skip to main content


Title: A data management workflow of biodiversity data from the field to data users
Award ID(s):
1730526
NSF-PAR ID:
10174926
Author(s) / Creator(s):
; ; ;
Date Published:
Journal Name:
Applications in Plant Sciences
Volume:
7
Issue:
12
ISSN:
2168-0450
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Pooling and sharing data increases and distributes its value. But since data cannot be revoked once shared, scenarios that require controlled release of data for regulatory, privacy, and legal reasons default to not sharing. Because selectively controlling what data to release is difficult, the few data-sharing consortia that exist are often built around data-sharing agreements resulting from long and tedious one-off negotiations. We introduce Data Station, a data escrow designed to enable the formation of data-sharing consortia. Data owners share data with the escrow knowing it will not be released without their consent. Data users delegate their computation to the escrow. The data escrow relies on delegated computation to execute queries without releasing the data first. Data Station leverages hardware enclaves to generate trust among participants, and exploits the centralization of data and computation to generate an audit log. We evaluate Data Station on machine learning and data-sharing applications while running on an untrusted intermediary. In addition to important qualitative advantages, we show that Data Station: i) outperforms federated learning baselines in accuracy and runtime for the machine learning application; ii) is orders of magnitude faster than alternative secure data-sharing frameworks; and iii) introduces small overhead on the critical path. 
    more » « less
  2. This dataset includes hatch and larval period for sand lance collected in 2019 and results from particle tracking runs of simulated sand lance larvae throughout the Northeast U.S. Shelf as part of Long-Term Ecological Research (NES-LTER). Release dates vary by region, corresponding to hatch and settlement dates of settling sand lance collected in 2019. Particles were depth-keeping throughout the upper 40 m to best replicate our understanding of the vertical distribution of sand lance larvae. Data were used to determine the average particle transport pathways from these sand lance habitats, including connectivity among the three hotspots, and spatial variability of connectivity within each hotspot. Further information can be found within the manuscript: Suca, J. J., Ji, R., Baumann, H., Pham, K., Silva, T. L., Wiley, D. N., Feng, Z., & Llopiz, J. K. (2022). Larval transport pathways from three prominent sand lance habitats in the Gulf of Maine. Fisheries Oceanography, 31( 3), 333-352. https://doi.org/10.1111/fog.12580 
    more » « less
  3. null (Ed.)
  4. "Knowledge is power" is an old adage that has been found to be true in today's information age. Knowledge is derived from having access to information. The ability to gather information from large volumes of data has become an issue of relative importance. Big Data Analytics (BDA) is the term coined by researchers to describe the art of processing, storing and gathering large amounts of data for future examination. Data is being produced at an alarming rate. The rapid growth of the Internet, Internet of Things (IoT) and other technological advances are the main culprits behind this sustained growth. The data generated is a reflection of the environment it is produced out of, thus we can use the data we get out of systems to figure out the inner workings of that system. This has become an important feature in cybersecurity where the goal is to protect assets. Furthermore, the growing value of data has made big data a high value target. In this paper, we explore recent research works in cybersecurity in relation to big data. We highlight how big data is protected and how big data can also be used as a tool for cybersecurity. We summarize recent works in the form of tables and have presented trends, open research challenges and problems. With this paper, readers can have a more thorough understanding of cybersecurity in the big data era, as well as research trends and open challenges in this active research area. 
    more » « less