The specification of the IDS Association forms the basis for a data marketplace based on European values, i.e. data privacy and security, equal opportunities through a federated design, and ensuring data sovereignty for the creator of the data and trust among participants. It forms the strategic link between the creation of data in the internet of things (IoT) on the one hand and the use of this data in machine learning (ML) and artificial intelligence (AI) algorithms on the other.
Digital responsibility is evolving from a hygiene factor to key differentiator and source of competitive advantage. Future data platforms and markets will be built on design principles that go beyond our traditional understanding of cybersecurity and privacy. Based on strong data ethics principles the IDS Reference Architecture Model puts the user in its centre to ensure trustworthiness in ecosystems and sovereignty over data in the digital age as its key value proposition.
IDSA defines a reference architecture, which supports sovereign exchange and sharing of data between partners independent from their size and financial power. Thus, it meets the needs of both large and small and medium enterprises (SMEs). Further down the road, it may be taken up by individuals as well. Whether data of IoT devices is concerned, in on-premise systems or cloud platforms, the IDSA aims at providing the standard for sharing data between different endpoints while ensuring data sovereignty.
A trustworthy architecture
In order to give prospects and potential users of the IDS technology and ecosystem, we have worked on a comprehensive overview, allowing to explain the key principles, components, roles and rules of the IDS-based data market place.
For instance, take a look at the different roles of transaction partners: Data Provider, Data User, Data Broker, etc.
Then have a glance at the infrastructure, consisting of IDS Connectors. They are the guardians of data exchange at any source and point of use. It becomes evident that the IDS is not about data lakes, but provides a solution for distributed data market places, and between different, even proprietary data spheres.
The graphic also explains the principles of governance and control in the IDS ecosystem, manifested by certification criteria for tiered security levels, specifically appointed evaluation facilities and certification bodies of which there are likely to be several on a global scale.
Get acquainted with this overview and find your own path through the elements. This overview is helpful in bringing insight and understanding to the reader as it encapsulates the entire meaning of the IDS ecosystem and why its approach to granting data sovereignty, interoperability, ease of adoption and use, and the low transaction cost is so unique.
Trust is the basis for successful collaboration between partners. In business as well as in social life.
Collaboration is the core of IDS. Therefore, it is necessary to establish trust between all IDS participants as a key enabler for a thriving data economy.
We designed a process that will establish this trust: the IDS certification.
By defining a standardized level of security related to technical and organizational aspects in an entirely transparent process the IDS certification ensures security for everyone. The IDS certification is of fundamental importance for a trustworthy and sovereign data exchange.
Get IDS_certified NOW!
We are happy that you decided to get IDS_certified.
Follow these three steps to start the process:
We will consult you on the process and help you find the perfect Evaluation Facility.
Onboarding session with your Evaluation Facility. You will get your individual audit road map.
The Evaluation Facility will start the audit process and collaborate with you on collecting all necessary documents and information.
The Evaluation Facility conducts the audit, while the Support Office monitors the process, manages the quality assurance, and provides guidance to you throughout. After a successful audit we will present you with the certification of completion.
Read the Leaflet on Benefits & Steps of IDS_Certified!
The participants of the IDS-based data ecosystem will collaborate by sharing their valuable data. For the success of this collaboration trust between all parties involved is needed, which will be ensured by a transparent certification of the environment and components.
Thereby, an evaluation of each participant’s operational environment is required, but also of the components, used in in the IDS-based ecosystem.
To certify a participant’s operational environment means to evaluate his operational environment regarding the fulfilment of the defined levels of security, including infrastructure reliability and process compliance.
Therefore, the certification of the participant’s operational environment demonstrates a level of security regarding availability, confidentiality and integrity to all other participants and stakeholders. The operational environment certification approach is displayed by two dimensions: The horizontal dimension is Evaluation Depth, describing the level of detail at which an evaluation is performed. The vertical dimension is the increasing extent of the Security Requirements that need to be fulfilled. The Certification of the participants operational environment targets different levels of capabilities and assurance.
To secure the intended cross-industrial and cross-company information exchange, the International Data Space (IDS) components must provide the required functionality and an appropriate level of security. As such, the component certification is interoperability- and security-focused, while aiming to strengthen the development and maintenance process of these components. The component certification approach is displayed by two dimensions: The depth and rigour of an evaluation increases with each of the three defined Assurance Levels. Similarly, the security needs to be required by the data owner and data consumer for data exchange, increasing with the three defined Security Profiles.
There are different Evaluation Facilities for certifying the operational environment and the components.
If you plan to purchase IDS components from another organization, usually, that organization must ensure that they are certified, while you need to ensure that your operational environment is certified.
When broadening the perspective from an individual use case scenario to a platform landscape view, the International Data Spaces positions itself as an architecture to link different cloud platforms through secure exchange and trusted sharing of data, i.e. through data sovereignty.
Make data available – dynamic, on demand
Link with ecosystem partners
(connect, match, interprete)
Control the access to your data
(Apps, remote software execution, aggregation)
A blueprint for data space
The reference architecture model for the Industrial Data Space consists of four partial architectures. It will present a blueprint for safe data exchange and the efficient combination of data and can be configured for each individual case.
Includes all concepts that are important from an economic perspective, e.g. data governance, cooperative data management.
Data and service architecture
Forms the technical functional core of the Industrial Data Space with app store, brokers and connectors
Describes the implementation of the data and service architecture of the Industrial Data Space.
Contains different security aspects, e.g. interface security, evidence of identity, data use monitoring.
Self determined control of data flows
standard for data flows between all kinds of data endpoints
Trust between different
comprehensive security functions providing a maximum level of trust
Governance for the
usage control and enforcement for data flows
Providing, obtaining and utilising data: The roles model for International Data Spaces guarantees the necessary data security and digital sovereignty – have a look at the interaction overview
New standards for the digital economy
With their work on International Data Spaces. The science and business communities are pursuing the objective of setting a new comprehensive standard for data economy. During the development of the International Data Spaces, existing standards are being used and further developed if necessary.
This is where the International Data Spaces Association gets active: