The specification of the IDS Association forms the basis for a data marketplace based on European values, i.e. data privacy and security, equal opportunities through a federated design, and ensuring data sovereignty for the creator of the data and trust among participants. It forms the strategic link between the creation of data in the internet of things on the one hand side and the use of this data in machine learning (ML) and artificial intelligence (AI) algorithms on the other hand side.
Digital responsibility is evolving from a hygiene factor to key differentiator and source of competitive advantage. Future data platforms and markets will be built on design principles that go beyond our traditional understanding of cybersecurity and privacy. Based on strong data ethics principles the IDS Reference Architecture Model puts the user in its center to ensure trustworthiness in ecosystems and sovereignty over data in the digital age as its key value proposition.
IDSA defines a reference architecture, which supports sovereign exchange and sharing of data between partners independent from their size and financial power. Thus, it meets the needs of both large and small and medium enterprises (SMEs). Further down the road, it may be taken up by individuals as well. Whether data of IoT devices is concerned, in on-premise systems or cloud platforms, the IDSA aims at providing the standard for sharing data between different endpoints while ensuring data sovereignty.
A trustworthy architecture
In order to give prospects and potential users of the IDS technology and ecosystem, we have worked on a comprehensive overview, allowing to explain the key principles, components, roles, rules of the IDS-based data market place.
For instance, take a look at the different roles of transaction partners: Data Provider, Data User, Data Broker, etc.
Then have a glance at the infrastructure, consisting of IDS Connectors. They are the guardians of data exchange at any source and point of use. It becomes evident that the IDS is not about data lakes, but provides a solution for distributed data market places, and between different, even proprietary data spheres.
The graphic also explains the principles of governance and control in the IDS ecosystem, manifested by certification criteria for tiered security levels, specifically appointed evaluation facilities and certification bodies of which there are likely to be several on a global scale.
Why don’t you get acquainted with this overview and find your own path through its elements. We are convinced that it will help you and any interested party you may meet in the future to summarize, what the IDS ecosystem is for, and why it’s approach to granting Data Sovereignty, interoperability, ease of adoption and use, and the whole at low transaction cost is so unique.
Applying for IDS_ready
Compliance to IDS reference architecture for components & organizations
Are you ready to be IDS_ready?
The certification scheme is one of the central components of the IDS.
The International Data Spaces is a virtual data space leveraging existing standards and technologies, as well as accepted governance models. It enables the secure exchange and easy linkage of data in a trusted business ecosystem. Data security and trust are two fundamental characteristics of the International Data Spaces. Participant and core component certification within the International Data Spaces are two cornerstones of the IDS concept.
Participants and core components shall provide a sufficiently high degree of trust and security regarding the integrity, confidentiality, and availability of information exchanged in the IDS. Therefore, using certified core components as well as employing certified technical and organizational security measures is mandatory for participating in the IDS.
To operationalize the certification for participants and core components the certification process is to take place in two phases:
- IDS_ready Review: The review is carried out by members of the WG certification; the IDSA Head Office is responsible for issuing the IDS_ready statements.
- IDS Certification: The evaluation will be carried out by evaluation facilities approved by the IDS Certification Body; the IDS Certification Body is responsible for issuing the IDS certificates.
If you have developed an IDS Connector, want to participate in the IDS as a data owner/consumer or want to provide an IDS service (e.g. Broker Service) to other IDS members, then now is the perfect time to apply for the newly offered IDS_ready review, the precursor of the IDS certification will be starting later in 2019.
Chosen members of the Working Group Certification will review your concept for an IDS Connector or the technical and organizational security measures of your company relevant to your planned activity as an IDS participant.
As an IDS_ready early adopter, you will be in a pole position for when IDS certification, slated for the second half of 2019, becomes available for IDSA members.
For details on IDS Certification:
Start your evaluation for IDS_ready Component!
All available evaluators for IDS_ready Component are listed in the following – make your choice and get in touch:
Secure Operating Systems
Fraunhofer Institute AISEC
Digital Public Services Business Unit
Fraunhofer Institute FOKUS
Ph:+49 303 4637–320
Dr.-Ing. Pascal Birnstill
Interactive Analysis and Diagnostics
Fraunhofer Institute IOSB
Ph:+49 721 6091–612
Start your evaluation for IDS_ready Organisation!
All available evaluators for IDS_ready Organization are listed in the following – make your choice and get in touch:
Partner Cybersecurity & Privacy
Ph:+49 699 5855–059
Product Compliance Manager
TÜV SÜD Management Service GmbH
Ph:+49 895 0084–801
May you have any questions or queries regarding the same, please contact us at firstname.lastname@example.org
Unleash the value of your data
When broadening the perspective from an individual use case scenario to a platform landscape view, the INTERNATIONAL DATA SPACES positions itself as an architecture to link different cloud platforms through secure exchange and trusted sharing of data, short: through data sovereignty.
Make data available – dynamic, on demand
Link with ecosystem partners
(connect, match, interprete)
Control the access to your data
(Apps, remote software execution, aggregation)