Skip to content

Commit 0b47090

Browse files
author
Sven Twardziok
committed
use abbreviations and referneces
1 parent 2255d6c commit 0b47090

4 files changed

Lines changed: 19 additions & 22 deletions

File tree

Lines changed: 9 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
# Processing Sensitive Data
22

3-
Processing sensitive human data is fundamental to biomedical research, enabling breakthroughs in disease understanding, biomarker detection and treatment development.
4-
Rapid and secure access to such data accelerates research, but also introduces significant responsibilities for data protection and privacy.
3+
Processing sensitive human data is fundamental to biomedical research, enabling breakthroughs in disease understanding, biomarker discovery, and treatment development.
4+
Rapid and secure access to such data accelerates research but also introduces significant responsibilities for data protection and privacy.
55
Cloud-based services are increasingly used in biomedical research to connect researchers, data, and tools throughout the data lifecycle.
66
This page summarizes scenarios and requirements for handling sensitive data within the ELIXIR-on-Cloud framework.
77

@@ -10,13 +10,16 @@ This page summarizes scenarios and requirements for handling sensitive data with
1010
Sensitive data processing in research is governed by several legal frameworks, most notably the General Data Protection Regulation (GDPR) and the European Health Data Space (EHDS):
1111

1212
* **GDPR**: Allows the use of sensitive personal data for research when specific safeguards are in place. Processing is permitted in the public interest, provided measures such as data minimization, pseudonymization, and strict access controls are implemented. Explicit informed consent is often required, and a Data Protection Impact Assessment (DPIA) is strongly recommended.
13-
* **EHDS**: Builds on GDPR by establishing a unified framework for secure sharing and secondary use of electronic health data across the EU. Under EHDS, sensitive health data (e.g., genetic or clinical records) can be reused for research, innovation, and policy-making if anonymized or pseudonymized and accessed through secure processing environments (SPEs).
13+
* **EHDS**: Builds on GDPR by establishing a unified framework for secure sharing and secondary use of electronic health data across the EU. The EHDS is defined as "the first common EU data space dedicated to a specific sector, establishing a common framework for use and exchange of electronic health data across the EU" ([Regulation (EU) 2025/327](eur-lex-ehds)). The EHDS aims to improve individuals' access to their electronic health data and enable secondary use for research, innovation, policymaking, health threats preparedness, patient safety, and regulatory activities.
1414

1515
## Environments
1616

1717
* A Trusted Execution Environment (TEE) is a secure and isolated area within a computer system or processor that ensures the confidentiality and integrity of code and data during execution. It aims to protect sensitive computations and data from potential threats, such as malware or unauthorized access.
18-
* A Secure Processing Environment (SPE) is a controlled environment designed to facilitate secure data processing and analysis while maintaining confidentiality, integrity, and privacy. It focuses on secure processing techniques, often including encryption, secure computation, or secure enclaves, to protect data during computation.
19-
* A Trusted Research Environment (TRE) is a secure and controlled environment specifically tailored for research purposes, providing secure data access, analysis, collaboration, and compliance with legal and ethical requirements. TREs emphasize privacy preservation, data governance, collaboration, and knowledge generation while protecting sensitive data.
18+
* A Secure Processing Environment (SPE) is a controlled environment designed to facilitate secure data processing and analysis while maintaining confidentiality, integrity, and privacy. It focuses on secure processing techniques, often including encryption, secure computation, or secure enclaves, to protect data during computation. Under the EHDS regulation, sensitive health data (e.g., genetic or clinical records) can be reused for research, innovation, and policy-making if anonymized or pseudonymized and accessed through SPE ([Regulation (EU) 2025/327](eur-lex-ehds)).
19+
* A Trusted Research Environment (TRE) is a secure and controlled environment specifically tailored for research purposes, providing secure data access, analysis, collaboration, and compliance with legal and ethical requirements. TREs emphasize data governance, collaboration, and knowledge generation while ensuring privacy protection. For TREs, the **Five Safes framework** is particularly relevant as a comprehensive approach to data protection while enabling research access. This framework has been adopted by Health Data Research UK (HDR-UK), NIHR, and other major UK research institutions as the gold standard for balancing data protection with research utility ([What is the Five Safes framework?](ukdataservice-5-safes)).
20+
21+
!!! note "SPEs vs TREs"
22+
Secure Processing Environments (SPEs) and Trusted Research Environments (TREs) are conceptually very similar and serve comparable purposes in providing secure environments for sensitive data processing. The key difference lies in their regulatory and geographical context: SPEs are specifically required within the framework of the EHDS, while TREs are primarily a UK-developed concept and implementation approach.
2023

2124
### Similarities
2225

@@ -27,21 +30,6 @@ Sensitive data processing in research is governed by several legal frameworks, m
2730
* **Controlled Access and Authentication**: Authenticates code and data before execution to ensure only trusted and verified code runs.
2831
* **Collaboration and Analysis**: There is an offer of tools and infrastructure that enable researchers to perform analysis and collaborate within a secure environment. This allows for sharing and combining datasets while maintaining data privacy.
2932

30-
### Differences
31-
32-
* **Focus**:
33-
* TEE: Secures startup, code and data during execution.
34-
* SPE: Ensures secure data processing and computation.
35-
* TRE: Provides a comprehensive and secure environment for research activities, including data access and compliance.
36-
* **Data Handling**:
37-
* TEE: Focuses on securing the execution of code and data.
38-
* SPE: Involves secure data processing and temporary storage for processing purposes.
39-
* TRE: Covers secure data storage, access controls, and privacy-preserving methods.
40-
* **Application Context**:
41-
* TEE: Used in secure mobile device environments and secure cloud computing.
42-
* SPE: Applied in secure data analytics and cryptographic computations.
43-
* TRE: Tailored for research involving sensitive datasets like healthcare research.
44-
4533
## Use Cases
4634

4735
Researchers may require access to sensitive data in different scenarios.
@@ -57,4 +45,4 @@ We also distinguish between whether the data should be processed in the cloud or
5745
* **Data repository**: Data is stored in a single database. Researchers request access, are authorized, and transfer encrypted data to their secure environment for analysis.
5846
* **Federated database**: Data is distributed across multiple nodes. Metadata is accessible via APIs and a central portal. Researchers request access to datasets at individual nodes, which then provide data for transfer or processing.
5947
* **Cloud platform**: Centralized sensitive data is hosted on a platform. Authorized users log in and analyze data directly within an SPE, using workflows or interactive tools.
60-
* **Federated processing**: Sensitive data remains on separate nodes with restricted transfer. Analysis is performed via APIs in an SPE, often combining results from multiple sources. A special case of this is federated learning, where models are trained in several iterations and updated on different data sets.
48+
* **Federated processing**: Sensitive data remains on separate nodes with restricted transfer. Analysis is performed via APIs in an SPE, often combining results from multiple sources. A special case of this is federated learning, where models are trained through several iterations and updated with different datasets.

docs/guides/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,5 +3,5 @@
33
The ELIXIR-on-Cloud project is an initiative from the ELIXIR Compute Platform.
44
Our goal is to support scientists across Europe in using cloud environments for their research activities.
55
We support the use of ELIXIR services as well as open-source software, and the project has close connections with various academic cloud providers.
6-
One of our key focuses is developing and providing software that implements the specifications defined by the Global Alliance for Genomics and Health (GA4GH) for federated processing of workloads ([GA4GH Cloud Work Stream](https://www.ga4gh.org/work_stream/cloud/)).
6+
One of our key focuses is developing and providing software that implements the specifications defined by the Global Alliance for Genomics and Health (GA4GH) for federated processing of workloads ([GA4GH Cloud Work Stream](ga4gh-cloud-ws)).
77
This documentation here offers guidance and best practices on how to use the services, further develop our services, and deploy services within the ELIXIR-on-Cloud Framework.

includes/abbreviations.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,18 @@
11
*[DBCLS]: Database Center for Life Science
2+
*[DPIA]: Data Protection Impact Assessment
23
*[DRS]: GA4GH Data Repository Service API
4+
*[EHDS]: European Health Data Space
35
*[ELIXIR]: ELIXIR unites Europe’s leading life science organisations in managing and safeguarding the increasing volume of data being generated by publicly funded research. It coordinates, integrates and sustains bioinformatics resources across its member states and enables users in academia and industry to access services that are vital for their research.
46
*[FOSS]: Free & Open Source Software
57
*[GA4GH]: The Global Alliance for Genomics and Health is a policy-framing and technical standards-setting organization, seeking to enable responsible genomic data sharing within a human rights framework.
8+
*[GDPR]: General Data Protection Regulation
69
*[GSoC]: Google Summer of Code
710
*[IaC]: Infrastructure as Code
811
*[LIMS]: Laboratory Information Management System
912
*[NBDC]: National Bioscience Database Center
13+
*[SPE]: Secure Processing Environment
14+
*[TEE]: Trusted Execution Environment
1015
*[TES]: GA4GH Task Execution Service API
16+
*[TRE]: Trusted Research Environment
1117
*[TRS]: GA4GH Tool Registry Service API
1218
*[WES]: GA4GH Workflow Execution Service API

includes/references.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,11 +31,13 @@
3131
[elixir-cloud-demo-smk]: <https://github.com/elixir-cloud-aai/demo-tes-hybrid-cloud>
3232
[elixir-cloud-registry]: <https://elixir-cloud.dcc.sib.swiss/ga4gh/registry/v1/ui/>
3333
[elixir-cloud-services]: <https://github.com/elixir-cloud-aai/elixir-cloud-aai/blob/dev/resources/resources.md>
34+
[eur-lex-ehds]: <https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=OJ:L_202500327>
3435
[fair]: <https://www.go-fair.org/fair-principles/>
3536
[funnel]: <https://ohsu-comp-bio.github.io/funnel/>
3637
[funnel-config-slurm]: <https://raw.githubusercontent.com/lvarin/test-funnel-slurm/main/funnel_config.yml>
3738
[funnel-config-slurm-service]: <https://raw.githubusercontent.com/ohsu-comp-bio/funnel/52ef90fb76e620226f2af1bca5d14d35e1c4ad4a/deployments/systemd/funnel-server.service>
3839
[ga4gh]: <https://ga4gh.org/>
40+
[ga4gh-cloud-ws]: <https://www.ga4gh.org/work_stream/cloud/>
3941
[ga4gh-cloud]: <https://ga4gh-cloud.github.io/>
4042
[ga4gh-dps]: <https://www.ga4gh.org/how-we-work/driver-projects/>
4143
[ga4gh-drs]: <https://github.com/ga4gh/data-repository-service-schemas>
@@ -140,3 +142,4 @@
140142
[tesk-helm-values]: <https://github.com/elixir-cloud-aai/TESK/blob/master/charts/tesk/values.yaml>
141143
[vsftpd]: <https://security.appspot.com/vsftpd.html>
142144
[vsftpd-deploy]: <https://www.digitalocean.com/community/tutorials/how-to-set-up-vsftpd-for-a-user-s-directory-on-ubuntu-20-04>
145+
[ukdataservice-5-safes]: <https://ukdataservice.ac.uk/help/secure-lab/what-is-the-five-safes-framework>

0 commit comments

Comments
 (0)