There are a variety of options for storing research data at UVA. Public and internal use data storage systems can be accessed from the Rivanna and Afton high performance computing systems. Sensitive and highly sensitive data can be stored and accessed within the Ivy secure computing environment. University Information Security provides an overview of the data sensitivity classifications.
Public, Internal Use, and Sensitive Data Storage
Public data are intentionally made available to the public. Examples of public data in research computing include, but are not limited to:
- Data intended for display on a public website
- Public Data Sets obtained from a publicly available source
- Open source code
Internal use data are classified as public records available to anyone in accordance with the Virginia Freedom of Information Act (FOIA) but are not intentionally made public. Examples of internal use data within a research computing context include but are not limited to:
- audits
- models, scripts, and logfiles
- Preliminary analyses or reports
- Correspondence
Sensitive data is the default classification for all data that is not explicitly defined as highly sensitive data, may be held from release under FOIA, or that is not intended to be made publicly available. Examples of sensitive data within a research computing context include, but are not limited to:
- University ID numbers
- FERPA-protected student information not covered by the definition of highly sensitive data
- Health information where all Protected Health Information (PHI) have been systematically removed (i.e., de-identified) or aggregated, making identification impossible
- Personnel and financial information not covered by the definition of highly sensitive data, but not intended to be public
- Any information that doesn’t fit into public, internal use, or highly sensitive data categories
Feature |
Research Project Storage |
Research Standard Storage |
Quota |
1TB increments |
1TB increments |
Price |
$70/TB per year |
$45/TB per year (Each PI with an RC account will be granted up to 10 TB of Research Standard Storage at no charge1) |
Snapshots2 |
Daily snapshots for 1 week |
No |
Replication3 |
No |
No |
Backup4 |
No |
No |
Access |
Rivanna, Afton, mountable on local workstation |
Rivanna, Afton, mountable on local workstation |
Filesystem Location |
/project |
/standard |
Highly Sensitive Data Storage Compliant |
No |
No |
Use cases |
Ideal for long-term storage of data to be accessed from Rivanna. Research Project storage is ideal for sharing data within a research group and for running jobs with smaller files. |
Budget solution for storing data that can be accessed by a personal computer or Rivanna. It is not recommended to run Slurm jobs against research standard storage unless absolutely necessary. File operations on Research Standard storage are slower than on Rivanna /home , /scratch , or Research Project storage. |
1For PIs with existing Research Standard Storage, the charges will be adjusted accordingly. PIs without existing Research Standard Storage will need to submit a request for the storage.
2Snapshot files are uneditable backup copies of all the files and folders in your account, taken at a daily interval. The Research Project Storage system keeps these snapshots for a week. Snapshot files are deleted sequentially after a week has passed. This saving method is useful for human error prevention as any accidentally deleted files may be recovered. Look to our FAQ page to learn how to access your snapshots.
3Replication is a data management process that stores copies of data fragments over a distributed cluster or database. By having replicated data across each node or server on a given database, data can be accessed more reliably than data that only resides on a single server. This saving method is useful for disaster scenarios where if data is stored on multiple disks, and one disk fails, the data is still accessible.
4Backup files are copies of files that are stored on a separate disk storage than that of the original copies. Files may be backed up on a separate disk storage or within cloud storage. Backed up files are not synced with their original, so any edits to the original are not reflected on the backup. This saving method is useful for disaster scenarios where if the original disk storage is unsalvageable, the backups may still be accessible.
Highly Sensitive Data Storage
Highly sensitive data (HSD) are data that require restrictions on access under the law or that may be protected from release in accordance with applicable law or regulation. HSD includes personal information that can lead to identity theft or health information that reveals an individual’s health condition and/or medical history. Examples of HSD include, but are not limited to:
- Personally identifying information (PII) is any information that can be used to identify a person. Examples of PII include social security number, passport number, driver’s license number, military identification number, or biometric records (e.g. photographic facial images, fingerprints, voice signature, etc.).
- Health information that reveals an individual’s health condition and/or medical history, including information defined by the Health Insurance Portability and Accountability Act (HIPAA)
- Cardholder data (CHD) such as credit card numbers, primary cardholder account numbers, cardholder names, expiration date, and/or service code
Feature |
High-Security Research Standard |
Quota |
1TB increments |
Price |
$45/TB/year |
Snapshots |
No |
Replication |
No |
Backup |
No |
Access |
Ivy Virtual Machine |
Filesystem Location |
/standard |
Highly Sensitive Data Storage Compliant |
Yes |
Use cases |
Ideal for long-term storage of highly sensitive data and is suitable for computation with smaller file sizes. Files stored in High-Security Research Standard are read-write only. |
Researchers who request space on High-Security Research Standard must first request an Ivy account using the Ivy request form. Further information on Ivy and the High-Security Research storage can be found here.
High-Security Research Standard Storage is accessible by using Globus and connecting to the High-Security DTN.
Ivy Central Storage (ICS)
Ivy Central Storage has been replaced by High-Security Research Standard storage.
Request Storage
Storage requests can be made via this form: