- 1School of Public Health Sciences, University of Waterloo, Waterloo, ON, Canada
- 2Department of Systems Design Engineering, University of Waterloo, Waterloo, ON, Canada
- 3Research Institute for Aging, University of Waterloo, Waterloo, ON, Canada
- 4Centre for Digital Therapeutics, Techna Institute, University Health Network, Toronto, ON, Canada
- 5Institute of Health Policy, Management, and Evaluation, Dalla Lana School of Public Health, University of Toronto, Toronto, ON, Canada
1 Introduction
From smart devices to smart home technologies, Personal Health Information (PHI) is being collected on a previously unprecedented level (1–8). The individual and population metrics gathered can transform public health research, providing valuable insights into population health, disease trends, and effective interventions. Despite advancements in data availability, collection, and analysis (9–13), the use of PHI for research has been hindered by storage, cybersecurity, and data governance challenges (6–8, 14–18). PHI has traditionally been stored in local databases or filesystems which lack sufficient cybersecurity and data governance. This leaves sensitive health information vulnerable to unauthorized access and malicious attacks (3, 5, 19–28). Local databases also lack scalability, making it difficult to accommodate large volumes of data and perform computationally intensive tasks (10, 29–32).
Cloud-based solutions have emerged to address these challenges (33). Our rapid literature review (34–39) identified several frameworks such as InfusedHeart (34), I-Health (38), and Blockchain-Based Personalized Federated Learning (39), which leverage cloud computing for public health applications. While these solutions offer insights into the potential of cloud services, it's crucial to note that their compliance with healthcare standards such as PIPEDA (17), HIPAA (18), and GDPR (15) varies. Some may partially meet these standards, addressing certain aspects of Personal Health Information (PHI) management, but there remains a lack of a comprehensive solution fully aligned with all these regulatory requirements. This gap underscores the need for a tailored approach, such as the UbiSECE framework, which is specifically designed to address the complex requirements of PHI in public health research, ensuring full compliance with these critical healthcare standards.
Microsoft Azure (33, 40), a leading cloud platform, has gained popularity in public health research due to its robust infrastructure and compliance with industry standards (41). The Ubiquitous health technology lab (UbiLab) at the University of Waterloo has faced and addressed the challenges associated with the use of PHI for public health research (42). This paper aimed to share our experiences and insights gained in the adoption of UbiSECE, a cloud-based data governance framework. UbiSECE is based on Microsoft Azure's governance architecture guidelines and incorporates NIST 800–53 compliance with healthcare standards such as PIPEDA, HIPAA, and GDPR (15, 17, 18, 40, 41). It also implements role-based access controls and centralizes data storage. The framework shared here serves as a blueprint for the field of public health research to create streamlined and efficient platforms for managing PHI. To assist readers, a Glossary of specialized terms and acronyms used throughout this paper, such as PHI, PIPEDA, HIPAA, GDPR, NIST and others, is provided at the end of the document. This Glossary aims to clarify key concepts and ensure a clear understanding of the technical aspects discussed.
2 Phases
2.1 Phase 1- local system
2.1.1 Scenario and benefits
In this initial phase, each UbiLab researcher operated independently, using their own system for research data and resources. This approach resulted in a spread of data across individual computers with minimal centralized storage. Despite the challenges this posed, there were implicit benefits in this setup. Researchers experienced a certain level of comfort and familiarity with their own systems, which might have allowed for ease of use and adaptability to individual working styles. Furthermore, this decentralized approach could have been perceived as more cost-effective initially, as it relied on existing resources without additional investment in centralized infrastructure.
2.1.2 Challenges
The limited utilization of cloud resources and data sharing created a fragmented landscape of resources, often leading to a “sandbox” effect between projects. This phase was marked by a lack of standardized data storage solutions, such as SQL or JSON databases, and an absence of unified data governance frameworks. Cybersecurity measures were not adequately established, leaving sensitive data potentially vulnerable. Additionally, the management of credentials was limited and primarily facilitated by the university's Information Systems & Technology (IST) department, indicating a reliance on external support for essential security processes. There was also a notable deficiency in the IT infrastructure necessary for effectively managing study participants' informed consent and re-consent, which are critical components of ethical research practices. Moreover, the detailed management of data processing costs was inefficient, leading to potential resource wastage and budgetary concerns.
2.2 Phase 2- UbiLab azure general environment
2.2.1 Scenario and benefits
In Phase 2, the UbiLab research team made a significant leap by upgrading to a unified cloud-based research environment utilizing Microsoft Azure. This strategic shift enabled the centralization of data storage and sharing within individual research project groups. Additionally, the team implemented enhanced data governance mechanisms, marking a pivotal change in the management and accessibility of research data.
The transition to a cloud-based architecture brought about several key benefits. Firstly, it facilitated improved access to Personal Health Information (PHI) and the utilization of big data, which are crucial for advanced public health research. Secondly, the cloud environment simplified collaboration with third parties and industry partners, making the sharing and analysis of data more efficient. Another significant advantage was the reduction in sandbox sharing of resources and data, which streamlined the research process and reduced redundancies. Moreover, the ability to collect informed consent and PHI remotely and automatically through the development of scripts and Application Programming Interfaces (APIs) was a noteworthy advancement. This not only enhanced the efficiency of data collection but also aligned with the evolving needs of digital health research.
2.2.2 Challenges
In Phase 2, while the transition to Azure improved certain aspects, several significant challenges persisted. Obtaining or producing high-quality, ongoing, or real-time datasets from Personal Health Information (PHI) remained a complex task. The IT management responsibilities, such as the development of scripts, APIs, and cloud-based pipelines for data transfer, continued to pose substantial barriers for public health researchers.
Furthermore, there were gaps in data governance frameworks, specifically in the alignment with standards like ISO/IEC 38500, as well as in cybersecurity standards and credential management. Another substantial challenge was the cost implications associated with each researcher establishing their resource group. This setup often involved unique virtual machines (VMs), storage accounts, Databricks instances, database servers, app services, and a variety of mostly underutilized resources. This not only led to inefficiencies but also contributed to increased costs.
In addition, there was limited IT infrastructure support for managing study participants' informed consent and re-consent processes, which is a crucial aspect of public health research. The cost management for processing the research data also remained inefficient, further complicating the overall effectiveness of the transition to the cloud-based environment.
2.3 Phase 3- UbiLab secure NIST environment
2.3.1 Scenario and benefits
In Phase 3, the focus shifted to enhancing cybersecurity and data governance within the cloud environment to manage Personal Health Information (PHI) more effectively. This phase saw the incorporation of comprehensive security recommendations outlined in the National Institute of Standards and Technology (NIST) Special Publication 800–171. Additionally, it integrated compliance with multiple key regulatory frameworks, including Ontario's Freedom of Information and Protection of Privacy Act, the Personal Information Protection and Electronic Documents Act (PIPEDA), the General Data Protection Regulation (GDPR), the Personal Data Sovereignty Inter-Organizational Governance Framework for Public Health Research (43), and Azure's cloud governance framework. These integrations represented a significant advancement in the project's approach to data security and governance.
The introduction of these robust cybersecurity standards and data governance frameworks had a marked impact on enhancing the security and management of PHI. This development significantly improved trust with collaborators, as the enhanced security measures provided assurances for safer data exchanges. It also led to an increase in operational efficiency by effectively mitigating risks associated with unauthorized access. The alignment with international and regional data protection regulations further bolstered the framework's credibility and reliability, making it a more robust solution for managing sensitive health data.
2.3.2 Challenges
In Phase 3, as the use of Azure increased, several new challenges emerged. The implementation of a virtual private network (VPN) for resource access became necessary, which in turn required the installation of a firewall and various security and performance applications, including Azure's NIST 800–171 blueprint initiative. This shift led to a significant escalation in the costs and complexity of managing networks, controlling user access, and configuring resources.
Additionally, public health researchers at UbiLab often lacked the necessary expertise to navigate these complex technical systems. This gap in knowledge necessitated one-on-one meetings to assist each researcher through the VPN setup process, as the existing documentation proved inadequate due to its technical jargon. The limited internet access from Azure resources further complicated matters, leading to stalled workflows and prolonged wait times for issue resolution.
Another challenge was the complexity involved in configuring and maintaining the resources deployed in Azure. Each new resource required extensive documentation and security measures such as firewall protection, logging, tagging, and password management. These tasks were often inadequately performed due to a shortage of human resources, which added to the challenges of maintaining a secure and efficient cloud-based environment.
2.4 Phase 4- secure UbiLab environment with a centralized data ecosystem
2.4.1 Scenario and benefits
In Phase 4, the appointment of a dedicated cloud architect played a pivotal role. This specialist expedited the setup of VPNs and network configurations, significantly improving user support, resource configuration, and maintenance. Concurrently, there was a notable enhancement in cybersecurity measures. Additionally, a data governance program was established, featuring a committee composed of representative stakeholders. This committee was tasked with aligning UbiLab's data strategy with the internal objectives of stakeholders and developing a comprehensive data-sharing agreement.
The implementation of these measures in Phase 4 led to the creation of a secure, centralized cloud environment that is specifically designed for managing Personal Health Information (PHI) in public health research. A notable achievement during this phase was the reduction in Azure resource costs by ~30%−40%, which was primarily due to decreased data redundancy costs. Additionally, the establishment of the data governance program significantly streamlined the process of collecting data from data custodians, effectively reducing obstacles, and enhancing the efficiency of data management overall.
2.4.2 Challenges
In Phase 4, the team faced a range of barriers related to data governance in healthcare, including concerns over user privacy, meeting data security requirements, setting appropriate data standards, and managing the intricacies of cross-institutional data collection and aggregation. The challenge of managing study participants' informed consent and the related costs was also significant.
To address these challenges, the team worked to establish semi-trusted relationships with stakeholders. This approach was supported by governance mechanisms such as clearly defined metrics, compliance monitoring, and auditing processes. These strategies were aimed at creating a robust and reliable framework for data governance, ensuring comprehensive management of all data aspects, from privacy to consent, in line with the broader objectives of the UbiLab project.
3 UbiSECE framework
The UbiLab Secure Cloud Environment (UbiSECE) was developed as the cumulative result of our experiential learning in PHI-based research (Phase 1–4). UbiSECE prioritizes data security; securely storing PHI data and providing controlled, role-based access defined by our cloud architect. Azure's governance functionalities enable us to define roles and responsibilities, monitor data usage and costs, and meet the traceability, accountability, auditability, and compliance needs of our stakeholders.
UbiSECE's Azure Architecture comprises four main environments: UbiLab External, UbiLab Production, UbiLab Internal, and UbiLab Research (Figure 1).
UbiLab_external: This environment hosts resources, applications, APIs, or other services that are externally accessible without the need for a VPN and user account. It is designed with the highest degree of access flexibility in mind, allowing for wider data collection and interaction with external systems. However, given the open nature of this environment, no PHI is stored here. Any data collected in this environment via user interactions or APIs are transferred securely via Azure's private links to our secure data storage, thus maintaining the integrity and security of our data.
UbiLab_production: This domain hosts resources ready for production, serving as the active interface for deployed applications. It may include Python scripts collecting data from user sensors or a Jupyter notebook for a data science project shared with industry partners. This environment requires authentication and strict access control for any interaction. Only users with an Azure account, created and managed by our cloud administrator, can access these resources, ensuring that only authorized personnel can access these applications.
UbiLab_internal: This is a controlled environment where internal research projects are executed, hosted separately from the external and production domains. It's secluded from the Internet and does not involve industry partners. It offers collaborators controlled and cached access to portions of UbiLab's PHI data via virtual machines for research purposes. Direct access to centralized data storage is restricted, and any need for writing information into the central data storage requires specific privileges. As in the production environment, access requires passing through security layers and an Azure account created by our cloud administrator.
UbiLab_research: Dedicated to fostering academic research, this domain is exclusively reserved for UbiLab's Master's and Ph.D. students to conduct their thesis research. Although it shares the same restricted access controls as the internal and production environments, the UbiLab_research domain is distinct due to the nature of the work it hosts. It supports a wide range of academic activities, from experimental data science work to more structured, thesis-driven research projects. As in the other environments, access to resources in this domain is only possible through security layers and with an Azure account created by our cloud administrator.
4 Discussion
4.1 Strengths and scalability
Storing and managing Personal Health Information (PHI) is a major challenge in public health research. Here we outlined the progress toward the development of UbiSECE: a private and secure cloud-based data governance framework. UbiSECE employs role-based access controls to centralized data storage to ensure the security of PHI while enabling public health research.
One of the key strengths of our cloud-based solution is its scalability and accessibility. UbiSECE allows public health researchers to store and analyze large volumes of data efficiently and facilitates seamless collaboration among different teams. The UbiSECE framework also paves the way for future integration with PHR systems, enabling seamless sharing and utilization of medical records for research purposes. The scalability of the UbiSECE framework is twofold, encompassing both vertical and horizontal dimensions. Vertically, it can expand its capacity to accommodate larger datasets and more complex processing needs. Horizontally, the framework is designed to integrate emerging technologies and adapt to new research demands, ensuring its utility in the evolving landscape of public health research.
Another strength lies in the framework's compliance with healthcare standards and regulations including NIST 800–53, PIPEDA, HIPAA, and GDPR. The framework ensures that PHI is handled according to established security protocols and sets a high standard for ethical and responsible data governance. Looking forward, UbiSECE is strategically positioned to evolve with the advancements in technology and the increasing demands for data in public health research. Its design and infrastructure are geared toward adaptability and scalability, ensuring its relevance and efficacy in the future.
4.2 Challenges in data access and security
Despite these benefits, managing data access for new collaborators or researchers remains complex. Currently, access is granted by cloud administrators through registered user accounts with limited privileges. Streamlining and automating this process could enhance collaboration and expedite research activities. Furthermore, although the framework ensures data security, ongoing efforts are needed to refine governance programs and fully comply with NIST-800–171 and NIST-800–52 standards. Continuous improvement and regular audits are essential to mitigate emerging cybersecurity threats and maintain the integrity of the cloud infrastructure.
4.3 Evaluation and feedback
In recognizing the importance of continuous improvement, our framework includes robust evaluation and feedback mechanisms. Weekly leadership meetings are conducted with researchers to discuss the functioning and efficacy of the UbiSECE framework. These meetings serve as a platform for researchers to provide feedback on their experiences, challenges faced, and suggestions for improvements. Adjustments to the system and processes are made as needed, based on this feedback. Additionally, monthly meetings are held with stakeholders to ensure their perspectives and requirements are effectively integrated into the framework. This iterative process of gathering and implementing feedback ensures that the UbiSECE framework remains responsive to the needs of its users and up to date with the latest developments in public health research.
4.4 Training and user support
UbiLab's transition to the UbiSECE framework is supported by training sessions conducted by our dedicated cloud architect. These targeted one-on-one sessions equip researchers with the necessary skills to navigate and utilize the cloud-based system effectively. These sessions cover a range of topics, from basic navigation of the Azure cloud environment to advanced data management and security protocols. Additionally, comprehensive user guide to provide ongoing support and address common technical queries were provided to the researchers.
4.5 Practical applications
In the context of UbiLab's current projects (44–52), the UbiSECE framework is actively employed in a variety of research areas, demonstrating its practicality and versatility. These initiatives include using IoT for monitoring climate change behaviors and chronic disease risks (45, 47), analyzing big data for public health studies on air pollution effects (51), and applying smart home technologies for older adult healthcare (52). This range of applications highlights UbiSECE's effectiveness in enhancing both research efficiency and data security, showing its potential as a key tool in public health research.
4.6 Ethical considerations
The transition to cloud-based systems for managing Personal Health Information (PHI) necessitates a comprehensive examination of ethical considerations that extend beyond informed consent. The adoption of cloud computing in healthcare brings to the fore critical questions regarding data ownership, patient confidentiality, and the potential for data misuse (53). To ensure patient confidentiality within cloud environments, robust encryption, and sophisticated access control mechanisms must be employed, alongside clear policies on data ownership that honor patient rights and adhere to legal standards. Moreover, the risk of data misuse—whether by intent or accident—necessitates the implementation of stringent governance frameworks and the conduction of regular audits. These steps are imperative to uphold compliance with ethical standards and legal requirements. Addressing these ethical dimensions is crucial to maintain trust in cloud-based healthcare systems and to safeguard the integrity of PHI.
4.7 Future directions and cost-effectiveness
Future research should explore advanced data analytics techniques and machine learning algorithms within the cloud-based framework to extract valuable insights from healthcare data. Azure's machine learning capabilities could be leveraged to develop predictive models and decision support systems for public health research. Investigating the interoperability and data exchange standards between different cloud platforms and PHR systems could facilitate data sharing and collaboration. Finally, continuous evaluation of the framework's performance and security measures and monitoring of emerging healthcare regulations and standards will ensure its effectiveness and adaptability in an evolving healthcare landscape.
Additionally, it's pertinent to note the financial aspects of the UbiSECE framework implementation. Initially, UbiLab incurred upfront costs for data migration, staff training, and system setup in adopting cloud technology. However, these were effectively balanced by long-term savings, including a ~30%−40% reduction in Azure resource costs, primarily due to decreased data redundancy and enhanced operational efficiencies. The scalability of cloud solutions also mitigated the need for substantial future investments in IT infrastructure, further underscoring the cost-effectiveness of this transition.
The frameworks developed here can support interdisciplinary research and accelerate knowledge discovery while safeguarding public health information.
Author contributions
PMo: Project administration, Resources, Supervision. JK: Writing—original draft, Conceptualization, Methodology, Visualization, Writing—review & editing. PMi: Writing—original draft, Data curation, Methodology, Visualization, Writing—review & editing.
Funding
The author(s) declare that no financial support was received for the research, authorship, and/or publication of this article.
Conflict of interest
The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
Publisher's note
All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.
References
1. Laplante PA, Laplante N. The internet of things in healthcare: potential applications and challenges. IT Prof. (2016) 18:2–4. doi: 10.1109/MITP.2016.42
2. Banerjee S, Hemphill T, Longstreet P. Wearable devices and healthcare: data sharing and privacy. The Inf Soc. (2018) 34:49–57. doi: 10.1080/01972243.2017.1391912
3. Ajunwa I, Crawford K, Ford JS. Health and big data: An ethical framework for health information collection by corporate wellness programs. The J Law Med Ethics. (2016) 44:474–80. doi: 10.1177/1073110516667943
4. Khoury MJ, Ioannidis JP. Big data meets public health. Science. (2014) 346:1054–5. doi: 10.1126/science.aaa2709
5. Tse D, Chow CK, Ly TP, Tong CY, Tam KW. The Challenges of Big Data Governance in Healthcare. in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science and Engineering (TrustCom/BigDataSE). Piscataway, NJ: IEEE (2018), 1632–1636.
6. Dobson R, Wihongi H, Whittaker R. Exploring patient perspectives on the secondary use of their personal health information: an interview study. BMC Med Inform Decis Mak. (2023) 23:1–14. doi: 10.1186/s12911-023-02143-1
7. Winter JS, Davidson E. Governance of artificial intelligence and personal health information. Digital Policy Reg Gov. (2019) 21:280–90. doi: 10.1108/DPRG-08-2018-0048
8. Winter JS, Davidson E. Big data governance of personal health information and challenges to contextual integrity. The Inf Soc. (2019) 35:36–51. doi: 10.1080/01972243.2018.1542648
9. Blockchain-Enabled Genomic Data Sharing Analysis Platform Semantic Scholar. (2023). Available online at: https://www.semanticscholar.org/paper/Blockchain-enabled-genomic-data-sharing-and/d9d9e6240435eccb2d94ff0a53829edc529dd046 (accessed December 14, 2023).
10. Van Panhuis WG, Paul P, Emerson C, Grefenstette J, Wilder R, Herbst AJ, et al. A systematic review of barriers to data sharing in public health. BMC Public Health. (2014) 14:1–9. doi: 10.1186/1471-2458-14-1144
11. Jaiman V, Urovi V. A consent model for blockchain-based health data sharing platforms. IEEE access. (2020) 8:143734–45. doi: 10.1109/ACCESS.2020.3014565
12. Xia QI, Sifah EB, Asamoah KO, Gao J, Du X, Guizani M. MeDShare: Trust-less medical data sharing among cloud service providers via blockchain. IEEE Access. (2017) 5:14757–67. doi: 10.1109/ACCESS.2017.2730843
13. Lu Y, Wang W, Bhargava B, Xu D. Trust-based privacy preservation for peer-to-peer data sharing. IEEE Trans Syst Man Cybernetics Part A Syst Hum. (2006) 36:498–502. doi: 10.1109/TSMCA.2006.871795
14. Frost J, Massagli M. Social uses of personal health information within PatientsLikeMe, an online patient community: what can happen when patients have access to one another's data. J Med Internet Res. (2008) 10:e1053. doi: 10.2196/jmir.1053
15. Art. 4 GDPR - Definitions - GDPR.eu. (2023). Available online at: https://gdpr.eu/article-4-definitions/ (accessed December 14, 2023).
16. Personal Information Protection Electronic Documents Act. (2023). Available online at: https://laws-lois.justice.gc.ca/eng/acts/p-8.6/FullText.html (accessed December 14, 2023).
17. PIPEDA Fair Information Principles - Office of the Privacy Commissioner of Canada. (2023). Available online at: https://www.priv.gc.ca/en/privacy-topics/privacy-laws-in-canada/the-personal-information-protection-and-electronic-documents-act-pipeda/p_principle/ (accessed December 14, 2023).
18. HIPAA Home HHS.gov. (2023). Available online at: https://www.hhs.gov/hipaa/index.html (accessed December 14, 2023).
19. Demchenko Y, De Laat C, Membrey P. Defining Architecture Components of the Big Data Ecosystem. in 2014 International conference on collaboration technologies and systems (CTS). Minneapolis, MN: IEEE (2014), 104–12.
20. Dash S, Shakyawar SK, Sharma M, Kaushik S. Big data in healthcare: management, analysis and future prospects. J Big Data. (2019) 6:1–25. doi: 10.1186/s40537-019-0217-0
21. García S, Ramírez-Gallego S, Luengo J, Benítez JM, Herrera F. Big data preprocessing: methods and prospects. Big Data Anal. (2016) 1:1–22. doi: 10.1186/s41044-016-0014-0
22. Data Privacy Issues in the Age of Data Brokerage: An Exploratory Literature Review Request PDF. (2023). Available online at: https://www.researchgate.net/publication/327779549_Data_Privacy_Issues_in_the_Age_of_Data_Brokerage_An_Exploratory_Literature_Review
23. Privacy Trust in Healthcare IoT Data Sharing: A Snapshot of the Users' Perspectives. (2023). Available online at: https://uwspace.uwaterloo.ca/handle/10012/15333 (accessed December 14, 2023).
24. Heeney C, Hawkins N, de Vries J, Boddington P, Kaye J. Assessing the privacy risks of data sharing in genomics. Pub Health Genomics. (2010) 14:17–25. doi: 10.1159/000294150
25. I Know What You Did Last Summer: Risks of Location Data Leakage in Mobile Social Computing - Open Research Online. (2023). Available online at: https://oro.open.ac.uk/90252/ (accessed December 14, 2023).
26. Farnden J, Martini B, Choo KKR. Privacy Risks in Mobile Dating Apps. arXiv [Preprint]. arXiv:1505.02906 (2015). doi: 10.48550/ARXIV.1505.02906
27. IBM: cost of a data Breach Report 2019. Comp Fraud Secur. (2019) 2019:4. doi: 10.1016/S1361-3723(19)30081-8
28. Krishnamurthy B, Wills CE. On the leakage of personally identifiable information via online social networks. In: Proceedings of the 2nd ACM Workshop on Online Social Networks. Barcelona: ACM (2009), 7–12.
29. Takemiya M, Vanieiev B. Sora Identity: Secure, Digital Identity on the Blockchain In: 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC). Tokyo: IEEE (2018), 582–7.
30. Abaid Z, Shaghaghi A, Gunawardena R, Seneviratne S, Seneviratne A, Jha S. Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud In: 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020). Advances in Intelligent Systems and Computing, Vol. 1267. Cham: Springer International Publishing (2021), 111–21.
31. Dynamic Consent in Cybersecurity for Health. (2023). Available online at: https://www.researchgate.net/publication/335161119_Dynamic_Consent_in_Cybersecurity_for_Health (accessed December 14, 2023).
32. Cybersecurity Healthcare Records: Tips for Ensuring Patient Safety Privacy - Document - Gale OneFile: Health Medicine. (2023). Available online at: https://go.gale.com/ps/i.do?id=GALE%7CA507825663andsid=googleScholarandv=2.1andit=randlinkaccess=absandissn=19305583andp=HRCAandsw=wanduserGroupName=anon%7Ec20b9737andaty=open-web-entry (accessed December 14, 2023).
33. Cloud Computing Services Microsoft Azure. (2023). Available online at: https://azure.microsoft.com/en-ca (accessed Januray 17, 2023).
34. Pandya S, Gadekallu TR, Reddy PK, Wang W, Alazab M. InfusedHeart: A novel knowledge-infused learning framework for diagnosis of cardiovascular events. IEEE Trans Comput Soc Syst. (2022) 12:1–10. doi: 10.1109/TCSS.2022.3151643
35. Nyatuka DR, De La Harpe R. Service design as a catalyst for patient-centered eHealth innovation: an architectural design framework for cloud-based maternal health information service in underserved setting. IJISMD. (2021) 12:62–85. doi: 10.4018/IJISMD.20210701.oa1
36. Yang WJ, Zhao HY, Li ZY. Research on public health information resource service system based on cloud computing. Adv Mat Res. (2014) 998:1215–8. doi: 10.4028/www.scientific.net/AMR.998-999.1215
37. Saxena D. Big Data for Digital Transformation of Public Services. In:K Sandhu, , editor Advances in Business Strategy and Competitive Advantage. London: IGI Global (2021), 250–66.
38. Sarkar JL, Ramasamy V, Majumder A, Pati B, Panigrahi CR, Wang W, et al. I-Health: SDN-based fog architecture for IIoT applications in healthcare. IEEE/ACM Trans Comput Biol Bioinf. (2022). doi: 10.1109/TCBB.2022.3193918
39. Lian Z, Wang W, Han Z, Su C. Blockchain-based personalized federated learning for internet of medical things. IEEE Trans Sust Comput. (2023) 8, 694–702. doi: 10.1109/TSUSC.2023.3279111
40. Azure Governance Microsoft. (2023). Available online at: https://www.microsoft.com/en-us/americas-partner-blog/2019/07/24/azure-governance/ (accessed December 14, 2023).
41. National Institute of Standards Technology (NIST) SP 800-171 - Azure Compliance Microsoft Learn. (2023). Available online at: https://learn.microsoft.com/en-us/azure/compliance/offerings/offering-nist-800-171 (accessed December 14, 2023).
42. Home Ubiquitous Health Technology Lab. (2023). Available online at: https://uwaterloo.ca/ubiquitous-health-technology-lab/ (accessed May 26, 2023).
43. Da Miranda PA, Morita PP. A Proposed Personal Data Sovereignty Inter-Organizational Governance Framework for Public Health Research. in 2022 IEEE International Conference on Big Data (Big Data). Osaka: IEEE (2022), 1.
44. Projects Ubiquitous Health Technology Lab. (2023). Available online at: https://uwaterloo.ca/ubiquitous-health-technology-lab/projects (accessed December 14, 2023).
45. Kaur J, Sahu KS, Oetomo A, Morita P. A Smart Thermostat-based population-level Behavioural Changes During the COVID-19 Pandemic in the United States: A Proposed Study. In: Proceedings of the 2022 Workshop on Emerging Devices for Digital Biomarkers. Portland Oregon: ACM (2022), 7–12.
46. Oetomo A, Kaur J, Wang K, Butt Z, Berry P, Morita P. The case for indoor temperature in heat health warning systems: deployment of a real-time indoor temperature data ecosystem in community housing. Population Med. (2023) 5:164245. doi: 10.18332/popmed/164245
47. Oetomo A, Kaur J, Wang K, Butt Z, Berry P, Morita P. Using indoor temperature in heat health warning systems: Deployment in community housing in Canada. Eur J Pub Health. (2023) 33:ckad160-848. doi: 10.1093/eurpub/ckad160.848
48. Miranda P, Kaur J, Morita P. UbiSeCEF: Ubilab's secure cloud environment framework for public health research. Eur J Pub Health. (2023) 33: ckad160.1209. doi: 10.1093/eurpub/ckad160.1209
49. Kaur J, Sahu K, Oetomo A, Chauhan V, Morita P. Public health monitoring of behavioural risk factors in USA: an exploratory study. Eur J Pub Health. (2023) 33: ckad160-574. doi: 10.1093/eurpub/ckad160.574
50. Miranda P, Kaur J, Morita P. UbiSecE: UbiLab's Secure Cloud Environment for Public Health Research in Microsoft Azure. In: 2023 19th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). Montreal, QC: IEEE (2023), 1–4.
51. Salim S, Zakir Hussain I, Kaur J, Morita PP. Air Pollution Surveillance System: A Big Data Approach to Monitoring Adverse Health Outcomes for Public Health Interventions. in 2022 IEEE International Conference on Big Data (Big Data). Osaka: IEEE (2022), 6808–10.
52. Wang K, Nath P, Kaur J, Cao S, Morita PP. Cloud Native Remote Monitoring Data Ecosystem for Aging Population based on Commercial AAL Sensors. in 2023 45th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). Sydney: IEEE (2023), 1–5. doi: 10.1109/EMBC40787.2023.10340481
53. Atanda. Cloud computing in healthcare industry: a systematic literature review. GJIT. 13:64–71. doi: 10.18844/gjit.v13i2.8867
Glossary
Cloud Technology: Online computing services for data storage and processing.
PHI (Personal Health Information): Identifiable health and healthcare payment data of individuals.
Azure: A cloud computing service by Microsoft for app services and data management.
NIST 800-53: U.S. standards for information security in federal systems.
GDPR (General Data Protection Regulation): EU law for data protection and privacy.
RBAC (Role-Based Access Control): A system of managing user access based on roles.
HIPAA (Health Insurance Portability and Accountability Act): U.S. law for medical information privacy.
PIPEDA (Personal Information Protection and Electronic Documents Act): Canadian data privacy law for commercial sectors.
API (Application Programming Interface): Rules for software components interaction.
VPN (Virtual Private Network): A secure network connection over the internet.
NIST 800-171: U.S. guidelines for protecting non-classified information.
Data Governance: Management of data availability, usability, integrity, and security.
Cybersecurity: Protection of systems and networks from digital attacks.
Machine Learning: AI that enables software to predict outcomes more accurately.
Data Analytics: Analyzing raw data to find trends and insights.
Keywords: UbiLab research environment, public health research, Personal Health Information (PHI), data governance in healthcare, cybersecurity standards for PHI, azure cloud-based research
Citation: Morita PP, Kaur J and Miranda PADSES (2024) Enhancing public health research: a viewpoint report on the transition to secure, cloud-based systems. Front. Public Health 11:1270450. doi: 10.3389/fpubh.2023.1270450
Received: 31 July 2023; Accepted: 19 December 2023;
Published: 08 January 2024.
Edited by:
David Černý, Czech Academy of Sciences, CzechiaReviewed by:
Weizheng Wang, City University of Hong Kong, Hong Kong SAR, ChinaCopyright © 2024 Morita, Kaur and Miranda. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
*Correspondence: Plinio Pelegrini Morita, cGxpbmlvLm1vcml0YSYjeDAwMDQwO3V3YXRlcmxvby5jYQ==
†These authors have contributed equally to this work and share first authorship