The Principles

The spe­ci­fi­ca­ti­on of the IDS Asso­cia­ti­on forms the basis for a data mar­ket­place based on Euro­pean values, i.e. data pri­va­cy and secu­ri­ty, equal oppor­tu­nities through a feder­a­ted design, and ensu­ring data sover­eign­ty for the crea­tor of the data and trust among par­ti­ci­pants. It forms the stra­te­gic link bet­ween the crea­ti­on of data in the inter­net of things on the one hand side and the use of this data in machi­ne learning (ML) and arti­fi­ci­al intel­li­gence (AI) algo­rithms on the other hand side.

Digi­tal respon­si­bi­li­ty is evol­ving from a hygie­ne fac­tor to key dif­fe­ren­tia­tor and source of com­pe­ti­ti­ve advan­ta­ge. Future data plat­forms and mar­kets will be built on design princi­ples that go bey­ond our tra­di­tio­nal under­stan­ding of cyber­se­cu­ri­ty and pri­va­cy. Based on strong data ethics princi­ples the IDS Refe­rence Archi­tec­tu­re Model puts the user in its cen­ter to ensu­re trust­wort­hi­ness in eco­sys­tems and sover­eign­ty over data in the digi­tal age as its key value pro­po­si­ti­on.

IDSA defi­nes a refe­rence archi­tec­tu­re, which sup­ports sover­eign exchan­ge and sharing of data bet­ween part­ners inde­pen­dent from their size and finan­ci­al power. Thus, it meets the needs of both lar­ge and small and medi­um enter­pri­ses (SMEs). Fur­t­her down the road, it may be taken up by indi­vi­du­als as well. Whe­ther data of IoT devices is con­cer­ned, in on-pre­mi­se sys­tems or cloud plat­forms, the IDSA aims at pro­vi­ding the stan­dard for sharing data bet­ween dif­fe­rent end­points while ensu­ring data sover­eign­ty.

A trustworthy architecture

In order to give pro­s­pects and poten­ti­al users of the IDS tech­no­lo­gy and eco­sys­tem, we have worked on a com­pre­hen­si­ve over­view, allo­wing to exp­lain the key princi­ples, com­pon­ents, roles, rules of the IDS-based data mar­ket place.

For ins­tan­ce, take a look at the dif­fe­rent roles of tran­sac­tion part­ners: Data Pro­vi­der, Data User, Data Bro­ker, etc.

Then have a glance at the infra­st­ruc­tu­re, con­sis­ting of IDS Con­nec­tors. They are the guar­di­ans of data exchan­ge at any source and point of use. It beco­mes evi­dent that the IDS is not about data lakes, but pro­vi­des a solu­ti­on for dis­tri­bu­t­ed data mar­ket pla­ces, and bet­ween dif­fe­rent, even pro­prie­ta­ry data sphe­res.

The gra­phic also exp­lains the princi­ples of gover­nan­ce and con­trol in the IDS eco­sys­tem, mani­fes­ted by cer­ti­fi­ca­ti­on cri­te­ria for tie­red secu­ri­ty levels, spe­ci­fi­cal­ly appoin­ted eva­lua­ti­on faci­li­ties and cer­ti­fi­ca­ti­on bodies of which the­re are likely to be several on a glo­bal sca­le.

Why don’t you get acquain­ted with this over­view and find your own path through its ele­ments. We are con­vin­ced that it will help you and any inte­rested par­ty you may meet in the future to sum­ma­ri­ze, what the IDS eco­sys­tem is for, and why it’s approach to gran­ting Data Sover­eign­ty, inter­ope­ra­bi­li­ty, ease of adop­ti­on and use, and the who­le at low tran­sac­tion cost is so uni­que.

Con­cep­ti­on and design: INFOGRAFIK PRO

Applying for IDS_ready

Compliance to IDS reference architecture for components & organizations

Are you ready to be IDS_ready?

The cer­ti­fi­ca­ti­on sche­me is one of the cen­tral com­pon­ents of the IDS.

The Inter­na­tio­nal Data Spaces is a vir­tu­al data space lever­aging exis­ting stan­dards and tech­no­lo­gies, as well as accep­ted gover­nan­ce models. It enab­les the secu­re exchan­ge and easy linkage of data in a trusted busi­ness eco­sys­tem. Data secu­ri­ty and trust are two fun­da­men­tal cha­rac­te­ris­tics of the Inter­na­tio­nal Data Spaces. Par­ti­ci­pant and core com­po­nent cer­ti­fi­ca­ti­on wit­hin the Inter­na­tio­nal Data Spaces are two cor­nerstones of the IDS con­cept.

Par­ti­ci­pants and core com­pon­ents shall pro­vi­de a suf­fi­ci­ent­ly high degree of trust and secu­ri­ty regar­ding the inte­gri­ty, con­fi­den­tia­li­ty, and avai­la­bi­li­ty of infor­ma­ti­on exch­an­ged in the IDS. The­re­fo­re, using cer­ti­fied core com­pon­ents as well as employ­ing cer­ti­fied tech­ni­cal and orga­ni­za­tio­nal secu­ri­ty mea­su­res is man­da­to­ry for par­ti­ci­pa­ting in the IDS.

To ope­ra­tio­na­li­ze the cer­ti­fi­ca­ti­on for par­ti­ci­pants and core com­pon­ents the cer­ti­fi­ca­ti­on pro­cess is to take place in two pha­ses:

  1. IDS_ready Review: The review is car­ri­ed out by mem­bers of the WG cer­ti­fi­ca­ti­on; the IDSA Head Office is respon­si­ble for issuing the IDS_ready state­ments.
  2. IDS Cer­ti­fi­ca­ti­on: The eva­lua­ti­on will be car­ri­ed out by eva­lua­ti­on faci­li­ties appro­ved by the IDS Cer­ti­fi­ca­ti­on Body; the IDS Cer­ti­fi­ca­ti­on Body is respon­si­ble for issuing the IDS cer­ti­fi­ca­tes.

If you have deve­lo­ped an IDS Con­nec­tor, want to par­ti­ci­pa­te in the IDS as a data owner/consumer or want to pro­vi­de an IDS ser­vice (e.g. Bro­ker Ser­vice) to other IDS mem­bers, then now is the per­fect time to app­ly for the new­ly offe­red IDS_ready review, the pre­cur­sor of the IDS cer­ti­fi­ca­ti­on will be star­ting later in 2019.
Cho­sen mem­bers of the Working Group Cer­ti­fi­ca­ti­on will review your con­cept for an IDS Con­nec­tor or the tech­ni­cal and orga­ni­za­tio­nal secu­ri­ty mea­su­res of your com­pa­ny rele­vant to your plan­ned activi­ty as an IDS par­ti­ci­pant.
As an IDS_ready ear­ly adop­ter, you will be in a pole posi­ti­on for when IDS cer­ti­fi­ca­ti­on, sla­ted for the second half of 2019, beco­mes avail­ab­le for IDSA mem­bers.

For details on IDS Cer­ti­fi­ca­ti­on:

Start your evaluation for IDS_ready Component!

All available evaluators for IDS_ready Component are listed in the following – make your choice and get in touch:

Sascha Wessel
Secure Operating Systems

Fraun­ho­fer Insti­tu­te AISEC
Ph:+49–89-3229986–155
sascha.wessel@aisec.fraunhofer.de

Nadja Menz
Digital Public Services Business Unit

Fraun­ho­fer Insti­tu­te FOKUS
Ph:+49 303 4637–320
nadja.menz@fokus.fraunhofer.de

Dr.-Ing. Pascal Birnstill
Interactive Analysis and Diagnostics

Fraun­ho­fer Insti­tu­te IOSB
Ph:+49 721 6091–612
pascal.birnstill@iosb.fraunhofer.de

Start your evaluation for IDS_ready Organisation!

All available evaluators for IDS_ready Organization are listed in the following – make your choice and get in touch:

Aleksei Resetko
Partner Cybersecurity & Privacy

Pri­ce­wa­ter­house­Co­o­pers
Ph:+49 699 5855–059
aleksei.resetko@de.pwc.com

Alexander Häußler
Product Compliance Manager

TÜV SÜD Manage­ment Ser­vice GmbH
Ph:+49 895 0084–801
alexander.haeussler@tuev-sued.de

May you have any questions or queries regarding the same, please contact us at certification@internationaldataspaces.org

Unleash the value of your data

When broa­de­ning the per­spec­tive from an indi­vi­du­al use case sce­n­a­rio to a plat­form land­s­cape view, the INTERNATIONAL DATA SPACES posi­ti­ons its­elf as an archi­tec­tu­re to link dif­fe­rent cloud plat­forms through secu­re exchan­ge and trusted sharing of data, short: through data sover­eign­ty.

1.

Make data avail­ab­le – dyna­mic, on demand
(descri­be, expo­se)

2.

Link with eco­sys­tem part­ners
(con­nect, match, inter­pre­te)

3.

Con­trol the access to your data
(usa­ge con­trol)

4.

Crea­te value
(Apps, remo­te soft­ware exe­cu­ti­on, aggre­ga­ti­on)

A blueprint for data space

The refe­rence archi­tec­tu­re model for the Indus­tri­al Data Space con­sists of four par­ti­al archi­tec­tures. It will pre­sent a blue­print for safe data exchan­ge and the effi­ci­ent com­bi­na­ti­on of data and can be con­fi­gu­red for each indi­vi­du­al case.

Business architecture

Inclu­des all con­cepts that are important from an eco­no­mic per­spec­tive, e.g. data gover­nan­ce, coope­ra­ti­ve data manage­ment.

Data and service architecture

Forms the tech­ni­cal func­tio­nal core of the Indus­tri­al Data Space with app store, bro­kers and con­nec­tors

Software architecture

Descri­bes the imple­men­ta­ti­on of the data and ser­vice archi­tec­tu­re of the Indus­tri­al Data Space.

Security architecture

Con­ta­ins dif­fe­rent secu­ri­ty aspects, e.g. inter­face secu­ri­ty, evi­dence of iden­ti­ty, data use moni­to­ring.

Self determined control of data flows

Unlimited
Interoperability

stan­dard for data flows bet­ween all kinds of data end­points

Trust between different
security domains

com­pre­hen­si­ve secu­ri­ty func­tions pro­vi­ding a maxi­mum level of trust

Governance for the
data economy

usa­ge con­trol and enforce­ment for data flows

Roles Model

Providing, obtaining and utilising data: The roles model for International Data Spaces guarantees the necessary data security and digital sovereignty – have a look at the interaction overview

New standards for the digital economy

With their work on Inter­na­tio­nal Data Spaces the sci­ence and busi­ness com­mu­nities are pur­suing the objec­tive of set­ting a new com­pre­hen­si­ve stan­dard for data eco­no­my. During the deve­lop­ment of the Inter­na­tio­nal Data Spaces, exis­ting stan­dards are being used and fur­t­her deve­lo­ped if necessa­ry.

This is whe­re the Inter­na­tio­nal Data Spaces Asso­cia­ti­on gets active:

Desi­gning the cer­ti­fi­ca­ti­on mea­su­res

Defi­ning and imple­men­ting stan­dards