Open Access
Open Peer Review

This article has Open Peer Review reports available.

How does Open Peer Review work?

Orchestrating differential data access for translational research: a pilot implementation

  • Marco Brandizi1Email authorView ORCID ID profile,
  • Olga Melnichuk1,
  • Raffael Bild2,
  • Florian Kohlmayer2,
  • Benedicto Rodriguez-Castro2,
  • Helmut Spengler2,
  • Klaus A. Kuhn2,
  • Wolfgang Kuchinke3,
  • Christian Ohmann4,
  • Timo Mustonen5,
  • Mikael Linden5,
  • Tommi Nyrönen5,
  • Ilkka Lappalainen5,
  • Alvis Brazma1 and
  • Ugis Sarkans1Email author
BMC Medical Informatics and Decision MakingBMC series – open, inclusive and trusted201717:30

DOI: 10.1186/s12911-017-0424-6

Received: 6 October 2016

Accepted: 3 March 2017

Published: 23 March 2017

Abstract

Background

Translational researchers need robust IT solutions to access a range of data types, varying from public data sets to pseudonymised patient information with restricted access, provided on a case by case basis. The reason for this complication is that managing access policies to sensitive human data must consider issues of data confidentiality, identifiability, extent of consent, and data usage agreements. All these ethical, social and legal aspects must be incorporated into a differential management of restricted access to sensitive data.

Methods

In this paper we present a pilot system that uses several common open source software components in a novel combination to coordinate access to heterogeneous biomedical data repositories containing open data (open access) as well as sensitive data (restricted access) in the domain of biobanking and biosample research. Our approach is based on a digital identity federation and software to manage resource access entitlements.

Results

Open source software components were assembled and configured in such a way that they allow for different ways of restricted access according to the protection needs of the data. We have tested the resulting pilot infrastructure and assessed its performance, feasibility and reproducibility.

Conclusions

Common open source software components are sufficient to allow for the creation of a secure system for differential access to sensitive data. The implementation of this system is exemplary for researchers facing similar requirements for restricted access data. Here we report experience and lessons learnt of our pilot implementation, which may be useful for similar use cases. Furthermore, we discuss possible extensions for more complex scenarios.

Keywords

Data Access Translational Research Clinical Data Biomedical Data Health Data Protection

Background

Translational research is a promising approach to speed up discovery of new therapies and diagnostic methods. In order to realise such objective, tight collaboration of biomedical researchers and clinical practitioners is required [1, 2]. Their work is data intensive [3, 4] and must rely on information technology to enable efficient data exchange and analysis [5, 6]. Compared to more traditional drug research, access to a larger variety of trials from diverse sources can improve the characterisation of benefits and unwanted effects of drugs and therapies at lower costs and better efficiency [7]. Drug approval processes and drug safety/effectiveness surveillance are improved by faster access to data about active ingredients similar to the ones being under consideration. An example of that is the effectiveness of using existing evidence, or even the prior obligation to make trial outcomes publicly available, to prevent selective reporting [8, 9], that is, the presentation of evidence that is favourable for the interest of the reporter (such as having a drug approved), and the exclusion of unfavourable evidence. Another potential advantages of these approaches is making clinical experimentation more efficient and avoiding the exposure of trial’s potential participant to known risks, as well as, for instance in the case that evidence shows adverse effects to particular health conditions, avoiding unnecessary risks. Ability to perform data analyses other than those for which clinical trials were originally conducted is another opportunity that clinical data sharing offers [10], which is relevant in the translational research field, enabling approaches like comparative genomics [11, 12]. Overall, this has social benefits such as faster improvement of healthcare and its safety, and increasing the confidence of the general public in the scientific community, public services and industry [10]. On the other hand, dealing with biomedical information, and with human patient data in particular, poses complex challenges with respect to ethical, legal and social implications (ELSI [13, 14]), which need to be addressed when software products are developed and IT infrastructures deployed [15, 16]. An obvious example is the wish and right of patients to keep their health information private, which can be motivated by various reasons, including the kind of relationship that an individual wants to maintain with his relatives and social relations [17, 18], the social stigma associated to certain diseases [19, 20], and access to private healthcare [21]. Another reason to resist data sharing lies in the commercial or academic interests of researchers, including the willingness to be the first to submit unpublished research, and the wish to produce evidence useful to file patent applications [22, 23]. These issues pose potential conflicts with the research needs. For instance, anonymization and reidentification-prevention techniques, which are used to grant data access while ensuring patient privacy, imply that data essential for a research goal might be concealed from the researchers [24, 25].

Life science shares technological challenges with other areas of science [26], and generic technological solutions can be employed, either of commercial or open source type [6, 2729]. However, addressing ELSI in the translational research arena is particularly difficult, due to the above mentioned reasons, which can be summarised as heterogeneity of information systems, different types of professional roles involved, the conflicting needs to share information and, at the same time, ensure this is done in a way that respects patients and associated legislation [3032]. The domain of biobanking and biosample research is characterised by special restrictive sample and data usage conditions, since highest ethical standards to ensure the support and participation of human research participants are required. In addition to confidentiality, consent about the data usage, intellectual property and data/sample ownership must be considered. Sophisticated mechanisms to provide restricted access to sensitive data is a way to address this problem. The risk of improper use of the data can be mitigated through legally binding agreements, subscribed by trial participants and researchers, which constrain the purpose for which data access is granted. Access is mediated by some form of a data access agreement between a data consumer and a data provider. These access agreements have to take into account legal and ethical requirements, professional guidance, and good practices. Agreements are in general executed by data stewards or data access committees, but recently they are implemented in electronic form employing software for identity and access management. This approach is not without difficulties, such as the impossibility to foresee useful research goals at the time of data and consensus collection [9, 10]. However, it can be seen as a compromise between the different needs that it addresses.

In this paper we report on a pilot implementation (from now on, ‘the pilot’) that aims at integrating research resources and clinical resources, including data bound to a varying range of access policies, from fully open to data requiring access approval. Implemented in the context of the BioMedBridges project [3335], the pilot shows how identity and permissions management can be simplified by means of a modular approach, utilizing well known software components.

The BioMedBridges project

The European Strategy Forum on Research Infrastructures (ESFRI) initiative has been promoting an agenda to build Research Infrastructures (RIs) in Europe since 2002 [36]. Its current agenda comprises 21 projects in all scientific fields. This includes RIs for the life science area, several of which teamed up in the FP7 BioMedBridges project. The main aim of this project was to facilitate the translation of ideas into medical applications, by promoting data interoperability in a variety of disciplines, across different scales. The project concentrated on five use cases, including cross-species data integration, personalised medicine, imaging, and structural biology. This work was supported by technological, cross-domain activities, such as terminology and data standards harmonisation [37], and secure access to data. The latter was investigated both from the point of view of ELSI, as well as what concerns the realisation of concrete IT solutions. All reports of the project are available [38]. The pilot presented here is documented in detail in the report D5.4 [39], which was preceded by the analysis and design done for D5.3 [40] and by the preparatory investigations on ELSI topics in D5.1 [40, 41] and D5.2 [42].

Methods

In the following we describe the software components that we have employed to deal with the use case addressed by the pilot.

The EBI Biosamples Database

The Biosamples Database (BioSD [43, 44]) is a public repository focused on biological sample information, which is maintained by the European Bioinformatics Institute (EBI). Its rationale is to provide a single access point to the information about the bio-materials used in biological and/or medical research. The users of this resource can search for biomedical samples of interest (e.g., based on phenotypical characteristics), and then navigate to external resources for accessing the data generated on those sample (e.g., microarray data in ArrayExpress [45], proteomics data in PRIDE [46]). Among other benefits, BioSD can aid translational research, since summarised clinical trial data and other information on medical samples are a significant part of its contents. For instance, one can perform a search based on a disease (e.g., using the keyword ‘leukemia’) and find results related both to clinical research (e.g., the sample group ‘SAMEG158683’, concerning human patients and coming from the COSMIC repository [47]), and model organisms (e.g., the group ‘SAMEG22290’, linked to mouse transcription data in ArrayExpress).

BBMRI Hub and biobanks

BBMRI (Biobanks and Biomolecular Resources Research Infrastructure) is a European research infrastructure [48]. The BBMRI-LPC (BBMRI - Large Prospective Cohorts) project [49] aims to build a network for large European prospective studies in order to facilitate transnational research about human health and diseases. The ‘LPC Catalogue’ [50], based on the MIABIS standard [51] and data warehouse techniques, provides a structured overview of the cohorts participating in the BBMRI-LPC project and supports researchers in gaining access to their biomaterials. For the purpose of the pilot we set up an adapted instance of the LPC Catalogue, the ‘BBMRI Hub’ [52]. It provides enhanced functionalities for access to detailed data, including information about individual human samples stored in external biobanks. Moreover, the Shibboleth and REMS systems (see below) were integrated in the hub, enabling identity management and access control.

Resource Entitlement Management System

The Resource Entitlement Management System (REMS [53]) is an open source software that can be used to manage policies for granting access to resources, including digital data [54]. For instance, a data manager may establish that an application procedure is required to access clinical data from a web application like BBMRI Hub, and information about the purpose of the research, or approaches to data protection need to be provided by the applicant and approved by the Data Access Committee (DAC). REMS allows data managers to define per-resource authorisation workflows, which can be used by software systems to ensure users are entitled to see the data requested, and, if not, it facilitates the actions needed for the access to be granted. REMS centralises and simplifies procedures that are often bureaucratic and hard to keep track of. REMS can be integrated with Shibboleth (see the next section), both for the delegation of user authentication, and for the distribution of the entitlement attributes granted by the DACs to authorise access to protected data.

REMS is an mean to manage the agreements between multiple data owners, data sets and data users. As such, it flexibly delegates these responsibilities to DACs and to the contents of the data access agreements that REMS allow DAC members to define. This approach has been successfully used with the European Genome-phenome Archive, which of data access is based on REMS [55].

Identity Management via Shibboleth

In an interconnected world, where multiple providers are able to serve integrated Internet applications and provide a uniform user experience across them, standardised approaches to manage digital identities are ever more important. The identity federation standard SAML is one of the most popular solutions of this kind. Open source implementations, such as Shibboleth [56], are available for many platforms and applications. Shibboleth offers relatively simple methods to wrap areas of a web application (e.g., via URL patterns), so that, before serving a web request, an unauthenticated user can be forwarded to a common login process, where (s)he can select an identity provider (IdP), such as the authentication system managed by their organisation. After authentication, Shibboleth creates a user session, filling it with identity attributes, which are sent back to the original request (via browser forwarding), where the application (acting as a service provider, SP) can check the existence of a session and the associated attributes. A single session can be shared by multiple SPs, thus allowing for centralised accounts and single sign-on. Moreover, SPs can enrich the Shibboleth session with their own user-specific attributes. This means that, in our pilot, REMS can send resource entitlements approved for a user to the resources needing to check for their existence. Based on the SAML standard [57], Shibboleth represents a flexible, standards-compliant solution to decouple application logic from application access and permissions management, delegating the latter to organisation-wide identity managers (e.g., institute’s account directory and management). This is usually arranged into identity federations, essentially sets of organisations, identity providers, and applications where there is mutual trust among the participating parties. This is relevant to the management of sensitive data, where, for example, policies might require specific forms of identity proofing, such as presenting a government-issued photo-ID document to a registration authority.

Results

Figure 1, taken from the previously mentioned BiomedBridges report [39], summarises the workflow that we have implemented in the pilot presented in this paper, based on previous work within the BiomedBridges project [40, 41]. This workflow supports the use case where a researcher is looking for samples of interest, both human and non-human, with an aim to explore experimental data derived from such samples, as well as acquire bio-material for further studies. As discussed above, EBI’s Biosamples Database is a significant starting point for such a use case. We uploaded summaries about demonstration data sets onto BioSD, linking them to more detailed information available in the BBMRI Hub. For instance, a search initiated from BioSD (step 1 in the figure) might lead (step 2) to the page about the data set named DE_Biobank7.1 The decision to use realistic demo data, which does not belong to real patients, allowed us to concentrate on the technical issues, leaving aside the legal and ethical implications.
Fig. 1

The workflow implemented for the BioMedBridges secure access pilot. Taken from [39]

The BBMRI Hub provides summary information for the requested dataset (e.g., number of samples for each biological characteristic), and mediates the access to individual level data (e.g., anonymised patient records). Namely, the Hub checks that the requesting client has an associated Shibboleth session (it uses the Shibboleth Java API, and the SP plug-in for the Apache web server). If this is not the case, the Shibboleth component transparently redirects the user to a sign-on page (step 4; we have set up a single sign-on demonstration service for the pilot). After successful authentication the browser is sent back to the Hub, where the now-existing user session is used to query REMS-related session attributes. These contain the list of resource entitlements associated to the user, such as the access rights the user has for the biobank (s)he is trying to access. Such information is obtained by coupling REMS with Shibboleth’s Attribute Authority component (steps 6/7). If the user does not have the rights to access the requested data, (s)he is forwarded to REMS (again, via browser redirection), to apply for such access (step 9), i.e., provide the research plan, confirm compliance with the data access agreement etc. The exact workflow for the resource access application depends on the resource being accessed, and REMS allows the data manager to define it. Once the user has completed his/her application, this is forwarded to a DAC user for approval. Approved applications (or rejections) are notified to the applicant via email messages, which are also used to send a link to resume the pilot workflow from step 11, i.e., access the protected biobank. A variant of this workflow can happen at step 8, when the initial searches can be refined in BBMRI.

Systems robustness, testing and performance considerations

The pilot aims at demonstrating the technical feasibility to utilize the above workflow in order to mediate access to data of the LPC Catalogue which is reflected in the BioSD. As such, we have tested the infrastructure as a whole with an initial small set of 3 test Shibboleth federations and about 10 Shibboleth-authenticated users. In order to perform such tests, we have populated BioSD and the LPC demo catalogue with information about 14 fictitious human data sets.2 The components that the pilot is based on have been extensively tested, by both the original developers and the many organisations that use them. Both cases include the organisations participating in the pilot.

As an example, the Biosamples database has been developed following sound software engineering methodologies, including extensive use of test-driven coding an unit tests (for instance, [58, 59]). The repository currently stores about 5 million samples, grouped into about 58 thousand data sets, provided by 14 thousand organisations.3 From internal web server logs, we can estimate that BioSD successfully processes on average 158’000 requests per day from about 28 unique client IP addresses, without significant traffic peaks. This makes it clear that BioSD is a valuable resource for biomedical samples, involving a significant number of users. We keep the user community engaged by running periodic exercises of user experience [60] and outreach activities [61]. Regarding the quality of data and annotations in BioSD, while this varies due to our aim to accommodate the needs of as many data submitters as possible, we host sample information from important and well known biomedical sources (see previous section), and we provide ontology-based semi-automatic data reannotation, which improve the original metadata [62].

As another example, at the time writing the LPC Catalogue contains data about 22 large population-based biobanks, including two European networks (MORGAM, EPIC), and data about more than 3.8 million biosamples comprising more than 9 material types (e.g. DNA, cDNA/RNA, whole blood, blood cell isolates, serum, plasma, tissues, cell lines, urine). Eleven out of the 22 participating biobanks state to have diseases of the circulatory system as a focus of research, followed by endocrine, nutritional, and metabolic diseases, mental and behavioural diseases, as well as diseases of the respiratory system with ten biobanks each, respectively. The Catalogue plays an important role in the context of calls for tender within BBMRI-LPC. Two out of four proposals which have already been approved specifically request biosamples from three participating LPC cohorts each. The other two proposals involve all participating LPC cohorts which comprise a sufficiently large number of cases with obtainable biosamples. Further proposals are under review. This indicates the practicability, importance and user acceptance of our approach [63].

In order to estimate the performance of an infrastructure like the pilot, consider the following. According to performance test results [64], a modestly performant server (single or dual-core recent CPUs, up to 12Gb RAM) can uphold 50–100 Shibboleth requests per second, under a workload of up to 3500 parallel requests. The same tests show that Shibboleth scalability is also good, with request latency staying below 5 s for a workload under 500 threads. In [26] it is shown that these limits are well compatible with what we would expect in a scenario like the one described in the pilot, including the figures about organisations managing up to 30’000 users per year through Shibboleth. The above-mentioned figures about BioSD web traffic are well below the values shown above about Shibboleth, especially considering that only a small part of BioSD traffic would come from authenticated users, interested in protected clinical data. The LPC Catalogue and REMS are also able to support similar workloads. These rough figures make us confident that the approach proposed by our pilot is usable from the performance point of view. Moreover, the results achieved in the BioMedBridges project will be leveraged by the CORBEL project, which aims at developing harmonised user access to biomedical data from research infrastructures [65], and by the ELIXIR-EXCELERATE [66] project, which will ease data access in the ELIXIR biomedical network [67]. CORBEL and EXCELERATE are involving 11 and 41 organisations across Europe [68, 69], for a total number of researchers in the order of hundreds. Again, these figures are well below the limits mentioned above.

A further point about robustness lies in the process in place to create credentials for users participating in an identity federation like the test federations that we have set up for the pilot. Clearly homogeneous and safe procedures must be established for that. While this is not within the scope of this paper, we wish to make a few considerations, based on the experience with our organisations and resources. Similarly to other cases [70], all the pilot participants have well defined security policies. For instance, EBI has an internal policy such that electronic credentials are supervised by a senior staff sponsor, including initial identity certification.

Discussion

Common open source software components are sufficient to create a secure system for differential restricted access to sensitive data. The components used to implement the pilot are freely reusable to realise a similar infrastructure in a situation similar to the one we address. In particular, Shibboleth and REMS can be adapted to a different set of biomedical resources that other organisations might want to integrate. Technical details and first experiences about the pilot implementation are described in a report for the BioMedBridges project [39]. Such report includes implementation details that would be useful for the pilot reproducibility. In this section, we are discussing the feasibility, advantages and limitations of our approach, to provide additional information for researchers confronted with similar data protection needs when dealing with similar use cases, and explain our experience with the pilot implementation. Furthermore, we frame the pilot work into a wider legal and technological context.

Addressing security and data protection issues

The work on the pilot was preceded by a preliminary assessment of the legal and ethical situation for data protection and data privacy involved in access and sharing of open data, together with sensitive data, as well as, on a more technical level, the security risks related to biomedical data exchange [40]. The STRIDE methodology [71] was applied to evaluate security threats. This consists of analysing well known threats that occur in software systems (Spoofing, Tampering, Repudiation, Information Disclosure and Elevation of privileges), assessing the extent to which they are present in the system under consideration, and establishing countermeasures to eliminate or reduce the impact of these threats. Additionally, we applied the LINDDUN methodology [40], which allows for further, privacy-specific threat assessment (considering the aspects of Linkability, Identifiability, Non-repudiation, Detectability, Disclosure of information, Content Unawareness, Policy and Consent Non-compliance). We reviewed the threats to security and privacy that the pilot (or similar solutions) is able to address (Table 1), and here we analyse the advantages that our approach might offer in similar situations.
Table 1

How STRIDE threats are addressed in the pilot (or could be in similar scenario)

STRIDE Threat/ Function

Shibboleth/Id Federation

REMS

Domain Apps (BioSD, BBMRI Hub, more)

Infrastructure (eg, web servers, network)

Spoofing/Authenticity

Authentication HTTPS/TLS/X.509

Limit distributed attributes

Proper Software Engineering (PSE)

Limit distributed attributes

PSE

PSE

- HTTPS/TLS/ X.509 - PSE

Repudiation/Accountability

Authentication Logging (must be law-compliant, eg max retention time)

Logging

PSE

- Logging

- Logging

Info Disclosure/Confidentiality

HTTPS/TLS/X.509

- Subscribed policies (no data out of Id Federation)

HTTPS/TLS/X.509

HTTPS/TLS/X.509

HTTPS/TLS/X.509

DoS/ Availability

- PSE

- PSE

- PSE

- Redundancy

- Firewalls

- PSE

Elevation of Privileges/Authorisation

- Only required attributes distributed

- PSE

- Only required attributes distributed

- PSE

- PSE

- PSE

PSE refers to software design and testing, best practices, established methodologies, techniques and frameworks. As for the biomedical-specific risks identified by the LINDUN methodology, REMS policies help with facing all those risks, as it does the security and reliability of the pilot software components

The combination of Shibboleth and REMS limits the risk that confidential information is disclosed to unauthorised persons, by means of simplification and centralisation. REMS helps in ensuring that data access authorisations are granted according to the legal requirements associated with the data sets (e.g., the kind of consensus the patients have given). Moreover, the activity tracking functionality provided by these two tools offers a basis for keeping evidence of compliance with law and regulations, and holding users and data managers accountable for their actions. The underlying SAML standard of Shibboleth mitigates spoofing threats (i.e., pretending to be someone else or faking invalid credentials) by exploiting standard and reliable technologies, such as encryption and digital signature of SAML messages [72] based on certificates following the X.509 standard [73], or the HTTPS protocol coupled with the TLS layer [74]. Restricting the session attributes that are distributed via Shibboleth can reinforce the protection against spoofing. It is important that the participating applications use the same security protocols (as BBMRI Hub, REMS and BioSD do). More general countermeasures have been applied to the pilot’s underlying infrastructure. For instance, redundant web server architectures and firewall-based IP-filtering have been deployed to both ensure reliability of the services and minimise the risk of denial-of-service attacks (DoS [75]). Using logging facilities and making authentication mandatory allows for user accountability and non-repudiation (this must be done according to the local laws, e.g., ensuring periodic deletion of older entries). Adopting the best software engineering practices is another general precaution that limits security and privacy risks. For example, application configurations are carefully managed, so that unsafe settings (e.g., too liberal access rights, clear-text passwords) do not compromise security or data protection. As another example, prevention of code injection attacks [76] and thorough testing [77, 78] give reasonable protection against many threats.

Regarding the threats identified by the LINDDUN approach, while the pilot doesn’t address data anonymisation and identifiability issues, this is delegated to the data management policies defined at the level of local biobanks, the managers of which are responsible for collecting informed consent documentation from patients. This is eased by the functionality available in REMS, which a data access committee can use to match the consent given by the patient to specific data uses according to the researcher commitments.

Having components grouped in an identity federation improves user reliability, thanks to the fact that their identities are verified by mutually trusted organisations. Further restrictions would be possible, such as preventing data from leaving a given IT network (hardware-level encryption [79] could be one way to realise it).

As mentioned above, data access agreements helps in balancing the advances that are achievable from access to a wealth of biological data data with the ELSI needs. Because of that, it is important that the process of granting access to data and monitoring the access once it is approved rely on efficient and seamless tools. The approach used by the pilot has several advantages: the kind of formal commitment that one needs to use a data set is clearly associated to the data: the electronic management of the interaction between DACs and requestors is more efficient than the exchange of physical paperwork and makes it easier to keep track of who has given access to who, what and for which purpose. In turn, this facilitates the procedures to make data accessors accountable for their activities. Moreover, one can leverage systems like REMS to improve the circulation of data access approval processes, including the conditions upon which such approval is granted. This can extend to trial participants and the general public, which, in turn, can improve accountability of and trust in the scientific community, often an important point in collaborating with the public for the purpose of obtaining study data.

While not in the scope of this paper, it is worth to mention that the adoption of systems similar to the pilot has an economical impact on the management of research and clinical practice. In fact, using open source components, some of which might already be in place in many organisations, has the potential for cost reduction, as well as better control over the technology that is being deployed. Furthermore, signing data use agreements to clarify commercial aspects in the early stages of a research activity can prevent disputes over the right of researchers to publish results based on third party data, or the interest in exploiting data for patenting and regulatory purposes.

The problem of common released attributes

A well known, mostly social problem in digital identity management is the need for every organisation participating in an identity federation to agree on a common set of attributes that their IdPs should release, so that the applications (SPs) can verify a user and the associated entitlements to resources (as in the case of REMS entitlements). The general scenario is such that each of the N IdPs in the federation must distribute the attributes required by every of the M SPs, with a different set of attributes for each of the N*M pairs, and a corresponding number of negotiations, documents to sign, etc. While we did not have many parties in the pilot, we suggest to deal with this problem in a production-grade infrastructure by means of a proxy agent between IdPs and SPs. The proxy behaves as a SP for IdPs and as an IdP for the SPs. This way only M negotiations have to be made on the attributes needed by SPs, and further N agreements are made with the IdPs, regarding which attributes they will release to the (trusted) proxy. This simplifies and reduces the problem to the order of N + M. The ELIXIR-EXCELERATE project [66] is deploying a solution based on this approach. It is worth to mention that we have not addressed other related issues, for instance: a) the fact that organisations tend to be conservative on the release of user attributes, due to concerns about the personal information laws [80], b) the lack of standardisation in attribute names and semantics [81]. The proxy approach would help mitigate the impact of such issues, by uniforming the attributes that the proxy releases, and by helping the participating organisations with dealing with the legal issues.

Related work

Many different approaches and systems are used for tackling the aims and issues we have addressed in the pilot. Biological material repositories similar to BioSD exist, varying in scope [82, 83], geographical reference area [84] and scale [85, 86]. BioSD is mainly a European reference resource for public biosample data and metadata. A similar variety exists in the arena of clinical data resources [87]. In this field, the LPC Catalogue is among the most prominent biobank catalogues in Europe, while a wide range of biobanks with different scales and scopes exist [88]. Several technologies and approaches are available to manage identities and application access rights [2732]. For instance, commercial systems like OpenID [89] tend to prefer technical simplicity over advanced features (e.g., identity federation is not a standard feature within OpenID). We have chosen Shibboleth for multiple reasons: it is reliable software based on the SAML standard, it is well-known among research organisations, and the organisations involved in the pilot were already using Shibboleth when we started our work. Permission and access management is an issue wider than technology, which encompasses IT solutions, policies like access audits and new personnel checking and regulatory compliance [16, 90] The access control used in REMS can be seen as a variant of a lists-based access control approach (ACL [91]). Compared to similar products [9294], REMS is focused on granting resource access based on the commitment to a data access agreement, and the final approval from personnel with the data access control role. Moreover, REMS allows for the definition of workflows to obtain and finalise the access approval procedures, and it logs the actions during the execution of these workflows. Finally, both REMS and the other components we have used are modular and can be composed into a larger system (e.g., with respect to the distribution of identities). While one might prefer simpler options on a smaller scale [95], our approach gives the flexibility to implement larger infrastructures with existing common technologies. The approach used in the pilot does not address the further data protection that is often ensured by establishing different data access levels (e.g., original patient records, de-identified/obfuscated data, aggregated data, disclosure of only summary statistics, computed at the source of data [96]) and by classifying users based on user trustworthiness [97, 98]. The pilot approach is agnostic with respect to the resource that is controlled and the specific protection mechanism that this has in place, which is made possible by the fact that both Shibboleth and REMS essentially see a resource as a reference, such as a URL to a web application or a web link to a file download. For instance, one might adopt our approach for mediating access to resources providing data summaries in ways similar to the BBMRI [98, 99], as well as in case of resources that grant access to web services [100] and local computations [96].

The pilot in the context of data access frameworks

In life science increasingly medical data have to be effectively accessed and linked. This expanding volume of human data is stored in various databases, repositories, and patient registries, while protecting data privacy and the legitimate interests of patients as well as data subjects. Regarding the purpose of ensuring protection of human data while enabling data sharing, several approaches have been suggested that range from the creation of a political framework in the form of resolutions or treaties, to operational guidelines for data sharing [101]. Such frameworks include concepts like legitimate public health purpose, minimum information necessary, privacy and security standards, data use agreements [102], ethical codes like the IMIA (International Medical Informatics Association) Code of Ethics for Health Information Professionals [103] and AMIA’s (American Medical Informatics Association) Code of Professional and Ethical Conduct, guidance for genomic data, and potential privacy risks [104]. More concrete approaches are a human rights-based system for an international code of conduct for genomic and clinical data sharing [105], recommendations about clinical databases and privacy protections [106], and healthcare privacy protection based on differential privacy-preserving methods (iDASH, integrating Data for Analysis, Anonymization, and Sharing) [107, 108].

Genetic sequence databases are an important part of many biomedical research efforts and contained in many data repositories and biosamples databases. However, human genetic data should only be made available if it can be protected so that the privacy of data subjects is not revealed. The problem is that individual genomic sequence data (e.g. SNPs) are potentially “identifiable” using common identifiers [106, 109, 110]. In biobanking many new population biobanks and cohort studies were created to produce information about possible associations between genotype and phenotype, an association that is important to understand the causes of diseases. Together with BBMRI, different initiatives exist that address the protection of data privacy and that further the standardization and harmonization of data management of genomic data and the sharing of data and biosamples, for example: Public Population Project in Genomics (P3G [111]), International Society for Biological and Environmental Repositories (ISBER [112]), Biobank Standardisation and Harmonisation for Research Excellence projects [113] and the Electronic Medical Records and Genomics (eMERGE) Network [11, 114].

The constraints arising from limitations defined by the informed consent of the data subject have to be reflected in data access agreements and data transfer agreements. In general, the rule applies that data can only be made available to the extent that is allowed under the local legal requirements relevant for the data provider including ethics votes, vote by data access committee and the consent by the data subject. Data sharing should be an important part of an overall data management plan, which is a key element to support data access and sustainability. A data sharing agreement should supplement and not supplant the data management plan because the sharing agreement is about relationship building and trust building. It supports the long term planning and finding ways to maximize the use of data.

Anonymisation is becoming increasingly more difficult to achieve due to the increase in health data such as genomic data that is potentially identifying. As mentioned above, although anonymisation is protecting the privacy needs of the data subjects, it is an imperfect solution and must be supplemented by additional solutions that build trust and prevent researchers from trying to identify study subjects. In the end, what is necessary for research is a culture of responsibility and data governance when dealing with human data. Building blocks that support and strengthen such culture are data sharing agreements, strict authentication and authorisation methods and the monitoring and tracking of data usage. The created pilot fits into such efforts, because, by using and combining several open source components, it created an efficient authentication and authorisation framework for the access to sensitive data that can support efforts for trust building. The pilot must be seen in connection with the creation of a European Open Science Cloud, a federated environment for scientific data sharing and reuse, based on existing and emerging elements [115]. The complexity of current data sharing practices requires new mechanisms that are more flexible and adjustable and are employing proven components, like the open source authentication components of the pilot.

Possible future developments

Ethical, legal and social implications

As already mentioned above, ethical, legal and social implications (ELSI) are of utmost importance when dealing with management of human health data [1316]. The BioMedBridges project has extensively worked on such issues and the associated software tools [3942]. In a scenario like the one presented above, there are several components and processes where such tools could be integrated. To guide researchers with no extensive legal knowledge through the relevant legal requirements, the Legal Assessment Tool (LAT) was developed in BioMedBridges [116]. LAT provides researchers with an online, interactive selection process to characterise the involved types of data and databases and provides suitable requirements and recommendations for concrete data access and sharing situations. Links to the LAT [117] were added to the BBMRI Hub, in order to guide data managers when assessing the data sharing policies that should be adopted for the data sets managed in the system, as well as the implications of granting access to them. The Human Sample Exchange Regulation Navigator (hSERN), a web resource about legal aspects involved in exchanging human information [118], is another resource that would be useful to both biobank providers and REMS users having the DAC role. The BBMRI Legal Wiki [119] is a similar resource with an EU perspective, which could be useful when data need to be exchanged across EU member countries. The International Policy interoperability and data Access Clearinghouse (IPAC [120]), a tool serving information about policy interoperability on international level, could provide more direct help to the members of DACs who need to craft forms within REMS to be presented to users applying for dataset access. In fact, IPAC contains form templates reusable for such a purpose. Data sharing for research purposes must be opened for human health data, and these tools are means to clarify the conditions for data sharing. They can complement our pilot implementation of a system for restricted data access, providing each components with appropriate safeguards, restrictions and responsibilities and in this way supporting a culture of responsibility and data governance for the sharing of human data.

Batch and programmatic access to data

The pilot focuses on software components that interact with users via the web. Extensions for programmatic access that are inspired by our solution could be implemented relatively easily. For instance, if an approved user needs to access the BBMRI Hub from an application or a web service that (s)he is running (or such access is triggered by the main web application the user is interacting with), this component would work like a web browser, forwarding IdP and REMS-related requests. Shibboleth has sample implementations [121] to make a web service aware of the fact that a data request might return an IdP-related link and needs to be forwarded elsewhere. Unattended batch processing programs would work in a similar way, although they would likely need security reinforcement, for example by means of time-limited authentication tokens and key pairs [12]. A particular type of web service is represented by SPARQL endpoints to serve linked data [122124], which are increasingly important in life sciences, and which have been widely studied in BioMedBridges [37, 125]. In addition to considering this type of access just like any other web service and thus applying what we have outlined above, it would be worthwhile to consider more specific approaches, which analyse SPARQL queries to decide how to dispatch them across protected data repositories, on the basis of defined access policies [126128]. In the context of the pilot, such access policies could be provided to a federated query engine by integrating it with Shibboleth and REMS. As a final note, one should take into account the impact of these techniques on ELSI, e.g., it might be the case that the law requires explicit consent for sending data to a third party component, such as a web service.

Conclusion

Protected access to digital resources related to translational research is a significant challenge that encompasses technology, law, ethics and society, and the importance of this for translational research is growing. In the work presented we have shown an approach to face this challenge, based on open, common components and standards. In addition to showing the feasibility of such an approach, our pilot for secure biomedical data access can be a reference for similar data access use cases and can offer useful experience and lessons learned for researchers confronted with similar data protection needs. Moreover, it encourages researchers to use open source components as the basis to integrate ELSI tools into data management software, as well as for developing more complex usage scenarios, such as data access based on web services and linked data technologies. The pilot can be a model for researchers who want to use readily available open source modules to create a solution for the handling of sensitive data. Compared to other solutions, our approach is simple yet effective, being focused on the authentication and authorisation problem, without dealing with the technical about the access to specific resources. This also means it is relatively easy to realise a pilot-like solution over components already in place (only some integration work is needed between those, Shibboleth and REMS, existing Shibboleth-based IdPs can be reused) and it is not required to deploy a new infrastructure, as it is the case for SHRINE [99] and i2b2-based systems [6, 98], caGRID [93] and DataSHIELD [96]. At the same time we delegate to systems like Honest Broker [100] advanced privacy enhancing techniques. The work between the research infrastructures that have participated in the pilot is continuing in CORBEL [65] and AARC [129] projects. In particular, similar production services are being implemented thanks to the funding provided by the EXCELERATE initiative.

Footnotes
1

http://www.ebi.ac.uk/biosamples/group/SAMEG299071. The list of all the data set records uploaded for the pilot are available at https://goo.gl/SVXZ3A.

 
2

Ibid.

 
3

This can be computed by means of the RDF/SPARQL endpoint, e.g., https://goo.gl/ti4S34

 

Abbreviations

BBMRI: 

Biobanks and Biomolecular Resources Research Infrastructure, related to the BBMRI-LPC project and LPC Catalogue (also named BBMRI Hub), see the main text

BioSD: 

European Biosamples Database (see the main text)

DAC: 

Data Access Commitee (see the main text and also: REMS). Institutional Review Board (IRB) is a commonly used term that represents a similar concept

Data de-identification The process of deriving more generic data from detailed sensitive and individual human data: 

e.g., through the removal of identifying information (name, address), by means of ranges (age 0–5 in place of precise birth dates), by means of aggregation (the number of patients aged 0–5, rather than individual records)

ELSI: 

Ethical, Legal and Social Implications. The kind of issues arising when dealing with human biomedical data

HTTPS: 

SSL, TLS, X.509, HTTPS refers to the World Wide Web protocol wrapped by some communication channel protection/encryption technology. TLS (Transport Layer Security) is a typical protocol to do so, which succeeded SSL (Secure Socket Layer). These protocols use the standard X.509 to deal with data encryption (i.e., to encode data in a way that they are only readable by a target recipient and, in the X.509 context, with the certainty of the data producer identity)

IdP: 

Identity Provider, a system like Shibboleth, used to manage user information and authentication in a network of organisations and IT applications

LINDDUN: 

Linkability, Identifiability, Non-repudiation, Detectability, Disclosure of information, the specific privacy-related threats addressed by the LINDDUN methodology to secure an IT system to access sensitive human data

REMS: 

Resource Entitlement Management System, which enables Data Access Commiteess (DAC) to administrate access to data resources (see the main text)

SAML: 

Security Assertion Markup Language, a standard XML-based format for exchanging authentication and authorization information between IT components. Used by the Shibboleth system (see)

Shibboleth: 

An identity management system based on the SAML standard (see the main text)

SP: 

Service Provider, an application that relies on an IdP (see) to manage user authentication and authorization. In the specific context of Shibboleth, a programming library that allows an application developer to realise SP functionality managed via Shibboleth

STRIDE: 

Spoofing, Tampering, Repudiation, Information Disclosure and Elevation of privileges, the threats addressed by the STRIDE methodology to secure an IT system

Declarations

Acknowledgements

Not applicable.

Funding

This work originated from and was funded by the BioMedBridges project (European Commission FP7 Capacities Specific Programme, grant agreement number 284209).

Availability of data and materials

Summaries about the data set used for the pilot are available at the web links reported in the article text. Detailed data, accessible via the BBMRI Hub by authorised users, are available upon request. Implementation files (e.g., configuration files) are available upon request. Some implementation details are reported in the BioMedBridges report related to the pilot, which is cited in the article.

Authors’ contributions

MB designed the pilot, together with OM, participated in its implementation, including the integration of BioSD in the pilot, wrote the first draft of the manuscript and related reports. OM worked on the implementation, especially the integration of Shibboleth. US and AB coordinated the work between the participating organisations and contributed to the design of the pilot. KK contributed to the design of the security architecture and the pilot, as well as continuously discussed its development. FK provided expertise about the state of the art in the fields of security and privacy, and participated in the design and implementation of the pilot, including the integration of an adapted instance of the LPC Catalogue. RB and HS worked on the integration of the LPC Catalogue. TM, ML and TN provided expertise about REMS and contributed with its integration in the pilot. IL contributed to leveraging previous work about integration of REMS into the European Genome-phenome Archive (EGA). WK and CO contributed to the legal background, especially the influence of data protection regulations on access policies. MB, BCR, WK, CO have contributed to the manuscript and the related bibliographical research. All authors have reviewed and approved the final version of the manuscript.

Competing interests

The authors declare that they have no competing interests.

Consent for publication

Not applicable. The demonstration data we have used for the pilot are not real.

Ethics approval and consent to participate

Not applicable, same reasons as the previous item.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated.

Authors’ Affiliations

(1)
European Molecular Biology Laboratory, European Bioinformatics Institute (EMBL-EBI), Wellcome Trust Genome Campus
(2)
Chair of Medical Informatics, Institute of Medical Statistics and Epidemiology, University Medical Center rechts der Isar, Technical University of Munich
(3)
Heinrich-Heine Universität Düsseldorf, Coordination Centre for Clinical Trials
(4)
European Clinical Research Infrastructure Network (ECRIN)
(5)
CSC - IT Center for Science Ltd

References

  1. Woolf SH. The meaning of translational research and why it matters. JAMA. 2008;299:211–3.PubMedGoogle Scholar
  2. Cohrs RJ, Tyler M, Parviz G, Luc B, Higgins PJ, Aamir S. Translational medicine definition by the european society for translational medicine. New Horizons Transl Med. 2015;2:86–8.View ArticleGoogle Scholar
  3. Chute CG, Ullman-Cullere M, Wood GM, Lin SM, He M, Pathak J. Some experiences and opportunities for big data in translational research. Genet Med. 2013;15:802–9.View ArticlePubMedPubMed CentralGoogle Scholar
  4. Collins FS. Reengineering translational science: the time is right. Sci Transl Med. 2011;3:90cm17.View ArticlePubMedPubMed CentralGoogle Scholar
  5. Beck T, Tim B, Sirisha G, Søren B, Norbert G, Lemke HU, et al. Knowledge engineering for health: a new discipline required to bridge the ‘ICT gap’ between research and healthcare. Hum Mutat. 2012;33:797–802.View ArticlePubMedGoogle Scholar
  6. Murphy SN, Mendis M, Hackett K, Kuttan R, Pan W, Phillips LC, et al. Architecture of the open-source clinical research chart from Informatics for Integrating Biology and the Bedside. AMIA Annu Symp Proc. 2007. p 548–52. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC2655844/.
  7. Mello MM, Francer JK, Wilenzick M, Teden P, Bierer BE, Barnes M. Preparing for responsible sharing of clinical trial data. N Engl J Med. 2013;369:1651–8.View ArticlePubMedGoogle Scholar
  8. Melander H, Ahlqvist-Rastad J, Meijer G, Beermann B. Evidence b (i) ased medicine—selective reporting from studies sponsored by pharmaceutical industry: review of studies in new drug applications. BMJ Br Medical J Publ Group. 2003;326:1171–3.View ArticleGoogle Scholar
  9. Gøtzsche PC. Why we need easy access to all data from all clinical trials and how to accomplish it. Trials. 2011;12:249.View ArticlePubMedPubMed CentralGoogle Scholar
  10. Safran C, Bloomrosen M, Hammond WE, Labkoff S, Markel-Fox S, Tang PC, et al. Toward a national framework for the secondary use of health data: an american medical informatics association white paper. J Am Med Inform Assoc. 2007;14:1–9.View ArticlePubMedPubMed CentralGoogle Scholar
  11. McGuire AL, Basford M, Dressler LG, Fullerton SM, Koenig BA, Li R, et al. Ethical and practical challenges of sharing data from genome-wide association studies: the eMERGE consortium experience. Genome Res. 2011;21:1001–7.View ArticlePubMedPubMed CentralGoogle Scholar
  12. Hardison RC. Comparative genomics. PLoS Biol. 2003;1:E58.View ArticlePubMedPubMed CentralGoogle Scholar
  13. Herring J. Medical Law and ethics. USA: Oxford University Press; 2014.View ArticleGoogle Scholar
  14. Chadwick R, Levitt M, Shickle D. The Right to Know and the Right Not to Know: Genetic Privacy and Responsibility. Cambridge: Cambridge University Press; 2014.Google Scholar
  15. Appari A, Ajit A, Johnson ME. Information security and privacy in healthcare: current state of research. Int J Internet Enterp Manag. 2010;6:279.View ArticleGoogle Scholar
  16. Fernández-Alemán JL, Señor IC, Lozoya PÁO, Ambrosio T. Security and privacy in electronic health records: a systematic literature review. J Biomed Inform. 2013;46:541–62.View ArticlePubMedGoogle Scholar
  17. Moolchan ET, Mermelstein R. Research on tobacco use among teenagers: ethical challenges. J Adolesc Health. 2002;30:409–17.View ArticlePubMedGoogle Scholar
  18. Harding A, Harper B, Stone D, O’Neill C, Berger P, Harris S, et al. Conducting research with tribal communities: sovereignty, ethics, and data-sharing issues. Environ Health Perspect. 2012;120:6–10.View ArticlePubMedGoogle Scholar
  19. Weiss MG, Ramakrishna J, Somma D. Health-related stigma: rethinking concepts and interventions. Psychol Health Med. 2006;11:277–87.View ArticlePubMedGoogle Scholar
  20. Cook JE, Purdie-Vaughns V, Meyer IH, Busch JTA. Intervening within and across levels: a multilevel approach to stigma and public health. Soc Sci Med. 2014;103:101–9.View ArticlePubMedGoogle Scholar
  21. Clayton EW. Ethical, legal, and social implications of genomic medicine. N Engl J Med. 2003;349:562–9.View ArticlePubMedGoogle Scholar
  22. Collier J, Iheanacho I. The pharmaceutical industry as an informant. Lancet. 2002;360:1405–9.View ArticlePubMedGoogle Scholar
  23. Doshi P, Jefferson T, Del Mar C. The imperative to share clinical study reports: recommendations from the tamiflu experience. PLoS Med. 2012;9:e1001201.View ArticlePubMedPubMed CentralGoogle Scholar
  24. Kamm L, Bogdanov D, Laur S, Vilo J. A new way to protect privacy in large-scale genome-wide association studies. Bioinformatics. 2013;29:886–93.View ArticlePubMedPubMed CentralGoogle Scholar
  25. Hoffman S, Podgurski A. Balancing privacy, autonomy, and scientific needs in electronic health records research. 2011.Google Scholar
  26. Broeder D, Jones B, Kelsey D, Kershaw P, Lüders S, Lyall A, et al. Federated identity management for research collaborations. CERN; 2013. http://cds.cern.ch/record/1442597/files/CERN-OPEN-2012-006.pdf. Accessed 16 Mar 2017.
  27. Bertino E, Takahashi K. Identity Management: Concepts, Technologies, and Systems. Boston: Artech House; 2011.Google Scholar
  28. Kunz M, Michael K, Matthias H, Ludwig F, Michael N, Gunther P. Analyzing recent trends in enterprise identity management. 2014 25th international workshop on database and expert systems applications. 2014. http://dx.doi.org/10.1109/dexa.2014.62. Accessed 16 Mar 2017.Google Scholar
  29. Kalloniatis C, Christos K, Haralambos M, Manousakis V, Shareeful I, Stefanos G, et al. Towards the design of secure and privacy-oriented information systems in the cloud: identifying the major concepts. Comput Stand Interfaces. 2014;36:759–75.View ArticleGoogle Scholar
  30. Fabian B, Benjamin F, Tatiana E, Philipp J. Collaborative and secure sharing of healthcare data in multi-clouds. Inf Syst. 2015;48:132–50.View ArticleGoogle Scholar
  31. Falcão-Reis F, Costa-Pereira A, Correia ME. Access and privacy rights using web security standards to increase patient empowerment. Stud Health Technol Inform. 2008;137:275–85.PubMedGoogle Scholar
  32. AL Faresi A, Duminda W, Khaled M. A comprehensive privacy-aware authorization framework founded on HIPAA privacy rules. Proceedings of the ACM international conference on health informatics - IHI’10. 2010. http://dx.doi.org/10.1145/1882992.1883093. Accessed 16 Mar 2017.Google Scholar
  33. Field L, Stephanie S, Jon I, Wittenburg P, Los W, Broeder D, Hardisty A, Repo S, Jenkinson A. Realising the full potential of research data: common challenges in data management, sharing and integration across scientific disciplines. 2013. http://dx.doi.org/10.5281/zenodo.7636. Accessed 16 Mar 2017.Google Scholar
  34. Suhr S, Cochrane G, Stanford NJ, Boiten J-W, Swedlow J, Morris C, et al. BioMedBridges workshop on e-infrastructure support for the life sciences – preparing for the data deluge. 2014. http://dx.doi.org/10.5281/zenodo.13942. Accessed 16 Mar 2017.Google Scholar
  35. ELIXIR, EU-OPENSCREEN, BBMRI, EATRIS, ECRIN, INFRAFRONTIER, et al. Principles of data management and sharing at European Research Infrastructures. http://dx.doi.org/10.5281/zenodo.8304. . Accessed 16 Mar 2017.
  36. European Strategy Forum on Research Infrastructures. http://ec.europa.eu/research/infrastructures/index_en.cfm?pg=esfri. Accessed 13 Feb 2017.
  37. Burdett T, Parkinson H, Juty N, Liener T, Conte N, Brandizi M, et al. BioMedBridges: Harmonisation of semantic standards supporting use cases from WP7 and WP10, report. BioMedBridges; 2016. http://dx.doi.org/10.5281/zenodo.45920. Accessed 16 Mar 2017.
  38. BioMedBridges Deliverables. http://www.biomedbridges.eu/deliverables. Accessed 13 Feb 2017.
  39. Brandizi M, Melnichuk O, Sarkans U, Bild R, Kohlmayer F, Rodriguez-Castro B, et al. BioMedBridges: Implementation of a pilot for the security framework. BioMedBridges Project; 2016. http://dx.doi.org/10.5281/zenodo.45927. Accessed 16 Mar 2017.
  40. Bild R, Kohlmayer F, Brunner S, Kuhn K, Rodriguez-Castro B, Lamichhane A, et al. BioMedBridges security architecture and framework. BioMedBridges; 2014. http://dx.doi.org/10.5281/zenodo.11953. Accessed 16 Mar 2017.
  41. Report on regulations, privacy and security requirements. BioMedBridges; 2013. http://www.biomedbridges.eu/deliverables/51-0. Accessed 16 Mar 2017.
  42. Tool for assessment of regulatory and ethical requirements; including supportive documents. BioMedBridges; 2013. http://www.biomedbridges.eu/deliverables/52-0. Accessed 16 Mar 2017.
  43. Gostev M, Faulconbridge A, Brandizi M, Fernandez-Banet J, Sarkans U, Brazma A, et al. The BioSample database (BioSD) at the european bioinformatics institute. Nucleic Acids Res. 2012;40:D64–70.View ArticlePubMedGoogle Scholar
  44. Faulconbridge A, Burdett T, Brandizi M, Gostev M, Pereira R, Vasant D, et al. Updates to BioSamples database at european bioinformatics institute. Nucleic Acids Res. 2014;42:D50–2.View ArticlePubMedGoogle Scholar
  45. Kolesnikov N, Hastings E, Keays M, Melnichuk O, Tang YA, Williams E, et al. ArrayExpress update--simplifying data submissions. Nucleic Acids Res. 2015;43:D1113–6.View ArticlePubMedGoogle Scholar
  46. Vizcaíno JA, Csordas A, Del-Toro N, Dianes JA, Griss J, Lavidas I, et al. 2016 update of the PRIDE database and its related tools. Nucleic Acids Res. 2016;44:D447–56.View ArticlePubMedGoogle Scholar
  47. Forbes SA, Beare D, Gunasekaran P, Leung K, Bindal N, Boutselakis H, et al. COSMIC: exploring the world’s knowledge of somatic mutations in human cancer. Nucleic Acids Res. 2014;43:D805–11.View ArticlePubMedPubMed CentralGoogle Scholar
  48. BBMRI-ERIC. http://www.bbmri-eric.eu. Accessed 13 Feb 2017.
  49. BBMRI-LPC Project. http://www.bbmri-lpc.org. Accessed 14 Feb 2017.
  50. BBMRI-LPC Biobanks. http://www.bbmri-lpc-biobanks.eu/cataloque.html. Accessed 14 Feb 2017.
  51. Norlin L, Fransson MN, Eriksson M, Merino-Martinez R, Anderberg M, Kurtovic S, et al. A minimum data Set for sharing biobank samples, information, and data: MIABIS. Biopreserv Biobank. 2012;10:343–8.View ArticlePubMedGoogle Scholar
  52. BBMRI BMB Prototype. https://shibboleth.imse.med.tum.de. Accessed 14 Feb 2017.
  53. Resource Entitlement Management System (REMS). https://confluence.csc.fi/display/REMS/Home. Accessed 14 Feb 2017.
  54. Linden M, Nyrönen T, Lappalainen I. Resource entitlement management system. 2013. http://tnc2013.terena.org/getfile/870. Accessed 16 Mar 2017.Google Scholar
  55. Lappalainen I, Almeida-King J, Kumanduri V, Senf A, Spalding JD, Ur-Rehman S, et al. The european genome-phenome archive of human data consented for biomedical research. Nat Genet. 2015;47:692–5.View ArticlePubMedGoogle Scholar
  56. Shibboleth. http://shibboleth.net. Accessed 16 Feb 2017.
  57. SAML Specifications. http://saml.xml.org/saml-specifications. Accessed 14 Feb 2017.
  58. LIMPOPO SampleTAB Parser. https://github.com/EBIBioSamples/limpopo-sampletab. Accessed 14 Feb 2017.
  59. The BioSD Relational Database Loader. https://github.com/EBIBioSamples/biosd_model_load. Accessed 14 Feb 2017.
  60. Pavelin K, Cham JA, de Matos P, Brooksbank C, Cameron G, Steinbeck C. Bioinformatics meets user-centred design: a perspective. PLoS Comput Biol. 2012;8:e1002554.View ArticlePubMedPubMed CentralGoogle Scholar
  61. SYMPOSIUM: Open bridges for life science data. http://www.biomedbridges.eu/news/symposium-open-bridges-life-science-data. Accessed 14 Feb 2017.
  62. BioSD Feature Annotator. https://github.com/EBIBioSamples/biosd_feature_annotator. Accessed 14 Feb 2017.
  63. Kuhn KA, Bild R, Anton G, Schuffenhauer S, Wichmann H-E. Connecting biobanks of large european cohorts (EU project BBMRI-LPC). Bundesgesundheitsblatt Gesundheitsforschung Gesundheitsschutz. 2016;59:385–9.View ArticlePubMedGoogle Scholar
  64. Shibboleth, Load Testing Contributed Results. https://wiki.shibboleth.net/confluence/display/IDP30/Load+Testing+Contributed+Results. Accessed 14 Feb 2017.
  65. Auffray C, Balling R, Barroso I, Bencze L, Benson M, Bergeron J, et al. Making sense of big data in health research: towards an EU action plan. Genome Med. 2016;8:71.View ArticlePubMedPubMed CentralGoogle Scholar
  66. Introduction to ELIXIR-EXCELERATE. https://www.elixir-europe.org/events/introduction-elixir-excelerate. Accessed 14 Feb 2017.
  67. Crosswell LC, Thornton JM. ELIXIR: a distributed infrastructure for european biological data. Trends Biotechnol. 2012;30:241–2.View ArticlePubMedGoogle Scholar
  68. CORBEL, Participating Research Infrastructures. http://www.corbel-project.eu/participants.html. Accessed 14 Feb 2017.
  69. Blomberg N. ELIXIR Webinar - Introduction to ELIXIR-EXCELERATE. 2015. https://www.youtube.com/watch?v=M3OfkAG23Kk. Accessed 14 Feb 2017.
  70. Authentication and Authorisation for Research and Collaboration. https://aarc-project.eu. Accessed 14 Feb 2017.
  71. Deng M, Mina D, Kim W, Riccardo S, Bart P, Wouter J. A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requir Eng. 2010;16:3–32.View ArticleGoogle Scholar
  72. Gross T. Security analysis of the SAML single sign-on browser/artifact profile. Computer security applications conference, 2003. Proceedings. 19th annual. 2003. p. 298–307.Google Scholar
  73. Recommendation X. 509-the directory: public-key and attribute certificate frameworks. International telecommunication union. 2000. http://www.itu.int/rec/T-REC-X.509. Accessed 16 Mar 2017.Google Scholar
  74. Rescorla E. Http over tls. 2000. http://tools.ietf.org/html/rfc2818.html. Accessed 16 Mar 2017.View ArticleGoogle Scholar
  75. Chang RKC. Defending against flooding-based distributed denial-of-service attacks: a tutorial. IEEE Commun Mag. 2002;40:42–51.View ArticleGoogle Scholar
  76. Su Z, Zhendong S, Gary W. The essence of command injection attacks in web applications. Conference record of the 33rd ACM SIGPLAN-SIGACT symposium on principles of programming languages - POPL’06. 2006. http://dx.doi.org/10.1145/1111037.1111070. Accessed 16 Mar 2017.Google Scholar
  77. Potter B, McGraw G. Software security testing. IEEE Secur Privacy Mag. 2004;2:81–5.View ArticleGoogle Scholar
  78. Myers GJ, Sandler C, Badgett T. The Art of Software Testing. Hoboken: Wiley; 2011.Google Scholar
  79. Löhr H, Hans L, Ahmad-Reza S, Marcel W. Securing the e-health cloud. Proceedings of the ACM international conference on health informatics - IHI’10. 2010. http://dx.doi.org/10.1145/1882992.1883024. Accessed 16 Mar 2017.Google Scholar
  80. Release Attributes… For Science!. https://refeds.org/a/1154. Accessed 14 Feb 2017.
  81. REFEDs ePSA usage comparison v0.13. https://blog.refeds.org/wp-content/uploads/2015/05/ePSAcomparison_0_13.pdf. Accessed 14 Feb 2017.
  82. Cerami E, Gao J, Dogrusoz U, Gross BE, Sumer SO, Aksoy BA, et al. The cBio cancer genomics portal: an open platform for exploring multidimensional cancer genomics data. Cancer Discov. 2012;2:401–4.View ArticlePubMedGoogle Scholar
  83. Bamford S, Dawson E, Forbes S, Clements J, Pettett R, Dogan A, et al. The COSMIC (catalogue of somatic mutations in cancer) database and website. Br J Cancer. 2004;91:355–8.PubMedPubMed CentralGoogle Scholar
  84. Barrett T, Clark K, Gevorgyan R, Gorelenkov V, Gribov E, Karsch-Mizrachi I, et al. BioProject and BioSample databases at NCBI: facilitating capture and organization of metadata. Nucleic Acids Res. 2012;40:D57–63.View ArticlePubMedGoogle Scholar
  85. Splendiani A, Gündel M, Austyn JM, Cavalieri D, Scognamiglio C, Brandizi M. Knowledge sharing and collaboration in translational research, and the DC-THERA directory. Brief Bioinform. 2011;12:562–75.View ArticlePubMedPubMed CentralGoogle Scholar
  86. Vasilevsky N, Johnson T, Corday K, Torniai C, Brush M, Segerdell E, et al. Research resources: curating the new eagle-i discovery system. Database. 2012;2012:bar067.View ArticlePubMedPubMed CentralGoogle Scholar
  87. Canuel V, Rance B, Avillach P, Degoulet P, Burgun A. Translational research platforms integrating clinical and omics data: a review of publicly available solutions. Brief Bioinform. 2015;16:280–90.View ArticlePubMedGoogle Scholar
  88. Vaught J, Kelly A, Hewitt R. A review of international biobanks and networks: success factors and key benchmarks. Biopreserv Biobank. 2009;7:143–50.View ArticlePubMedPubMed CentralGoogle Scholar
  89. Recordon D, Reed D. OpenID 2.0: a platform for user-centric identity management. Proceedings of the second ACM workshop on digital identity management. New York: ACM; 2006. p. 11–6.Google Scholar
  90. Kwon J, Johnson ME. Security practices and regulatory compliance in the healthcare industry. J Am Med Inform Assoc. 2013;20:44–51.View ArticlePubMedGoogle Scholar
  91. Barkley J. Comparing simple role based access control models and access control lists. Proceedings of the second ACM workshop on Role-based access control. Fairfax: ACM; 1997. p. 127–32.Google Scholar
  92. Røstad L. Access control in healthcare information systems. Trondheim: Norwegian University of Science and Technology; 2008.Google Scholar
  93. Oster S, Langella S, Hastings S, Ervin D, Madduri R, Phillips J, et al. caGrid 1.0: an enterprise Grid infrastructure for biomedical research. J Am Med Inform Assoc. 2008;15:138–49.View ArticlePubMedPubMed CentralGoogle Scholar
  94. Kho AN, Hynes DM, Goel S, Solomonides AE, Price R, Hota B, et al. CAPriCORN: Chicago area patient-centered outcomes research network. J Am Med Inform Assoc. 2014;21:607–11.View ArticlePubMedPubMed CentralGoogle Scholar
  95. Razick S, Močnik R, Thomas LF, Ryeng E, Drabløs F, Sætrom P. The eGenVar data management system--cataloguing and sharing sensitive data and metadata for the life sciences. Database. 2014;2014:bau027.View ArticlePubMedPubMed CentralGoogle Scholar
  96. Murtagh MJ, Demir I, Jenkings KN, Wallace SE, Murtagh B, Boniol M, et al. Securing the data economy: translating privacy and enacting security in the development of DataSHIELD. Public Health Genomics. 2012;15:243–53.View ArticlePubMedGoogle Scholar
  97. Malin BA, Emam KE, O’Keefe CM. Biomedical data privacy: problems, perspectives, and recent advances. J Am Med Inform Assoc. 2013;20:2–6.View ArticlePubMedPubMed CentralGoogle Scholar
  98. Murphy SN, Gainer V, Mendis M, Churchill S, Kohane I. Strategies for maintaining patient privacy in i2b2. J Am Med Inform Assoc. 2011;18 Suppl 1:103–8.View ArticleGoogle Scholar
  99. McMurry AJ, Murphy SN, MacFadden D, Weber G, Simons WW, Orechia J, et al. SHRINE: enabling nationally scalable multi-site disease studies. PLoS One. 2013;8:e55811.View ArticlePubMedPubMed CentralGoogle Scholar
  100. Boyd AD, Saxman PR, Hunscher DA, Smith KA, Morris TD, Kaston M, et al. The university of Michigan honest broker: a Web-based service for clinical and translational research and practice. J Am Med Inform Assoc. 2009;16:784–91.View ArticlePubMedPubMed CentralGoogle Scholar
  101. van Panhuis WG, Paul P, Emerson C, Grefenstette J, Wilder R, Herbst AJ, et al. A systematic review of barriers to data sharing in public health. BMC Public Health. 2014;14:1144.View ArticlePubMedPubMed CentralGoogle Scholar
  102. Lee LM, Gostin LO. Ethical collection, storage, and use of public health data: a proposal for a national privacy protection. JAMA. 2009;302:82–4.View ArticlePubMedGoogle Scholar
  103. IMIA. Code of ethics – updated version. 2016. http://imia-medinfo.org/wp/imia-code-of-ethics. Accessed 14 Feb 2017.Google Scholar
  104. Goodman KW, Adams S, Berner ES, Embi PJ, Hsiung R, Hurdle J, et al. AMIA’s code of professional and ethical conduct. J Am Med Inform Assoc. 2013;20:141–3.View ArticlePubMedPubMed CentralGoogle Scholar
  105. Knoppers BM, Harris JR, Budin-Ljøsne I, Dove ES. A human rights approach to an international code of conduct for genomic and clinical data sharing. Hum Genet. 2014;133:895–903.View ArticlePubMedPubMed CentralGoogle Scholar
  106. Malin B, Karp D, Scheuermann RH. Technical and policy approaches to balancing patient privacy and data sharing in clinical and translational research. J Investig Med. 2010;58:11–8.View ArticlePubMedPubMed CentralGoogle Scholar
  107. Yu F, Ji Z. Scalable privacy-preserving data sharing methodology for genome-wide association studies: an application to iDASH healthcare privacy protection challenge. BMC Med Inform Decis Mak. 2014;14 Suppl 1:S3.View ArticlePubMedGoogle Scholar
  108. Jiang X, Zhao Y, Wang X, Malin B, Wang S, Ohno-Machado L, et al. A community assessment of privacy preserving techniques for human genomes. BMC Med Inform Decis Mak. 2014;14 Suppl 1:S1.View ArticlePubMedGoogle Scholar
  109. Lin Z, Owen AB, Altman RB. Genetics. Genomic research and human subject privacy. Science. 2004;305:183.View ArticlePubMedGoogle Scholar
  110. Kaye J. The tension between data sharing and the protection of privacy in genomics research. Annu Rev Genomics Hum Genet. 2012;13:415–31.View ArticlePubMedPubMed CentralGoogle Scholar
  111. Public Population Project in Genomics and Society. http://www.p3g.org. Accessed 14 Feb 2017.
  112. International Society for Biological and Environmental Repositories. http://www.isber.org. Accessed 14 Feb 2017.
  113. BioSHaRE. http://www.bioshare.eu. Accessed 14 Feb 2017.
  114. Gottesman O, Kuivaniemi H, Tromp G, Faucett WA, Li R, Manolio TA, et al. The electronic medical records and genomics (eMERGE) network: past, present, and future. Genet Med. 2013;15:761–71.View ArticlePubMedPubMed CentralGoogle Scholar
  115. eMERGE Network. https://emerge.mc.vanderbilt.edu/. Accessed 14 Feb 2017.
  116. Kuchinke W, Krauth C, Bergmann R, Karakoyun T, Woollard A, Schluender I, et al. Legal assessment tool (LAT): an interactive tool to address privacy and data protection issues for data sharing. BMC Med Inform Decis Mak. 2016;16:1144.View ArticleGoogle Scholar
  117. Legal Assessment Tool (LAT). http://www.biomedbridges.eu/sharing-sensitive-data. Accessed 14 Feb 2017.
  118. Human Sample Exchange Regulation Navigator. http://www.hsern.eu/. Accessed 14 Feb 2017.
  119. BBMRI Legal WIKI. http://www.bbmri-wp4.eu/wiki/index.php/Main_Page. Accessed 14 Feb 2017.
  120. IPAC. http://p3g.org/ipac. Accessed 14 Feb 2017.
  121. Web Services Single Sign On with Shibboleth. https://www.predic8.com/shibboleth-web-services-sso-en.htm. Accessed 14 Feb 2017.
  122. Berners-Lee T, Tim B-L, James H, Ora L. The semantic Web. Sci Am. 2001;284:34–43.View ArticleGoogle Scholar
  123. Bizer C. The emerging Web of linked data. IEEE Intell Syst. 2009;24:87–92.View ArticleGoogle Scholar
  124. Bizer C, Christian B, Tom H, Tim B-L. Linked data - the story So Far. Int J Semant Web Inf Syst. 2009;5:1–22.Google Scholar
  125. McMurry J, Jupp S, Malone J, Burdett T, Jenkinson A, Parkinson H, et al. Report on the scalability of semantic web integration in BioMedBridges. BioMedBridges; 2015. http://dx.doi.org/10.5281/zenodo.14071. Accessed 16 Mar 2017.
  126. Villata S, Serena V, Nicolas D, Fabien G, Amelie G. An Access Control Model for Linked Data. Lect Notes Comput Sci. 2011. p. 454–63.Google Scholar
  127. Leida M, Marcello L, Andrej C. Distributed SPARQL query answering over RDF data streams. 2013 IEEE international congress on Big data. 2013. http://dx.doi.org/10.1109/bigdata.congress.2013.56. Accessed 16 Mar 2017.Google Scholar
  128. Schwarte A, Haase P, Hose K, Schenkel R, Schmidt M, et al. FedX: optimization techniques for federated query processing on linked data. In: Aroyo L, Welty C, Alani H, Taylor J, Bernstein A, Kagal L, editors. The semantic Web – ISWC 2011. Berlin: Springer Berlin Heidelberg; 2011. p. 601–16.View ArticleGoogle Scholar
  129. Biancini A, Florio L, Haase M, Hardt M, Jankowski M, Jensen J, et al. AARC: first draft of the blueprint architecture for authentication and authorisation infrastructures. ArXiv [cs.CR]. 2016. http://arxiv.org/abs/1611.07832. Accessed 16 Mar 2017.Google Scholar

Copyright

© The Author(s). 2017

Advertisement