be guaranteed. To provide data security and efficient retrieval, we also combine active user with active system. Results: Experimental results show that the proposed model can ensure data security in cloud storage services platform as well as enhance the operational performance of data sharing. Conclusion: The proposed security sharing mechanism works well in an actual cloud storage environment.


Sensors ◽  
2021 ◽  
Vol 21 (2) ◽  
pp. 421
Author(s):  
Jorge Oevermann ◽  
Peter Weber ◽  
Steffen H. Tretbar

The aim of this work was to extend conventional medical implants by the possibility of communication between them. For reasons of data security and transmitting distances, this communication should be realized using ultrasound, which is generated and detected by capacitive micromachined ultrasonic transducers (CMUTs). These offer the advantage of an inherent high bandwidth and a high integration capability. To protect the surrounding tissue, it has to be encapsulated. In contrast to previous results of other research groups dealing with the encapsulation of CMUTs, the goal here is to integrate the CMUT into the housing of a medical implant. In this work, CMUTs were designed and fabricated for a center frequency of 2 MHz in water and experimentally tested on their characteristics for operation behind layers of Polyether ether ketone (PEEK) and titanium, two typical materials for the housings of medical implants. It could be shown that with silicone as a coupling layer it is possible to operate a CMUT behind the housing of an implant. Although it changes the characteristics of the CMUT, the setup is found to be well suited for communication between two transducers over a distance of at least 8 cm.


Author(s):  
Chandrakala B M ◽  
S C Lingareddy

<p>In recent days, data sharing has provided the flexibility to share the data, store the data, and perform operation on data virtually as well as cost effectively. Data sharing in cloud is one of the feature, which is being popular and widely accepted. However, the concern here is to ensure the data security and this has led the researcher to research in this area. To provide the security several Proxy re-encryption scheme has been introduced, however all these method lacks of efficiency. Hence In this paper, we propose a scheme known as ALBC (Adaptive Lattice Based Cryptography), this scheme follows the two phase i.e. encryption and Re-encryption. Encryption phase has few algorithms such as Key_Gen, Enc, Dec. Similarly ALBC Re-Enc has five algorithm i.e. Key_Gen, Key_ReGen,  Enc, Re-Enc, Dec. our algorithm not only provides the security but also solves the problem of RL(Ring-learning) with errors problems. In order to evaluate, our algorithm is compared with the existing model in terms of encryption time, decryption time, re-encryption time, key generation  and key regeneration by varying the various key size. When we observe the comparative analysis, it is observed that our algorithm outperforms the existing algorithm.</p>


Author(s):  
Xinjie Cui ◽  
Robyn Blackadar

ABSTRACT ObjectivesUsing existing data for research can generate new knowledge and evidence for policy with relatively little cost. Privacy concerns are paramount in such secondary usage of data collected on human subjects. Information privacy protection and data security are critical considerations in reuse and repurposing of data especially linked data, longitudinal data, and large amounts of data. Data sharing and privacy protection are both in the public interest and we need to assess the risk of “doing” (sharing) as well as the risk of “not doing” (not sharing or not protecting).    ApproachThe Alberta Centre for Child Family and Community Research (the Centre) establishes the Child Youth Data Lab that links and analyzes administrative data from multiple provincial ministries and the Child Data Centre of Alberta that repurposes research data and manages its access for reuse. The Centre partners with provincial Office of the Information Privacy Commissioner, Research Ethics Boards and leaders in the research communities and technology industry to design and develop measures to enable secondary use while safeguarding the data, and to explore and adopt best practices on data sharing processes, governance, and technologies. ResultsIn principle current privacy laws and regulations provide good guidance in collection, use, and disclosure of data, however there is a lack of consistency in the interpretation of these laws at the operational level with regard to secondary data use. The experiences of establishing different data sharing models at the Centre through multiple initiatives are discussed. Cross-sectoral broad partnership brings understanding and builds trusting relationships, which are crucial to establishing data sharing processes. The recognition of the significance of secondary data use to provide direction for policy and program development at the executive level provides commitment for data sharing initiatives. Strong governance structure consists multi-level ministry and multiple stakeholder involvement ensures ongoing support and engagement. The highest data security standards and anonymous solution for data linkage enables the sharing of data with good privacy protection. ConclusionSecondary use of data to improve system performance and contributing to scientific discovery has been broadly recognized. A balance between utility and privacy can be realized through broad partnership in building proper governance, technology, processes and policies.


2020 ◽  
Author(s):  
Tamra Lysaght ◽  
Angela Ballantyne ◽  
Vicki Xafis ◽  
Serene Ong ◽  
Gerald Owen Schaefer ◽  
...  

Abstract Background We aimed to examine the ethical concerns Singaporeans have about sharing health-data for precision medicine (PM) and identify suggestions for governance strategies. Just as Asian genomes are under-represented in PM, the views of Asian populations about the risks and benefits of data sharing are under-represented in prior attitudinal research.Methods We conducted seven focus groups with 62 participants in Singapore from May to July 2019. They were conducted in three languages (English, Mandarin and Malay) and analysed with qualitative content and thematic analysis. Results Four key themes emerged: nuanced understandings of data security and data sensitivity; trade-offs between data protection and research benefits; trust (and distrust) in the public and private sectors; and governance and control options. Participants were aware of the inherent risks associated with data sharing for research. Participants expressed conditional support for data sharing, including genomic sequence data and information contained within electronic medical records. This support included sharing data with researchers from universities and healthcare institutions, both in Singapore and overseas. Support was conditional on the perceived social value of the research and appropriate de-identification and data security processes. Participants suggested that a data sharing oversight body would help strengthen public trust and comfort in data research for PM in Singapore.Conclusion Maintenance of public trust in data security systems and governance regimes can enhance participation in PM and data sharing for research. Contrary to themes in much prior research, participants demonstrated a sophisticated understanding of the inherent risks of data sharing, analysed trade-offs between risks and potential benefits of PM, and often adopted an international perspective.


2020 ◽  
Vol 18 (2) ◽  
pp. 107-114
Author(s):  
Caio Corrêa Cortela ◽  
Cesar Kist ◽  
Michel Milistetd ◽  
Jorge Both ◽  
Carlos Adelar Abaide Balbinotti

INTRODUÇÃO: No Brasil, pesquisas referentes ao desenvolvimento do treinador são recentes. Nos últimos cinco anos observam-se os primeiros movimentos para a formação de grupos de pesquisa especificamente ligados à temática. OBJETIVO: Na tentativa de contribuir nesse cenário, este ensaio bibliográfico, de caráter exploratório, busca apresentar o panorama atual de oportunidades de aprendizagem em contexto formal e não formal, disponíveis aos treinadores brasileiros de tênis em seu processo de aprendizagem profissional. RESULTADOS: Alguns dilemas encontrados na formação inicial, por meio da via acadêmica e na continuada, pelas vias acadêmica e federativa, são apresentados e debatidos com a literatura. CONCLUSÃO: Por fim, possíveis avanços frente aos impasses percebidos são sugeridos, visando contribuir com as instituições envolvidas na formação de treinadores da modalidade.ABSTRACT. Tennis coches’ professional learning: an essay for the approximation to the national context.BACKGROUND: In Brazil, research on coaches’ development is recent. In the last five years, efforts were made to organize the first research groups concerned to study coaches’ development. OBJECTIVE: In attempt to contribute in this scenario, this exploratory bibliographic essay aims to present the current panorama of learning opportunities available to Brazilian tennis coaches in formal and non-formal context. RESULTS: Dilemmas in the academic initial training as well as in the continuing training through the academic and federative path are presented and discussed with the current literature. CONCLUSION: Finally, suggestions to overcome the current stalemates are presented to contribute to the organizations involved on tennis coaches’ training and development.


2020 ◽  
Vol 5 (19) ◽  
pp. 26-31
Author(s):  
Md. Farooque ◽  
Kailash Patidar ◽  
Rishi Kushwah ◽  
Gaurav Saxena

In this paper an efficient security mechanism has been adopted for the cloud computing environment. It also provides an extendibility of cloud computing environment with big data and Internet of Things. AES-256 and RC6 with two round key generation have been applied for data and application security. Three-way security mechanism has been adopted and implemented. It is user to user (U to U) for data sharing and inter cloud communication. Then user to cloud (U to C) for data security management for application level hierarchy of cloud. Finally, cloud to user (C to U) for the cloud data protection. The security analysis has been tested with different iterations and rounds and it is found to be satisfactory.


2020 ◽  
Vol 14 (1) ◽  
pp. 44-66 ◽  
Author(s):  
Neha Agarwal ◽  
Ajay Rana ◽  
J.P. Pandey ◽  
Amit Agarwal

Cloud computing is an emergent computing paradigm; however, data security is a significant issue in recent time while outsourcing the data to the cloud preventing users to upload their data on cloud. The data forwarded to cloud can be protected using some cryptographic techniques based on identity, attributes, and prediction. But these algorithms lack their performance when a revoked user collude with cloud; therefore, it becomes essential to develop a secure data sharing framework with some enhanced cryptographic techniques. The proposed methodology presented a secure privacy preserving data sharing with encryption technique called dynamic unidirectional proxy re-encryption (PRE) with cipher text policy attribute-based encryption. The technique ensures the privacy, integrity, and security of the data while retrieving through the cloud. The framework is implemented in the cloud sim with java language. Experimental results proved that proposed frame work attains reasonable results compared to traditional methods.


2016 ◽  
Vol 68 (4) ◽  
pp. 478-494 ◽  
Author(s):  
Lin He ◽  
Vinita Nahar

Purpose – In recent years, a large number of data repositories have been built and used. However, the extent to which scientific data are re-used in academic publications is still unknown. The purpose of this paper is to explore the functions of re-used scientific data in scholarly publication in different fields. Design/methodology/approach – To address these questions, the authors identified 827 publications citing resources in the Dryad Digital Repository indexed by Scopus from 2010 to 2015. Findings – The results show that: the number of citations to scientific data increases sharply over the years, but mainly from data-intensive disciplines, such as agricultural, biology science, environment science and medicine; the majority of citations are from the originating articles; and researchers tend to reuse data produced by their own research groups. Research limitations/implications – Dryad data may be re-used without being formally cited. Originality/value – The conservatism in data sharing suggests that more should be done to encourage researchers to re-use other’s data.


Sign in / Sign up

Export Citation Format

Share Document