SlideShare a Scribd company logo
1 of 17
Download to read offline
Establishing data sharing standards to promote
global industry development
Findings from the Global Data Spaces Roundtable, 26 February, Barcelona
Thorsten Huelsmann, Managing Director, International Data Spaces Association
The 13th GIO Rountable
27 February, Barcelona
Companies only share 2% of their data
because they don’t trust each other
Data sharing must preserve data sovereignty
How to build trust in data sharing?
Data sovereignty
is the ability of a natural or
legal person to exclusively
and sovereignly decide regarding
the usage of data as an
economic asset.
data control
data security
data value
value creation
innovative services
interoperability
IDSA Story 3
4
Where participants share one common trust framework
Trustful data sharing takes place in data spaces
− Decentralized/Centralized/Federated data
architecture: no physical data integration, leave
data where it is
− Interoperability: no silos, no vendor-dependency
− Data Sovereignty and traceability
− Trusted participants
− Usage control for data as economic asset
A data space is the sum of all end points that are
able to share data with each other.
A decentralized and dynamic data ecosystem:
with many-to-many interactions
4
TechTeam – IDSA Deck 5
Manufacturing example
How to build data spaces
Source: Boris Otto, Data Spaces Dialogue: Design Principles for European Data Spaces
00010010010
Clearing
House
Broker
Service
Manufacturing & Supply
chain Ecosystem
Manufacturing Data Space
(shared Digital Twin)
IDS Software
Infrastructure
Data Object
IDS Connector
Where participants share one common trust framework
Trustful data sharing takes place in data spaces
A data space is the sum of all data end
points that can share data with each other.
− Federated data architecture
− Interoperability
− Sovereign data sharing
− Trusted participants
IDSA Story 6
7
Similarities in evolution and the role of protocols
Comparable Paths: The Internet and Data Space(s)
The
Internet
Data
Space(s)
Multiple isolated
networks (e.g.
ARPANET, BITNET)
with their own
communication
protocols.
Organizations
having unique
data storage and
sharing
mechanisms.
Isolated data
spaces &
control/data
planes.
Introduction of
TCP/IP (1983) as a
universal protocol,
enabling different
networks to
communicate with
each other.
Connectors and
Protocols to
standardize data
sharing across
different spaces are
being introduced.
Initial Conceptualization Core Protocol Dev
Public Adoption
and Standardization
Advanced Networking
& Efficiency Measures
World Wide
Web &
HTML
(1990s)
Rise of
solutions
making the
tech accessible
and usable.
Widespread
adoption of
Dataspace
Protocol.
Software-Defined
Networking (SDN)
& Separation of
Control/Data
Planes (late
2000s-2010s)
Separation of
control plane
(defining rules
and policies) and
data plane (actual
data transfer).
8
Data spaces in multiple sector use IDS principles as blueprint
IDS concepts as baseline for data spaces
Early market Mainstream market
Innovators
Early
Adopters
Early
Majority
Late
Majority Laggers
- Manufacturing-X
- Health Data Space
- ERJU-Rail Data Space
- Resilience Data Space
- Eona-X
- Media Data Space (DEP – now TEMS)
- Manufacturing Data Space (DEP)
- Kultur Datenraum
- AgDataHub
- Skills Data Space (DEP)
- Catena-X
- MDS
- SCSN
- DATA-EX
- More CSAs and Deployment actions
- SIMPL
- Chinese Endeavors
- More – see Radar
How the different organizations contribute to the paradigm shift
Data spaces as enabler for a flourishing
data economy
Technical frameworks
& trust frameworks
Open-source frameworks
National & regional
governments
Set frame conditions, define requirements,
raise expectations for data spaces
Coordinate and advocate for building and
operating data spaces
Help define governance for data spaces
Technical frames & components for data
spaces, operate them & define policies
and others
and others
and others
Data spaces Operation & policies
Numerous
solutions building
upon the
frameworks
Components to build data
spaces
and many more
Regulatory
Framework
and
Instruments
Plan and Build
10
Cloud-Based Data Spaces
Plan, build, run and use data spaces
Requirements, Design specs
IDS Association
Data Sharing & Sovereignty
Gaia-X
Trust and Label Framework
Tech specs and Build
Eclipse Dataspace WG
Data Space Protocol etc.
Formally Standardize
ISO/IEC
JTC 1/SC 38
IEEE/ETSI/
CEN/CENELEC
Run
Federated Data Infrastructure Service Providers
Data Space Operators such as Cofinity-X, Amadeus, Aruba, T-Systems, etc. and/or CSPs such as AWS, MSFT, Google
Use
Data Space
Data Space Authority
Data Provider
Data App
Provider
Business App
Provider
App Provider
Data User
Enabling Service
Provider
DGA, DA etc.
EDIB, DSSC etc.
….
etc.
Catena-X
DATA-EX
etc.
This is where the
value of data
sharing is created
and captured
This is where
the scaling
happens
NB: This viewgraph does aim at completeness.
FIWARE, others, …
…
…
Enables standardized data sharing across different data space instances
Dataspace Protocol V1.0 → ISO Standard
Control Plane
(one standard procedure to negotiate data sharing)
Data Plane
(several possible for different data sharing scenarios:
confidential data sharing, streaming data, event based data, edge devices, …)
Control Plane decides
who can access the
data and how.​
Data Plane is where
the action (data
sharing) happens.
Conceptually divided,
can be combined
practically
11
Check Dataspace Protocol:
The key to data spaces is the data connector
Make the connection and enable data
economy
» Connects participants in a data space – to share,
utilize, benefit from data.
» Ensures trust through IDS Certification and cyber
security assessment.
» Connects to trust frameworks and identity
management
» Includes identity & policy management, ensures
data usage control.
» Guarantees interoperability.
» Understands and enforces data usage policies.
» Master for other connectors of diverse feature sets.
IDSA Story 12
13
The connector – functional components
System Layer – The Connector
To the Data Space
To your systems
• Software component that
is being defined by IDSA
community since 2016
• Enables data sharing
between different parties
under predefined policies
• Strictly controlled
environment to enable
trust and data sovereignty
14
IDSA on its way to a global standard
A holistic approach to bring
data spaces to global scale
IDSA Rulebook for
holistic governance
view
Reference
Architecture as
technology-agnostic
framework on
conceptual model
Fostering market adoption: Increasing readiness level and extensive use of IDS concepts
Dataspace Protocol
as detailed specification
and essence for
interoperability
Global Standardization
Diverse landscape of
usable components and
radar as orientation
for ecosystem building
and future investments
Running Data Spaces
as impressive impact
stories
Certification for
reliable, industry grade
components
Aligning architectures, market proliferation and thought
leadership on data spaces
+ +
15
Build and use the Dataspace Protocol
Let’s make data spaces fly
• Integrate the Dataspace Protocol in your work
• Actively contribute to the development of the
Dataspace Protocol
• Join discussions, track issues, and review the
evolution of the protocol through commits and
updates.
https://github.com/International-Data-Spaces-Association/ids-specification
• Explore the IDS Knowledge Base on
Gitbook for comprehensive documentation
and specifications of the Dataspace
Protocol, in an easier to read format.
• https://docs.internationaldataspaces.org/id
s-knowledgebase/v/dataspace-protocol/
» We all believe in data
spaces as enabler for
our future wealth.
// 17
THORSTEN HUELSMANN
MANAGING DIRECTOR
INTERNATIONAL DATA SPACES ASSOCIATION
WWW.LINKEDIN.COM/IN/HUELSMANNT/
THORSTEN.HUELSMANN@INTERNATIONALDATASPACES.ORG
www.linkedin.com/company/international
-data-spaces-association
www.internationaldataspaces.org
International Data Spaces Association
JOIN US!
@

More Related Content

Similar to Establishing data sharing standards to promote global industry development

Juanjo Hierro - Introduction and overview of FIWARE Vision on Data Spaces.pdf
Juanjo Hierro - Introduction and overview of FIWARE Vision on Data Spaces.pdfJuanjo Hierro - Introduction and overview of FIWARE Vision on Data Spaces.pdf
Juanjo Hierro - Introduction and overview of FIWARE Vision on Data Spaces.pdf
FIWARE
 

Similar to Establishing data sharing standards to promote global industry development (20)

Juanjo Hierro - Introduction and overview of FIWARE Vision on Data Spaces.pdf
Juanjo Hierro - Introduction and overview of FIWARE Vision on Data Spaces.pdfJuanjo Hierro - Introduction and overview of FIWARE Vision on Data Spaces.pdf
Juanjo Hierro - Introduction and overview of FIWARE Vision on Data Spaces.pdf
 
Data Domain-Driven Design
Data Domain-Driven DesignData Domain-Driven Design
Data Domain-Driven Design
 
Simplifying Your Cloud Architecture with a Logical Data Fabric (APAC)
Simplifying Your Cloud Architecture with a Logical Data Fabric (APAC)Simplifying Your Cloud Architecture with a Logical Data Fabric (APAC)
Simplifying Your Cloud Architecture with a Logical Data Fabric (APAC)
 
Data Virtualization: An Introduction
Data Virtualization: An IntroductionData Virtualization: An Introduction
Data Virtualization: An Introduction
 
Open Data Hub - Giulia Giussani - A look into the future of data sharing
Open Data Hub - Giulia Giussani - A look into the future of data sharingOpen Data Hub - Giulia Giussani - A look into the future of data sharing
Open Data Hub - Giulia Giussani - A look into the future of data sharing
 
FIWARE Tech Summit - Industrial Data Space - a New Idea For Sharing Data
FIWARE Tech Summit - Industrial Data Space - a New Idea For Sharing DataFIWARE Tech Summit - Industrial Data Space - a New Idea For Sharing Data
FIWARE Tech Summit - Industrial Data Space - a New Idea For Sharing Data
 
Data Virtualization. An Introduction (ASEAN)
Data Virtualization. An Introduction (ASEAN)Data Virtualization. An Introduction (ASEAN)
Data Virtualization. An Introduction (ASEAN)
 
Why Data Mesh Needs Data Virtualization (ASEAN)
Why Data Mesh Needs Data Virtualization (ASEAN)Why Data Mesh Needs Data Virtualization (ASEAN)
Why Data Mesh Needs Data Virtualization (ASEAN)
 
Data Virtualization: An Introduction
Data Virtualization: An IntroductionData Virtualization: An Introduction
Data Virtualization: An Introduction
 
Fast Data Strategy Houston Roadshow Presentation
Fast Data Strategy Houston Roadshow PresentationFast Data Strategy Houston Roadshow Presentation
Fast Data Strategy Houston Roadshow Presentation
 
A Logical Architecture is Always a Flexible Architecture (ASEAN)
A Logical Architecture is Always a Flexible Architecture (ASEAN)A Logical Architecture is Always a Flexible Architecture (ASEAN)
A Logical Architecture is Always a Flexible Architecture (ASEAN)
 
Logical Data Fabric: Architectural Components
Logical Data Fabric: Architectural ComponentsLogical Data Fabric: Architectural Components
Logical Data Fabric: Architectural Components
 
Ditas Flyer v2.1
Ditas  Flyer v2.1Ditas  Flyer v2.1
Ditas Flyer v2.1
 
ACdP Fiware.pdf
ACdP Fiware.pdfACdP Fiware.pdf
ACdP Fiware.pdf
 
Data Virtualization: An Introduction
Data Virtualization: An IntroductionData Virtualization: An Introduction
Data Virtualization: An Introduction
 
Hortonworks Hybrid Cloud - Putting you back in control of your data
Hortonworks Hybrid Cloud - Putting you back in control of your dataHortonworks Hybrid Cloud - Putting you back in control of your data
Hortonworks Hybrid Cloud - Putting you back in control of your data
 
Ditas factsheet h2020 v1.1
Ditas factsheet h2020  v1.1Ditas factsheet h2020  v1.1
Ditas factsheet h2020 v1.1
 
data-mesh_whitepaper_dec2021.pdf
data-mesh_whitepaper_dec2021.pdfdata-mesh_whitepaper_dec2021.pdf
data-mesh_whitepaper_dec2021.pdf
 
FIWARE and Smart Data Models
FIWARE and Smart Data ModelsFIWARE and Smart Data Models
FIWARE and Smart Data Models
 
i4Trust - Overview
i4Trust - Overviewi4Trust - Overview
i4Trust - Overview
 

More from Thorsten Huelsmann

More from Thorsten Huelsmann (13)

EffizienzCluster Management GmbH
EffizienzCluster Management GmbHEffizienzCluster Management GmbH
EffizienzCluster Management GmbH
 
Digital Hub Dortmund - A Digital Innovation Hub on Enabling Technologies in L...
Digital Hub Dortmund - A Digital Innovation Hub on Enabling Technologies in L...Digital Hub Dortmund - A Digital Innovation Hub on Enabling Technologies in L...
Digital Hub Dortmund - A Digital Innovation Hub on Enabling Technologies in L...
 
Webinar Industrial Data Space Association: Introduction and Architecture
Webinar Industrial Data Space Association: Introduction and ArchitectureWebinar Industrial Data Space Association: Introduction and Architecture
Webinar Industrial Data Space Association: Introduction and Architecture
 
WHY WE NEED AN EUROPEAN LOGISTICS DATA SPACE
WHY WE NEED AN EUROPEAN LOGISTICS DATA SPACEWHY WE NEED AN EUROPEAN LOGISTICS DATA SPACE
WHY WE NEED AN EUROPEAN LOGISTICS DATA SPACE
 
EffizienzCluster Management - Die Innovationsprozessbegleiter
EffizienzCluster Management - Die InnovationsprozessbegleiterEffizienzCluster Management - Die Innovationsprozessbegleiter
EffizienzCluster Management - Die Innovationsprozessbegleiter
 
Industrial Data Space Association - New Members, New Insights, New Future Dir...
Industrial Data Space Association - New Members, New Insights, New Future Dir...Industrial Data Space Association - New Members, New Insights, New Future Dir...
Industrial Data Space Association - New Members, New Insights, New Future Dir...
 
Digital Hub Logistics Dortmund as Cluster Upgrade
Digital Hub Logistics Dortmund as Cluster UpgradeDigital Hub Logistics Dortmund as Cluster Upgrade
Digital Hub Logistics Dortmund as Cluster Upgrade
 
Introducing Industrial Data Space Initiative, CPDP Conferende 2017
Introducing Industrial Data Space Initiative, CPDP Conferende 2017Introducing Industrial Data Space Initiative, CPDP Conferende 2017
Introducing Industrial Data Space Initiative, CPDP Conferende 2017
 
INDUSTRIAL DATA SPACE - SOVEREIGN, SECURE, SIMPLE
INDUSTRIAL DATA SPACE - SOVEREIGN, SECURE, SIMPLEINDUSTRIAL DATA SPACE - SOVEREIGN, SECURE, SIMPLE
INDUSTRIAL DATA SPACE - SOVEREIGN, SECURE, SIMPLE
 
Fraunhofer – SINTEF: towards an initiative on Data Sovereignty in Europe
Fraunhofer – SINTEF: towards an initiative on Data Sovereignty in EuropeFraunhofer – SINTEF: towards an initiative on Data Sovereignty in Europe
Fraunhofer – SINTEF: towards an initiative on Data Sovereignty in Europe
 
Industrie 4.0 – Angebote für den Mittelstand
Industrie 4.0 – Angebote für den MittelstandIndustrie 4.0 – Angebote für den Mittelstand
Industrie 4.0 – Angebote für den Mittelstand
 
Industrial Data Space - Why we need a European Initiative on Data Sovereignty
Industrial Data Space - Why we need a European Initiative on Data SovereigntyIndustrial Data Space - Why we need a European Initiative on Data Sovereignty
Industrial Data Space - Why we need a European Initiative on Data Sovereignty
 
Logistics 4.0 and the Internet of Things
Logistics 4.0 and the Internet of ThingsLogistics 4.0 and the Internet of Things
Logistics 4.0 and the Internet of Things
 

Recently uploaded

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Recently uploaded (20)

Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 

Establishing data sharing standards to promote global industry development

  • 1. Establishing data sharing standards to promote global industry development Findings from the Global Data Spaces Roundtable, 26 February, Barcelona Thorsten Huelsmann, Managing Director, International Data Spaces Association The 13th GIO Rountable 27 February, Barcelona
  • 2. Companies only share 2% of their data because they don’t trust each other
  • 3. Data sharing must preserve data sovereignty How to build trust in data sharing? Data sovereignty is the ability of a natural or legal person to exclusively and sovereignly decide regarding the usage of data as an economic asset. data control data security data value value creation innovative services interoperability IDSA Story 3
  • 4. 4 Where participants share one common trust framework Trustful data sharing takes place in data spaces − Decentralized/Centralized/Federated data architecture: no physical data integration, leave data where it is − Interoperability: no silos, no vendor-dependency − Data Sovereignty and traceability − Trusted participants − Usage control for data as economic asset A data space is the sum of all end points that are able to share data with each other. A decentralized and dynamic data ecosystem: with many-to-many interactions 4
  • 5. TechTeam – IDSA Deck 5 Manufacturing example How to build data spaces Source: Boris Otto, Data Spaces Dialogue: Design Principles for European Data Spaces 00010010010 Clearing House Broker Service Manufacturing & Supply chain Ecosystem Manufacturing Data Space (shared Digital Twin) IDS Software Infrastructure Data Object IDS Connector
  • 6. Where participants share one common trust framework Trustful data sharing takes place in data spaces A data space is the sum of all data end points that can share data with each other. − Federated data architecture − Interoperability − Sovereign data sharing − Trusted participants IDSA Story 6
  • 7. 7 Similarities in evolution and the role of protocols Comparable Paths: The Internet and Data Space(s) The Internet Data Space(s) Multiple isolated networks (e.g. ARPANET, BITNET) with their own communication protocols. Organizations having unique data storage and sharing mechanisms. Isolated data spaces & control/data planes. Introduction of TCP/IP (1983) as a universal protocol, enabling different networks to communicate with each other. Connectors and Protocols to standardize data sharing across different spaces are being introduced. Initial Conceptualization Core Protocol Dev Public Adoption and Standardization Advanced Networking & Efficiency Measures World Wide Web & HTML (1990s) Rise of solutions making the tech accessible and usable. Widespread adoption of Dataspace Protocol. Software-Defined Networking (SDN) & Separation of Control/Data Planes (late 2000s-2010s) Separation of control plane (defining rules and policies) and data plane (actual data transfer).
  • 8. 8 Data spaces in multiple sector use IDS principles as blueprint IDS concepts as baseline for data spaces Early market Mainstream market Innovators Early Adopters Early Majority Late Majority Laggers - Manufacturing-X - Health Data Space - ERJU-Rail Data Space - Resilience Data Space - Eona-X - Media Data Space (DEP – now TEMS) - Manufacturing Data Space (DEP) - Kultur Datenraum - AgDataHub - Skills Data Space (DEP) - Catena-X - MDS - SCSN - DATA-EX - More CSAs and Deployment actions - SIMPL - Chinese Endeavors - More – see Radar
  • 9. How the different organizations contribute to the paradigm shift Data spaces as enabler for a flourishing data economy Technical frameworks & trust frameworks Open-source frameworks National & regional governments Set frame conditions, define requirements, raise expectations for data spaces Coordinate and advocate for building and operating data spaces Help define governance for data spaces Technical frames & components for data spaces, operate them & define policies and others and others and others Data spaces Operation & policies Numerous solutions building upon the frameworks Components to build data spaces and many more
  • 10. Regulatory Framework and Instruments Plan and Build 10 Cloud-Based Data Spaces Plan, build, run and use data spaces Requirements, Design specs IDS Association Data Sharing & Sovereignty Gaia-X Trust and Label Framework Tech specs and Build Eclipse Dataspace WG Data Space Protocol etc. Formally Standardize ISO/IEC JTC 1/SC 38 IEEE/ETSI/ CEN/CENELEC Run Federated Data Infrastructure Service Providers Data Space Operators such as Cofinity-X, Amadeus, Aruba, T-Systems, etc. and/or CSPs such as AWS, MSFT, Google Use Data Space Data Space Authority Data Provider Data App Provider Business App Provider App Provider Data User Enabling Service Provider DGA, DA etc. EDIB, DSSC etc. …. etc. Catena-X DATA-EX etc. This is where the value of data sharing is created and captured This is where the scaling happens NB: This viewgraph does aim at completeness. FIWARE, others, … … …
  • 11. Enables standardized data sharing across different data space instances Dataspace Protocol V1.0 → ISO Standard Control Plane (one standard procedure to negotiate data sharing) Data Plane (several possible for different data sharing scenarios: confidential data sharing, streaming data, event based data, edge devices, …) Control Plane decides who can access the data and how.​ Data Plane is where the action (data sharing) happens. Conceptually divided, can be combined practically 11 Check Dataspace Protocol:
  • 12. The key to data spaces is the data connector Make the connection and enable data economy » Connects participants in a data space – to share, utilize, benefit from data. » Ensures trust through IDS Certification and cyber security assessment. » Connects to trust frameworks and identity management » Includes identity & policy management, ensures data usage control. » Guarantees interoperability. » Understands and enforces data usage policies. » Master for other connectors of diverse feature sets. IDSA Story 12
  • 13. 13 The connector – functional components System Layer – The Connector To the Data Space To your systems • Software component that is being defined by IDSA community since 2016 • Enables data sharing between different parties under predefined policies • Strictly controlled environment to enable trust and data sovereignty
  • 14. 14 IDSA on its way to a global standard A holistic approach to bring data spaces to global scale IDSA Rulebook for holistic governance view Reference Architecture as technology-agnostic framework on conceptual model Fostering market adoption: Increasing readiness level and extensive use of IDS concepts Dataspace Protocol as detailed specification and essence for interoperability Global Standardization Diverse landscape of usable components and radar as orientation for ecosystem building and future investments Running Data Spaces as impressive impact stories Certification for reliable, industry grade components Aligning architectures, market proliferation and thought leadership on data spaces + +
  • 15. 15 Build and use the Dataspace Protocol Let’s make data spaces fly • Integrate the Dataspace Protocol in your work • Actively contribute to the development of the Dataspace Protocol • Join discussions, track issues, and review the evolution of the protocol through commits and updates. https://github.com/International-Data-Spaces-Association/ids-specification • Explore the IDS Knowledge Base on Gitbook for comprehensive documentation and specifications of the Dataspace Protocol, in an easier to read format. • https://docs.internationaldataspaces.org/id s-knowledgebase/v/dataspace-protocol/
  • 16. » We all believe in data spaces as enabler for our future wealth.
  • 17. // 17 THORSTEN HUELSMANN MANAGING DIRECTOR INTERNATIONAL DATA SPACES ASSOCIATION WWW.LINKEDIN.COM/IN/HUELSMANNT/ THORSTEN.HUELSMANN@INTERNATIONALDATASPACES.ORG www.linkedin.com/company/international -data-spaces-association www.internationaldataspaces.org International Data Spaces Association JOIN US! @