The specification of the IDS Association forms the basis for a data marketplace based on European values, i.e. data privacy and security, equal opportunities through a federated design, and ensuring data sovereignty for the creator of the data and trust among participants. It forms the strategic link between the creation of data in the internet of things (IoT) on the one hand and the use of this data in machine learning (ML) and artificial intelligence (AI) algorithms on the other.
Digital responsibility is evolving from a hygiene factor to key differentiator and source of competitive advantage. Future data platforms and markets will be built on design principles that go beyond our traditional understanding of cybersecurity and privacy. Based on strong data ethics principles the IDS Reference Architecture Model puts the user in its centre to ensure trustworthiness in ecosystems and sovereignty over data in the digital age as its key value proposition.
IDSA defines a reference architecture, which supports sovereign exchange and sharing of data between partners independent from their size and financial power. Thus, it meets the needs of both large and small and medium enterprises (SMEs). Further down the road, it may be taken up by individuals as well. Whether data of IoT devices is concerned, in on-premise systems or cloud platforms, the IDSA aims at providing the standard for sharing data between different endpoints while ensuring data sovereignty.
A trustworthy architecture
In order to give prospects and potential users of the IDS technology and ecosystem, we have worked on a comprehensive overview, allowing to explain the key principles, components, roles and rules of the IDS-based data market place.
For instance, take a look at the different roles of transaction partners: Data Provider, Data User, Data Broker, etc.
Then have a glance at the infrastructure, consisting of IDS Connectors. They are the guardians of data exchange at any source and point of use. It becomes evident that the IDS is not about data lakes, but provides a solution for distributed data market places, and between different, even proprietary data spheres.
The graphic also explains the principles of governance and control in the IDS ecosystem, manifested by certification criteria for tiered security levels, specifically appointed evaluation facilities and certification bodies of which there are likely to be several on a global scale.
Get acquainted with this overview and find your own path through the elements. This overview is helpful in bringing insight and understanding to the reader as it encapsulates the entire meaning of the IDS ecosystem and why its approach to granting data sovereignty, interoperability, ease of adoption and use, and the low transaction cost is so unique.
Compliance to IDS reference architecture for components & organizations
Are you ready to be IDS_ready?
The certification scheme is one of the central components of the IDS.
The International Data Spaces is a virtual data space leveraging existing standards and technologies, as well as accepted governance models. It enables the secure exchange and easy linkage of data in a trusted business ecosystem. Data security and trust are two fundamental characteristics of the International Data Spaces. Participant and core component certification within the International Data Spaces are two cornerstones of the IDS concept.
Participants and core components shall provide a sufficiently high degree of trust and security regarding the integrity, confidentiality, and availability of information exchanged in the IDS. Therefore, using certified core components as well as employing certified technical and organizational security measures is mandatory for participating in the IDS.
To operationalize the certification for participants and core components the certification process is to take place in two phases:
IDS_ready Review: The review is carried out by members of the WG certification; the IDSA Head Office is responsible for issuing the IDS_ready statements.
IDS Certification: The evaluation will be carried out by evaluation facilities approved by the IDS Certification Body; the IDS Certification Body is responsible for issuing the IDS certificates.
If you have developed an IDS Connector, want to participate in the IDS as a data owner/consumer or want to provide an IDS service (e.g. Broker Service) to other IDS members, then now is the perfect time to apply for the offered IDS_ready review, the precursor of the IDS certification which will be starting later in 2020.
Chosen members of the Working Group Certification will review your concept for an IDS Connector or the technical and organizational security measures of your company relevant to your planned activity as an IDS participant.
As an IDS_ready early adopter, you will be in a pole position for when IDS certification, slated for the end of 2020, becomes available for IDSA members.
May you have any questions or queries regarding the same, please contact us at firstname.lastname@example.org
Unleash the value of your data
When broadening the perspective from an individual use case scenario to a platform landscape view, the International Data Spaces positions itself as an architecture to link different cloud platforms through secure exchange and trusted sharing of data, i.e. through data sovereignty.
Make data available – dynamic, on demand
Link with ecosystem partners
(connect, match, interprete)
Control the access to your data
(Apps, remote software execution, aggregation)
A blueprint for data space
The reference architecture model for the Industrial Data Space consists of four partial architectures. It will present a blueprint for safe data exchange and the efficient combination of data and can be configured for each individual case.
Includes all concepts that are important from an economic perspective, e.g. data governance, cooperative data management.
Data and service architecture
Forms the technical functional core of the Industrial Data Space with app store, brokers and connectors
Describes the implementation of the data and service architecture of the Industrial Data Space.
Contains different security aspects, e.g. interface security, evidence of identity, data use monitoring.
Self determined control of data flows
standard for data flows between all kinds of data endpoints
Trust between different
comprehensive security functions providing a maximum level of trust
Governance for the
usage control and enforcement for data flows
Providing, obtaining and utilising data: The roles model for International Data Spaces guarantees the necessary data security and digital sovereignty – have a look at the interaction overview
New standards for the digital economy
With their work on International Data Spaces. The science and business communities are pursuing the objective of setting a new comprehensive standard for data economy. During the development of the International Data Spaces, existing standards are being used and further developed if necessary.
This is where the International Data Spaces Association gets active: