SlideShare a Scribd company logo
1 of 32
Download to read offline
A NEW IDEA FOR SHARING DATA - INTRODUCTION TO INDUSTRIAL DATA SPACE
WEBINAR
BY LARS NAGEL, SEBASTIAN STEINBUSS AND THORSTEN HUELSMANN, INDUSTRIAL DATA SPACE ASSOCIATION
INDUSTRIAL DATA SPACE
AN ECONOMIC ASSET
DATA
The key focus for a data-driven economy and
new business models is in linking data.
SENSOR DATAMATERIAL CHARACTERISTICSMOBILITY DATAFINANCIAL DATATECHNICAL DRAWINGS
Interoperability
Data Exchange
»Sharing Economy«
Data Centric
Services
Data Ownership
Data Security
Data Value
WITHOUT REGRET
COMPANIES WANT TO LINK DATA
www.industrialdataspace.org // 4
‘‘HOW TO‘‘ DATA ECONOMY
UNLEASH THE VALUE OF YOUR DATA
1. Make data available
2. Link with ecosystem
partners
3. Control the access
to your data
4. Create value
www.industrialdataspace.org
INDUSTRIAL DATA SPACE APPROACH:
// 5
SELF DETERMINED CONTROL OF DATA FLOWS
Endless Connectivity
standard for data flows between
all kinds of data endpoints
Trust between different
security domains
Comprehensive security functions
providing a maximum level of trust
Governance for the
data economy
usage control and enforcement
for data flows
www.industrialdataspace.org // 6
TO DO LIST
INDUSTRY 4.0 AND DATA ECONOMY
Everything needs to be secure
• Authentification & Authorisation
• Usage Policies & Usage Enforcement
• Trustworthy Communication
• Security by Design
• Techn. Certification
SECURITY
Connection of every data endpoint
• Integration of existing vocabularies
• Using different data formats
• Connection of clouds and platforms
STANDARDIZED
CONNECTIVITY Data is being traded as an asset
• Clearing & Billing
• Domain specific Broker and
Marketplaces
• Use Restrictions and Legal
Aspects (Contract Templates,
etc.)
DATA MARKETS
Being able to explain, find and
understand data
• Data source description
• Brokering
• Vocabulary
ECOSYSTEM OF DATA
Typical tasks can be solved
easier with apps
• Processing of Data
• Remote Execution
VALUE ADDING APPS
Trust is the basis of the IDS
• Identitymanagement
• User-certification
TRUST
1 2 3
4 5 6
www.industrialdataspace.org // 7
80+
Companies and
Organisations
5
Working Groups
20+
Use
Cases
1
Ecosystem
=
www.industrialdataspace.org // 8
MILESTONES REACHED
AND NEXT STEPS
ARCHITECTURE
Release of the
reference architecture
model 2.0 on
Hannover Fair
INTERNATIONAL
Members all over the
world, connecting with
important initiatives,
major european RTOs,
intense engagement in
european research
activities
STANDARD
Foundation of a
workinggroup at DIN to
create a DIN
specification for the IDS
connector
GO LIVE
Ecosystem potentially
running, first products,
enhancing global
adoption
www.industrialdataspace.org // 9
OUR USE CASES MAKE IT HAPPEN
ADOPTION OF INDUSTRIAL DATA SPACE
Build up an ecosystem by
integrating further partners (also
from different domains)
Setup use cases to validate and
implement Industrial Data Space
technology
Each member of the association
realizes a business driven use case
!
!
+
+
+
// 10
JOIN US
!LARS NAGEL
MANAGING DIRECTOR
INDUSTRIAL DATA SPACE ASSOCIATION
WWW.LINKEDIN.COM/IN/LARS-NAGEL-704411B8/
JOSEPH-VON-FRAUNHOFER-STR. 2-4
44227 DORTMUND | GERMANY
+49 231 9743 619
INFO@INDUSTRIALDATASPACE.ORG
@ids_association
#industrialdataspace
www.industrialdataspace.org
Ressource Hub – Press Area – Blog
// 11
INDUSTRIAL DATA
SPACE
BASIC IDEAS OF THE
IDS ARCHITECTURE
www.industrialdataspace.org // 12
ARCHITECTURE FOR DATA AND DATA SERVICES
AN INFRASTRUCTURE FOR ALL INDUSTRIES AND DOMAINS
Automotive
Electronics
and IT Logistics Retail and Food Health
… (other
Industries)
Smart-Service-Scenarios
Service and product innovations
»Smart Data Services« (alerting, monitoring, data quality etc.)
»Basic Data Services« (information fusion, mapping, aggregation etc.)
Internet of Things ∙ broad band infrastructure ∙ 5G
Real Time Area ∙ sensors, actuators, devices
Architecturelevel
INDUSTRIAL DATA SPACE
www.industrialdataspace.org // 13
INDUSTRIAL DATA SPACE
P2P NETWORK OF TRUSTED DATA
Security
Data
exchange
Trust
Certified
Participants
Decentral
Approach
distributed
architecture
Sovereignty
over data
and services
Data Governance
“rules of
the game”
Economies of
scale
Networking
effects
Open
Approach
Neutral and
user-driven Network
of platforms
and services
• All actors oblige
themselves to play by the
rules of Industrial Data
Space
• Actors and technical
components are to be
certified
• We provide usage control
for data and different
tailor-made levels of trust
www.industrialdataspace.org // 14
A TRUSTED PEER TO PEER NETWORK
FOR ALL INDUSTRIES TO SHARE DATA
 Software components enable
all stakeholders (defined
roles) to participate in IDS
 The quantity of all (external)
IDS connectors defines the
Industrial Data Space
 Internal IDS connectors are
used to link data sources in
the company, to transform
and to improve them.
© Fraunhofer
www.industrialdataspace.org // 15Source: Fraunhofer – IDS Reference
Architecture, 2017
INTERACTION OF SYSTEMS
BrokerApp
Store
Data
Source Connector
Data Provider Data Consumer
Dataset(s) transferred from
Provider to Consumer
Metadata Description of
Datasets/Provider/Consumer
Application for specific data
manipulation
Data exchange (active)
App download
Metadata exchange
Data exchange (inactive)
Connector Data
Sink
Connector
Meta
Meta
Meta
Meta
Meta
Peer-to-peer
nodes
App
Data
Meta
App
App
App
App
Data
Meta
Connector:
Gives access to the
Industrial Data Space
Broker:
Manages Metadata of
Connectors and Participants
AppStore:
Provides Apps and Vocabularies
www.industrialdataspace.org // 16
REFERENCE ARCHITECURE OF A CONNECTOR
Execution Core Container:
Basic functionality for connectivity
App Store Container:
Environment for Custom Apps to
extend functionality
Custom Container:
Adapter for internal systems
Configuration Manager
Environment for Configurations,
e.g. Process based, Rules oriented
www.industrialdataspace.org // 17Source: Fraunhofer – IDS Reference
Architecture, 2017
REFERENCE ARCHITECURE OF A CONNECTOR
INDIVIDUAL SETUP WITH APPS
Application Container Management
Core OS
Core IDS Container
API for user defined containers
(e.g. Data Apps, System Adapters)
Virtualization
MessageHandling
Message Router
Message Bus
…
IDS Data Core
(e.g. IDS Vocabulary,
GS1 XML)
Data App
(e.g. Protocol
Transformation)
Data App
(e.g. Data
Transformation)
Data App
(e.g.
pseudonymization)
Data App
(e.g. Aggregation)
Data App
(e.g. Analytics)
Data App
(e.g. I18N)
www.industrialdataspace.org // 18
DATA EXCHANGE
Big Data
Analytics
App
(Trusted)
Metatag
App
Application Container Management
Core OS
Core IDS
Container
Application Container Management (Trusted)
Core OS (Trusted)
Core IDS
Container
(Trusted)
Data Consumer
Connec-
tivity App
Encrypted Connection
Query
Authentication and
Authorization
Data
Facility
QueryData
Result
Internal
Interface
Data Provider
• Data Consumer queries data from Data Provider
• Data Provider validates the query and provides data for Data Consumer
• Data Consumer has access to the result, depending on data visibility
www.industrialdataspace.org // 19
REMOTE DATA PROCESSING
Application Container Management (Trusted)
Core OS (Trusted)
Core IDS
Container
(Trusted)
Application Container Management (Trusted)
Core OS (Trusted)
Core IDS
Container
(Trusted)
Data Consumer Data Provider
Connec-
tivity App
Encypted Connection
Query
Authentication and
Authorization
Result
Facility
QueryData
Result
Internal
Interface
Remotely
Executed
App
(Trusted)
App provisioning
Data
• Data Consumer queries data from data provider and provides App (e.g.
analytics)
• Data Provider queries data and provides data to localy provided App
• The result set leaves the connector of the Data Provider and is available
for the Data Consumer
www.industrialdataspace.org // 20Source: Fraunhofer – IDS internal documentation, to
be published in Reference Architecture 2018
DATA USAGE CONTROL
USAGE CONTROL VS. ACCESS CONTROL
 Usage Control – a generalization of access control
 Fine-grained policies specify how data is handled after access has been granted
www.industrialdataspace.org // 21Source: Fraunhofer – IDS internal documentation, to
be published in Reference Architecture 2018
DATA USAGE CONTROL
BULDING BLOCKS
 Enforcement (technology-dependent components)
 Policy Enforcement Point (PEP): intercepts data
flows and enforces decision from PDP
 Policy Execution Point (PXP): performs actions in the system
 Decision and Enforcement (technology-independent components)
 Policy Decision Point (PDP): decision engine (e.g., rule based)
 Policy Information Point (PIP): provides additional information for decision making
 Specification and Management
 Policy Management Point (PMP): manages policies and components
 Policy Administration Point (PAP): user interface for policy specification (e.g., Policy Editor)
www.industrialdataspace.org // 22Source: Fraunhofer – IDS internal documentation, to
be published in Reference Architecture 2018
DATA USAGE CONTROL
TECHNICAL ENFORCEMENT, ORGANIZATIONAL RULES,
AND LEGAL CONTRACTS
 Usage Control extends, substitutes, and completes organizational rules/legal contracts
 Long term: replacement of organizational rules / legal contracts by technical enforcement
www.industrialdataspace.org // 23Source: Fraunhofer – IDS internal documentation, to
be published in Reference Architecture 2018
DATA USAGE CONTROL
ENFORCEMENT EXAMPLE
PEP and PXP within IDS Connector
PEP controlling data flow
PXP triggering delete action
www.industrialdataspace.org // 24Source: Fraunhofer – IDS internal documentation, to
be published in Reference Architecture 2018
DATA USAGE CONTROL
USAGE CONTROL TECHNOLOGIES IN THE INDUSTRIAL
DATA SPACE
 Integrated Distributed Data Usage Control
Enforcement (IND²UCE)
Fraunhofer IESE
 Label-based Usage Control (LUCON)
Fraunhofer AISEC
 Information Flow Tracking (IFT)/
Provenance Tracking
Fraunhofer IOSB
www.industrialdataspace.org // 25Source: Fraunhofer – IDS Reference
Architecture, 2017
IDENTIFICATION PROCESS
THE IDS HANDSHAKE
Prerequisites:
Certification of
Participants and Connectors
Handshake:
1. Establish Secure connection
based on IDS X.509 certificates
2. Request Self Assessment (IDS InfoModel)
3. Validate against Identity Provider
4. Check if partner is trustworthy
5. Check if provided data is consumable
6. Exchange data
www.industrialdataspace.org // 26Source: Fraunhofer – IDS internal documentation, to
be published in Reference Architecture 2018
IDS API
THE IDS PROVIDES AN API FOR YOUR API
www.industrialdataspace.org // 27Source: Fraunhofer – IDS internal documentation, to
be published in Reference Architecture 2018
INDUSTRIAL DATA SPACE INFORMATION MODEL
HIGH LEVEL VIEW / DOMAINS
www.industrialdataspace.org // 28Source: Fraunhofer – IDS internal documentation, to
be published in Reference Architecture 2018
INDUSTRIAL DATA SPACE INFORMATION MODEL
DATA PRODUCTS
www.industrialdataspace.org // 29Source: Fraunhofer – IDS internal documentation, to
be published in Reference Architecture 2018
INDUSTRIAL DATA SPACE INFORMATION MODEL
HERE IS YOUR API
www.industrialdataspace.org // 30
SECURITY PROFILES
APPROACH
1. Use Cases:
Driven by Use Cases
2. Dimensions
Identified:
• Development
• Roles
• Communication Abilities
• Higher Security Classes
3. Security Profiles
Important Insights:
• 4 Profiles Base Free, Base, Trust, Trust+
• All Connectors (not Base Free) can communicate in public IDS
• Base Free is public available
Development
Higher Security Classes
Trust+
Trust
Base
BaseFree
Public IDSDIY
www.industrialdataspace.org // 31
SECURITY PROFILES
BASE FREE, BASE, TRUST, TRUST+
Base Free Base Trust (Managed)Trust+
Reference
Development
Open Source IDS Community IDS Community Bound to strong SLAs
Roles Own infrastructure All IDS Roles supported,
Billing and Clearing
optional
All IDS Roles supported All IDS Roles supported
Communication
Abilities
Only private IDS with
self signed certificates
Full interoperable,
reduced trust
Full interoperable, Free
decision of
communication
Full interoperable, Free
decision of
communication,
Hardware anchor
Higher Security
Classes
Standard Security Level
required
Standard Security Level
required
High Security Level Higher Security Level
// 32
JOIN US
!SEBASTIAN STEINBUSS
LEAD ARCHITECT
INDUSTRIAL DATA SPACE ASSOCIATION
WWW.LINKEDIN.COM/IN/SEBASTIAN-STEINBUSS/
@SSTEINBUSS
JOSEPH-VON-FRAUNHOFER-STR. 2-4
44227 DORTMUND | GERMANY
+49 231 97677 428
SEBASTIAN.STEINBUSS@INDUSTRIALDATASPACE.ORG
@ids_association
#industrialdataspace
www.industrialdataspace.org
Ressource Hub – Press Area – Blog

More Related Content

What's hot

Industrial Data Management and Digitization
Industrial Data Management and DigitizationIndustrial Data Management and Digitization
Industrial Data Management and DigitizationBoris Otto
 
Industry 4.0: Smart Service with InsideOut Ecosystem
Industry 4.0: Smart Service with InsideOut EcosystemIndustry 4.0: Smart Service with InsideOut Ecosystem
Industry 4.0: Smart Service with InsideOut EcosystemDr. Paul Gromball
 
Industrial Data Space: Digital Sovereignty for Industry 4.0 and Smart Services
Industrial Data Space: Digital Sovereignty for Industry 4.0 and Smart ServicesIndustrial Data Space: Digital Sovereignty for Industry 4.0 and Smart Services
Industrial Data Space: Digital Sovereignty for Industry 4.0 and Smart ServicesBoris Otto
 
Shared Digital Twins: Collaboration in Ecosystems
Shared Digital Twins: Collaboration in EcosystemsShared Digital Twins: Collaboration in Ecosystems
Shared Digital Twins: Collaboration in EcosystemsBoris Otto
 
International Data Spaces: Data Sovereignty and Interoperability for Business...
International Data Spaces: Data Sovereignty and Interoperability for Business...International Data Spaces: Data Sovereignty and Interoperability for Business...
International Data Spaces: Data Sovereignty and Interoperability for Business...Boris Otto
 
Industrial Data Space
Industrial Data SpaceIndustrial Data Space
Industrial Data SpaceBoris Otto
 
Towards a European Industrial Data Space: The Boost 4.0 Initiative
Towards a European Industrial Data Space: The Boost 4.0 InitiativeTowards a European Industrial Data Space: The Boost 4.0 Initiative
Towards a European Industrial Data Space: The Boost 4.0 InitiativeBoost40
 
Enabling the Industry 4.0 vision: Hype? Real Opportunity!
Enabling the Industry 4.0 vision: Hype? Real Opportunity!Enabling the Industry 4.0 vision: Hype? Real Opportunity!
Enabling the Industry 4.0 vision: Hype? Real Opportunity!Boris Otto
 
Introduction to Industrial Data Space Initiative
Introduction to Industrial Data Space InitiativeIntroduction to Industrial Data Space Initiative
Introduction to Industrial Data Space InitiativeBoost40
 
Beyond the Vision: Realizing the Promise of Industry 4.0
Beyond the Vision: Realizing the Promise of Industry 4.0Beyond the Vision: Realizing the Promise of Industry 4.0
Beyond the Vision: Realizing the Promise of Industry 4.0Cognizant
 
IDS@BKM: Gaining Transparency in Automotive Supply Chains
IDS@BKM: Gaining Transparency in Automotive Supply ChainsIDS@BKM: Gaining Transparency in Automotive Supply Chains
IDS@BKM: Gaining Transparency in Automotive Supply ChainsSebastian Opriel
 
IGNITE 2015 Valentijn de Leeuw - Industry 4.0: The industrial Internet of Things
IGNITE 2015 Valentijn de Leeuw - Industry 4.0: The industrial Internet of ThingsIGNITE 2015 Valentijn de Leeuw - Industry 4.0: The industrial Internet of Things
IGNITE 2015 Valentijn de Leeuw - Industry 4.0: The industrial Internet of ThingsElemica
 
Digitising European Industry & Digital Manufacturing Platforms
Digitising European Industry & Digital Manufacturing Platforms Digitising European Industry & Digital Manufacturing Platforms
Digitising European Industry & Digital Manufacturing Platforms Boost40
 
Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...
Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...
Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...MicheleNati
 
Evolution of Data Spaces
Evolution of Data SpacesEvolution of Data Spaces
Evolution of Data SpacesBoris Otto
 
Industria Conectada 4.0 National Strategy
Industria Conectada 4.0 National StrategyIndustria Conectada 4.0 National Strategy
Industria Conectada 4.0 National StrategyBoost40
 
Basque Industry 4.0 Strategy
Basque Industry 4.0 Strategy Basque Industry 4.0 Strategy
Basque Industry 4.0 Strategy Boost40
 
Industry 4.0 - Enabling Intelligent Connectivity
Industry 4.0 - Enabling Intelligent ConnectivityIndustry 4.0 - Enabling Intelligent Connectivity
Industry 4.0 - Enabling Intelligent ConnectivityForest Interactive
 

What's hot (20)

Industrial Data Management and Digitization
Industrial Data Management and DigitizationIndustrial Data Management and Digitization
Industrial Data Management and Digitization
 
Industry 4.0: Smart Service with InsideOut Ecosystem
Industry 4.0: Smart Service with InsideOut EcosystemIndustry 4.0: Smart Service with InsideOut Ecosystem
Industry 4.0: Smart Service with InsideOut Ecosystem
 
Industrial Data Space: Digital Sovereignty for Industry 4.0 and Smart Services
Industrial Data Space: Digital Sovereignty for Industry 4.0 and Smart ServicesIndustrial Data Space: Digital Sovereignty for Industry 4.0 and Smart Services
Industrial Data Space: Digital Sovereignty for Industry 4.0 and Smart Services
 
Shared Digital Twins: Collaboration in Ecosystems
Shared Digital Twins: Collaboration in EcosystemsShared Digital Twins: Collaboration in Ecosystems
Shared Digital Twins: Collaboration in Ecosystems
 
International Data Spaces: Data Sovereignty and Interoperability for Business...
International Data Spaces: Data Sovereignty and Interoperability for Business...International Data Spaces: Data Sovereignty and Interoperability for Business...
International Data Spaces: Data Sovereignty and Interoperability for Business...
 
Industrial Data Space
Industrial Data SpaceIndustrial Data Space
Industrial Data Space
 
Towards a European Industrial Data Space: The Boost 4.0 Initiative
Towards a European Industrial Data Space: The Boost 4.0 InitiativeTowards a European Industrial Data Space: The Boost 4.0 Initiative
Towards a European Industrial Data Space: The Boost 4.0 Initiative
 
A Multi-agent Approach for Processing Industrial Enterprise Data
A Multi-agent Approach for Processing Industrial Enterprise DataA Multi-agent Approach for Processing Industrial Enterprise Data
A Multi-agent Approach for Processing Industrial Enterprise Data
 
Enabling the Industry 4.0 vision: Hype? Real Opportunity!
Enabling the Industry 4.0 vision: Hype? Real Opportunity!Enabling the Industry 4.0 vision: Hype? Real Opportunity!
Enabling the Industry 4.0 vision: Hype? Real Opportunity!
 
Introduction to Industrial Data Space Initiative
Introduction to Industrial Data Space InitiativeIntroduction to Industrial Data Space Initiative
Introduction to Industrial Data Space Initiative
 
Beyond the Vision: Realizing the Promise of Industry 4.0
Beyond the Vision: Realizing the Promise of Industry 4.0Beyond the Vision: Realizing the Promise of Industry 4.0
Beyond the Vision: Realizing the Promise of Industry 4.0
 
IDS@BKM: Gaining Transparency in Automotive Supply Chains
IDS@BKM: Gaining Transparency in Automotive Supply ChainsIDS@BKM: Gaining Transparency in Automotive Supply Chains
IDS@BKM: Gaining Transparency in Automotive Supply Chains
 
IGNITE 2015 Valentijn de Leeuw - Industry 4.0: The industrial Internet of Things
IGNITE 2015 Valentijn de Leeuw - Industry 4.0: The industrial Internet of ThingsIGNITE 2015 Valentijn de Leeuw - Industry 4.0: The industrial Internet of Things
IGNITE 2015 Valentijn de Leeuw - Industry 4.0: The industrial Internet of Things
 
Digitising European Industry & Digital Manufacturing Platforms
Digitising European Industry & Digital Manufacturing Platforms Digitising European Industry & Digital Manufacturing Platforms
Digitising European Industry & Digital Manufacturing Platforms
 
Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...
Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...
Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...
 
Evolution of Data Spaces
Evolution of Data SpacesEvolution of Data Spaces
Evolution of Data Spaces
 
Industria Conectada 4.0 National Strategy
Industria Conectada 4.0 National StrategyIndustria Conectada 4.0 National Strategy
Industria Conectada 4.0 National Strategy
 
Basque Industry 4.0 Strategy
Basque Industry 4.0 Strategy Basque Industry 4.0 Strategy
Basque Industry 4.0 Strategy
 
Industry 4.0 - Enabling Intelligent Connectivity
Industry 4.0 - Enabling Intelligent ConnectivityIndustry 4.0 - Enabling Intelligent Connectivity
Industry 4.0 - Enabling Intelligent Connectivity
 
RDA ICT Technical Specifications
RDA ICT Technical SpecificationsRDA ICT Technical Specifications
RDA ICT Technical Specifications
 

Similar to Webinar Industrial Data Space Association: Introduction and Architecture

FIWARE Tech Summit - Industrial Data Space - a New Idea For Sharing Data
FIWARE Tech Summit - Industrial Data Space - a New Idea For Sharing DataFIWARE Tech Summit - Industrial Data Space - a New Idea For Sharing Data
FIWARE Tech Summit - Industrial Data Space - a New Idea For Sharing DataFIWARE
 
Lange - Industrial Data Space – Digital Sovereignty over Data
Lange - Industrial Data Space – Digital Sovereignty over DataLange - Industrial Data Space – Digital Sovereignty over Data
Lange - Industrial Data Space – Digital Sovereignty over DataVienna Data Science Group
 
Idsa, smau, milano, 2019 10-24
Idsa, smau, milano, 2019 10-24Idsa, smau, milano, 2019 10-24
Idsa, smau, milano, 2019 10-24Nadia Fabrizio
 
OSFair2017 Workshop | Industrial Data Space: A new idea for sharing data
OSFair2017 Workshop | Industrial Data Space: A new idea for sharing dataOSFair2017 Workshop | Industrial Data Space: A new idea for sharing data
OSFair2017 Workshop | Industrial Data Space: A new idea for sharing dataOpen Science Fair
 
Tag.bio: Self Service Data Mesh Platform
Tag.bio: Self Service Data Mesh PlatformTag.bio: Self Service Data Mesh Platform
Tag.bio: Self Service Data Mesh PlatformSanjay Padhi, Ph.D
 
Data Virtualization: An Introduction
Data Virtualization: An IntroductionData Virtualization: An Introduction
Data Virtualization: An IntroductionDenodo
 
FIWARE Global Summit - International Data Spaces - A New Idea for Sharing Data
FIWARE Global Summit - International Data Spaces - A New Idea for Sharing DataFIWARE Global Summit - International Data Spaces - A New Idea for Sharing Data
FIWARE Global Summit - International Data Spaces - A New Idea for Sharing DataFIWARE
 
Hitachi Data Systems Big Data Roadmap
Hitachi Data Systems Big Data RoadmapHitachi Data Systems Big Data Roadmap
Hitachi Data Systems Big Data RoadmapHitachi Vantara
 
Big data presentation, explanations and use cases in industrial sector
Big data presentation, explanations and use cases in industrial sectorBig data presentation, explanations and use cases in industrial sector
Big data presentation, explanations and use cases in industrial sectorNicolas Sarramagna
 
Breaking up the silos - Utilizing data across companies and domains - Reflect...
Breaking up the silos - Utilizing data across companies and domains - Reflect...Breaking up the silos - Utilizing data across companies and domains - Reflect...
Breaking up the silos - Utilizing data across companies and domains - Reflect...Symposium on Society 5.0
 
Denodo Partner Connect: A Review of the Top 5 Differentiated Use Cases for th...
Denodo Partner Connect: A Review of the Top 5 Differentiated Use Cases for th...Denodo Partner Connect: A Review of the Top 5 Differentiated Use Cases for th...
Denodo Partner Connect: A Review of the Top 5 Differentiated Use Cases for th...Denodo
 
Computer aided design, computer aided manufacturing, computer aided engineering
Computer aided design, computer aided manufacturing, computer aided engineeringComputer aided design, computer aided manufacturing, computer aided engineering
Computer aided design, computer aided manufacturing, computer aided engineeringuniversity of sust.
 
Fast Data Strategy Houston Roadshow Presentation
Fast Data Strategy Houston Roadshow PresentationFast Data Strategy Houston Roadshow Presentation
Fast Data Strategy Houston Roadshow PresentationDenodo
 
Meeting today’s dissemination challenges – Implementing International Standar...
Meeting today’s dissemination challenges – Implementing International Standar...Meeting today’s dissemination challenges – Implementing International Standar...
Meeting today’s dissemination challenges – Implementing International Standar...Jonathan Challener
 
Apache Spark + AI Helps and FDA Protects the Nation with Jonathan Chu and Kun...
Apache Spark + AI Helps and FDA Protects the Nation with Jonathan Chu and Kun...Apache Spark + AI Helps and FDA Protects the Nation with Jonathan Chu and Kun...
Apache Spark + AI Helps and FDA Protects the Nation with Jonathan Chu and Kun...Databricks
 
Logical Data Fabric: Architectural Components
Logical Data Fabric: Architectural ComponentsLogical Data Fabric: Architectural Components
Logical Data Fabric: Architectural ComponentsDenodo
 
Future of Data Strategy (ASEAN)
Future of Data Strategy (ASEAN)Future of Data Strategy (ASEAN)
Future of Data Strategy (ASEAN)Denodo
 
How the IDS-RAM Standard contributes to European Data Spaces
How the IDS-RAM Standard contributes to European Data SpacesHow the IDS-RAM Standard contributes to European Data Spaces
How the IDS-RAM Standard contributes to European Data SpacesOPEN DEI
 
Putting the L in front: from Open Data to Linked Open Data
Putting the L in front: from Open Data to Linked Open DataPutting the L in front: from Open Data to Linked Open Data
Putting the L in front: from Open Data to Linked Open DataMartin Kaltenböck
 

Similar to Webinar Industrial Data Space Association: Introduction and Architecture (20)

FIWARE Tech Summit - Industrial Data Space - a New Idea For Sharing Data
FIWARE Tech Summit - Industrial Data Space - a New Idea For Sharing DataFIWARE Tech Summit - Industrial Data Space - a New Idea For Sharing Data
FIWARE Tech Summit - Industrial Data Space - a New Idea For Sharing Data
 
Lange - Industrial Data Space – Digital Sovereignty over Data
Lange - Industrial Data Space – Digital Sovereignty over DataLange - Industrial Data Space – Digital Sovereignty over Data
Lange - Industrial Data Space – Digital Sovereignty over Data
 
Idsa, smau, milano, 2019 10-24
Idsa, smau, milano, 2019 10-24Idsa, smau, milano, 2019 10-24
Idsa, smau, milano, 2019 10-24
 
OSFair2017 Workshop | Industrial Data Space: A new idea for sharing data
OSFair2017 Workshop | Industrial Data Space: A new idea for sharing dataOSFair2017 Workshop | Industrial Data Space: A new idea for sharing data
OSFair2017 Workshop | Industrial Data Space: A new idea for sharing data
 
Tag.bio: Self Service Data Mesh Platform
Tag.bio: Self Service Data Mesh PlatformTag.bio: Self Service Data Mesh Platform
Tag.bio: Self Service Data Mesh Platform
 
Data Virtualization: An Introduction
Data Virtualization: An IntroductionData Virtualization: An Introduction
Data Virtualization: An Introduction
 
Hybrid Cloud Strategy for Big Data and Analytics
Hybrid Cloud Strategy for Big Data and Analytics Hybrid Cloud Strategy for Big Data and Analytics
Hybrid Cloud Strategy for Big Data and Analytics
 
FIWARE Global Summit - International Data Spaces - A New Idea for Sharing Data
FIWARE Global Summit - International Data Spaces - A New Idea for Sharing DataFIWARE Global Summit - International Data Spaces - A New Idea for Sharing Data
FIWARE Global Summit - International Data Spaces - A New Idea for Sharing Data
 
Hitachi Data Systems Big Data Roadmap
Hitachi Data Systems Big Data RoadmapHitachi Data Systems Big Data Roadmap
Hitachi Data Systems Big Data Roadmap
 
Big data presentation, explanations and use cases in industrial sector
Big data presentation, explanations and use cases in industrial sectorBig data presentation, explanations and use cases in industrial sector
Big data presentation, explanations and use cases in industrial sector
 
Breaking up the silos - Utilizing data across companies and domains - Reflect...
Breaking up the silos - Utilizing data across companies and domains - Reflect...Breaking up the silos - Utilizing data across companies and domains - Reflect...
Breaking up the silos - Utilizing data across companies and domains - Reflect...
 
Denodo Partner Connect: A Review of the Top 5 Differentiated Use Cases for th...
Denodo Partner Connect: A Review of the Top 5 Differentiated Use Cases for th...Denodo Partner Connect: A Review of the Top 5 Differentiated Use Cases for th...
Denodo Partner Connect: A Review of the Top 5 Differentiated Use Cases for th...
 
Computer aided design, computer aided manufacturing, computer aided engineering
Computer aided design, computer aided manufacturing, computer aided engineeringComputer aided design, computer aided manufacturing, computer aided engineering
Computer aided design, computer aided manufacturing, computer aided engineering
 
Fast Data Strategy Houston Roadshow Presentation
Fast Data Strategy Houston Roadshow PresentationFast Data Strategy Houston Roadshow Presentation
Fast Data Strategy Houston Roadshow Presentation
 
Meeting today’s dissemination challenges – Implementing International Standar...
Meeting today’s dissemination challenges – Implementing International Standar...Meeting today’s dissemination challenges – Implementing International Standar...
Meeting today’s dissemination challenges – Implementing International Standar...
 
Apache Spark + AI Helps and FDA Protects the Nation with Jonathan Chu and Kun...
Apache Spark + AI Helps and FDA Protects the Nation with Jonathan Chu and Kun...Apache Spark + AI Helps and FDA Protects the Nation with Jonathan Chu and Kun...
Apache Spark + AI Helps and FDA Protects the Nation with Jonathan Chu and Kun...
 
Logical Data Fabric: Architectural Components
Logical Data Fabric: Architectural ComponentsLogical Data Fabric: Architectural Components
Logical Data Fabric: Architectural Components
 
Future of Data Strategy (ASEAN)
Future of Data Strategy (ASEAN)Future of Data Strategy (ASEAN)
Future of Data Strategy (ASEAN)
 
How the IDS-RAM Standard contributes to European Data Spaces
How the IDS-RAM Standard contributes to European Data SpacesHow the IDS-RAM Standard contributes to European Data Spaces
How the IDS-RAM Standard contributes to European Data Spaces
 
Putting the L in front: from Open Data to Linked Open Data
Putting the L in front: from Open Data to Linked Open DataPutting the L in front: from Open Data to Linked Open Data
Putting the L in front: from Open Data to Linked Open Data
 

More from Thorsten Huelsmann

Establishing data sharing standards to promote global industry development
Establishing data sharing standards to promote global industry developmentEstablishing data sharing standards to promote global industry development
Establishing data sharing standards to promote global industry developmentThorsten Huelsmann
 
EffizienzCluster Management GmbH
EffizienzCluster Management GmbHEffizienzCluster Management GmbH
EffizienzCluster Management GmbHThorsten Huelsmann
 
Digital Hub Dortmund - A Digital Innovation Hub on Enabling Technologies in L...
Digital Hub Dortmund - A Digital Innovation Hub on Enabling Technologies in L...Digital Hub Dortmund - A Digital Innovation Hub on Enabling Technologies in L...
Digital Hub Dortmund - A Digital Innovation Hub on Enabling Technologies in L...Thorsten Huelsmann
 
EffizienzCluster Management - Die Innovationsprozessbegleiter
EffizienzCluster Management - Die InnovationsprozessbegleiterEffizienzCluster Management - Die Innovationsprozessbegleiter
EffizienzCluster Management - Die InnovationsprozessbegleiterThorsten Huelsmann
 
Digital Hub Logistics Dortmund as Cluster Upgrade
Digital Hub Logistics Dortmund as Cluster UpgradeDigital Hub Logistics Dortmund as Cluster Upgrade
Digital Hub Logistics Dortmund as Cluster UpgradeThorsten Huelsmann
 
Industrie 4.0 – Angebote für den Mittelstand
Industrie 4.0 – Angebote für den MittelstandIndustrie 4.0 – Angebote für den Mittelstand
Industrie 4.0 – Angebote für den MittelstandThorsten Huelsmann
 
Logistics 4.0 and the Internet of Things
Logistics 4.0 and the Internet of ThingsLogistics 4.0 and the Internet of Things
Logistics 4.0 and the Internet of ThingsThorsten Huelsmann
 

More from Thorsten Huelsmann (7)

Establishing data sharing standards to promote global industry development
Establishing data sharing standards to promote global industry developmentEstablishing data sharing standards to promote global industry development
Establishing data sharing standards to promote global industry development
 
EffizienzCluster Management GmbH
EffizienzCluster Management GmbHEffizienzCluster Management GmbH
EffizienzCluster Management GmbH
 
Digital Hub Dortmund - A Digital Innovation Hub on Enabling Technologies in L...
Digital Hub Dortmund - A Digital Innovation Hub on Enabling Technologies in L...Digital Hub Dortmund - A Digital Innovation Hub on Enabling Technologies in L...
Digital Hub Dortmund - A Digital Innovation Hub on Enabling Technologies in L...
 
EffizienzCluster Management - Die Innovationsprozessbegleiter
EffizienzCluster Management - Die InnovationsprozessbegleiterEffizienzCluster Management - Die Innovationsprozessbegleiter
EffizienzCluster Management - Die Innovationsprozessbegleiter
 
Digital Hub Logistics Dortmund as Cluster Upgrade
Digital Hub Logistics Dortmund as Cluster UpgradeDigital Hub Logistics Dortmund as Cluster Upgrade
Digital Hub Logistics Dortmund as Cluster Upgrade
 
Industrie 4.0 – Angebote für den Mittelstand
Industrie 4.0 – Angebote für den MittelstandIndustrie 4.0 – Angebote für den Mittelstand
Industrie 4.0 – Angebote für den Mittelstand
 
Logistics 4.0 and the Internet of Things
Logistics 4.0 and the Internet of ThingsLogistics 4.0 and the Internet of Things
Logistics 4.0 and the Internet of Things
 

Recently uploaded

Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 

Recently uploaded (20)

Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 

Webinar Industrial Data Space Association: Introduction and Architecture

  • 1. A NEW IDEA FOR SHARING DATA - INTRODUCTION TO INDUSTRIAL DATA SPACE WEBINAR BY LARS NAGEL, SEBASTIAN STEINBUSS AND THORSTEN HUELSMANN, INDUSTRIAL DATA SPACE ASSOCIATION INDUSTRIAL DATA SPACE
  • 2. AN ECONOMIC ASSET DATA The key focus for a data-driven economy and new business models is in linking data. SENSOR DATAMATERIAL CHARACTERISTICSMOBILITY DATAFINANCIAL DATATECHNICAL DRAWINGS
  • 3. Interoperability Data Exchange »Sharing Economy« Data Centric Services Data Ownership Data Security Data Value WITHOUT REGRET COMPANIES WANT TO LINK DATA
  • 4. www.industrialdataspace.org // 4 ‘‘HOW TO‘‘ DATA ECONOMY UNLEASH THE VALUE OF YOUR DATA 1. Make data available 2. Link with ecosystem partners 3. Control the access to your data 4. Create value
  • 5. www.industrialdataspace.org INDUSTRIAL DATA SPACE APPROACH: // 5 SELF DETERMINED CONTROL OF DATA FLOWS Endless Connectivity standard for data flows between all kinds of data endpoints Trust between different security domains Comprehensive security functions providing a maximum level of trust Governance for the data economy usage control and enforcement for data flows
  • 6. www.industrialdataspace.org // 6 TO DO LIST INDUSTRY 4.0 AND DATA ECONOMY Everything needs to be secure • Authentification & Authorisation • Usage Policies & Usage Enforcement • Trustworthy Communication • Security by Design • Techn. Certification SECURITY Connection of every data endpoint • Integration of existing vocabularies • Using different data formats • Connection of clouds and platforms STANDARDIZED CONNECTIVITY Data is being traded as an asset • Clearing & Billing • Domain specific Broker and Marketplaces • Use Restrictions and Legal Aspects (Contract Templates, etc.) DATA MARKETS Being able to explain, find and understand data • Data source description • Brokering • Vocabulary ECOSYSTEM OF DATA Typical tasks can be solved easier with apps • Processing of Data • Remote Execution VALUE ADDING APPS Trust is the basis of the IDS • Identitymanagement • User-certification TRUST 1 2 3 4 5 6
  • 7. www.industrialdataspace.org // 7 80+ Companies and Organisations 5 Working Groups 20+ Use Cases 1 Ecosystem =
  • 8. www.industrialdataspace.org // 8 MILESTONES REACHED AND NEXT STEPS ARCHITECTURE Release of the reference architecture model 2.0 on Hannover Fair INTERNATIONAL Members all over the world, connecting with important initiatives, major european RTOs, intense engagement in european research activities STANDARD Foundation of a workinggroup at DIN to create a DIN specification for the IDS connector GO LIVE Ecosystem potentially running, first products, enhancing global adoption
  • 9. www.industrialdataspace.org // 9 OUR USE CASES MAKE IT HAPPEN ADOPTION OF INDUSTRIAL DATA SPACE Build up an ecosystem by integrating further partners (also from different domains) Setup use cases to validate and implement Industrial Data Space technology Each member of the association realizes a business driven use case ! ! + + +
  • 10. // 10 JOIN US !LARS NAGEL MANAGING DIRECTOR INDUSTRIAL DATA SPACE ASSOCIATION WWW.LINKEDIN.COM/IN/LARS-NAGEL-704411B8/ JOSEPH-VON-FRAUNHOFER-STR. 2-4 44227 DORTMUND | GERMANY +49 231 9743 619 INFO@INDUSTRIALDATASPACE.ORG @ids_association #industrialdataspace www.industrialdataspace.org Ressource Hub – Press Area – Blog
  • 11. // 11 INDUSTRIAL DATA SPACE BASIC IDEAS OF THE IDS ARCHITECTURE
  • 12. www.industrialdataspace.org // 12 ARCHITECTURE FOR DATA AND DATA SERVICES AN INFRASTRUCTURE FOR ALL INDUSTRIES AND DOMAINS Automotive Electronics and IT Logistics Retail and Food Health … (other Industries) Smart-Service-Scenarios Service and product innovations »Smart Data Services« (alerting, monitoring, data quality etc.) »Basic Data Services« (information fusion, mapping, aggregation etc.) Internet of Things ∙ broad band infrastructure ∙ 5G Real Time Area ∙ sensors, actuators, devices Architecturelevel INDUSTRIAL DATA SPACE
  • 13. www.industrialdataspace.org // 13 INDUSTRIAL DATA SPACE P2P NETWORK OF TRUSTED DATA Security Data exchange Trust Certified Participants Decentral Approach distributed architecture Sovereignty over data and services Data Governance “rules of the game” Economies of scale Networking effects Open Approach Neutral and user-driven Network of platforms and services • All actors oblige themselves to play by the rules of Industrial Data Space • Actors and technical components are to be certified • We provide usage control for data and different tailor-made levels of trust
  • 14. www.industrialdataspace.org // 14 A TRUSTED PEER TO PEER NETWORK FOR ALL INDUSTRIES TO SHARE DATA  Software components enable all stakeholders (defined roles) to participate in IDS  The quantity of all (external) IDS connectors defines the Industrial Data Space  Internal IDS connectors are used to link data sources in the company, to transform and to improve them. © Fraunhofer
  • 15. www.industrialdataspace.org // 15Source: Fraunhofer – IDS Reference Architecture, 2017 INTERACTION OF SYSTEMS BrokerApp Store Data Source Connector Data Provider Data Consumer Dataset(s) transferred from Provider to Consumer Metadata Description of Datasets/Provider/Consumer Application for specific data manipulation Data exchange (active) App download Metadata exchange Data exchange (inactive) Connector Data Sink Connector Meta Meta Meta Meta Meta Peer-to-peer nodes App Data Meta App App App App Data Meta Connector: Gives access to the Industrial Data Space Broker: Manages Metadata of Connectors and Participants AppStore: Provides Apps and Vocabularies
  • 16. www.industrialdataspace.org // 16 REFERENCE ARCHITECURE OF A CONNECTOR Execution Core Container: Basic functionality for connectivity App Store Container: Environment for Custom Apps to extend functionality Custom Container: Adapter for internal systems Configuration Manager Environment for Configurations, e.g. Process based, Rules oriented
  • 17. www.industrialdataspace.org // 17Source: Fraunhofer – IDS Reference Architecture, 2017 REFERENCE ARCHITECURE OF A CONNECTOR INDIVIDUAL SETUP WITH APPS Application Container Management Core OS Core IDS Container API for user defined containers (e.g. Data Apps, System Adapters) Virtualization MessageHandling Message Router Message Bus … IDS Data Core (e.g. IDS Vocabulary, GS1 XML) Data App (e.g. Protocol Transformation) Data App (e.g. Data Transformation) Data App (e.g. pseudonymization) Data App (e.g. Aggregation) Data App (e.g. Analytics) Data App (e.g. I18N)
  • 18. www.industrialdataspace.org // 18 DATA EXCHANGE Big Data Analytics App (Trusted) Metatag App Application Container Management Core OS Core IDS Container Application Container Management (Trusted) Core OS (Trusted) Core IDS Container (Trusted) Data Consumer Connec- tivity App Encrypted Connection Query Authentication and Authorization Data Facility QueryData Result Internal Interface Data Provider • Data Consumer queries data from Data Provider • Data Provider validates the query and provides data for Data Consumer • Data Consumer has access to the result, depending on data visibility
  • 19. www.industrialdataspace.org // 19 REMOTE DATA PROCESSING Application Container Management (Trusted) Core OS (Trusted) Core IDS Container (Trusted) Application Container Management (Trusted) Core OS (Trusted) Core IDS Container (Trusted) Data Consumer Data Provider Connec- tivity App Encypted Connection Query Authentication and Authorization Result Facility QueryData Result Internal Interface Remotely Executed App (Trusted) App provisioning Data • Data Consumer queries data from data provider and provides App (e.g. analytics) • Data Provider queries data and provides data to localy provided App • The result set leaves the connector of the Data Provider and is available for the Data Consumer
  • 20. www.industrialdataspace.org // 20Source: Fraunhofer – IDS internal documentation, to be published in Reference Architecture 2018 DATA USAGE CONTROL USAGE CONTROL VS. ACCESS CONTROL  Usage Control – a generalization of access control  Fine-grained policies specify how data is handled after access has been granted
  • 21. www.industrialdataspace.org // 21Source: Fraunhofer – IDS internal documentation, to be published in Reference Architecture 2018 DATA USAGE CONTROL BULDING BLOCKS  Enforcement (technology-dependent components)  Policy Enforcement Point (PEP): intercepts data flows and enforces decision from PDP  Policy Execution Point (PXP): performs actions in the system  Decision and Enforcement (technology-independent components)  Policy Decision Point (PDP): decision engine (e.g., rule based)  Policy Information Point (PIP): provides additional information for decision making  Specification and Management  Policy Management Point (PMP): manages policies and components  Policy Administration Point (PAP): user interface for policy specification (e.g., Policy Editor)
  • 22. www.industrialdataspace.org // 22Source: Fraunhofer – IDS internal documentation, to be published in Reference Architecture 2018 DATA USAGE CONTROL TECHNICAL ENFORCEMENT, ORGANIZATIONAL RULES, AND LEGAL CONTRACTS  Usage Control extends, substitutes, and completes organizational rules/legal contracts  Long term: replacement of organizational rules / legal contracts by technical enforcement
  • 23. www.industrialdataspace.org // 23Source: Fraunhofer – IDS internal documentation, to be published in Reference Architecture 2018 DATA USAGE CONTROL ENFORCEMENT EXAMPLE PEP and PXP within IDS Connector PEP controlling data flow PXP triggering delete action
  • 24. www.industrialdataspace.org // 24Source: Fraunhofer – IDS internal documentation, to be published in Reference Architecture 2018 DATA USAGE CONTROL USAGE CONTROL TECHNOLOGIES IN THE INDUSTRIAL DATA SPACE  Integrated Distributed Data Usage Control Enforcement (IND²UCE) Fraunhofer IESE  Label-based Usage Control (LUCON) Fraunhofer AISEC  Information Flow Tracking (IFT)/ Provenance Tracking Fraunhofer IOSB
  • 25. www.industrialdataspace.org // 25Source: Fraunhofer – IDS Reference Architecture, 2017 IDENTIFICATION PROCESS THE IDS HANDSHAKE Prerequisites: Certification of Participants and Connectors Handshake: 1. Establish Secure connection based on IDS X.509 certificates 2. Request Self Assessment (IDS InfoModel) 3. Validate against Identity Provider 4. Check if partner is trustworthy 5. Check if provided data is consumable 6. Exchange data
  • 26. www.industrialdataspace.org // 26Source: Fraunhofer – IDS internal documentation, to be published in Reference Architecture 2018 IDS API THE IDS PROVIDES AN API FOR YOUR API
  • 27. www.industrialdataspace.org // 27Source: Fraunhofer – IDS internal documentation, to be published in Reference Architecture 2018 INDUSTRIAL DATA SPACE INFORMATION MODEL HIGH LEVEL VIEW / DOMAINS
  • 28. www.industrialdataspace.org // 28Source: Fraunhofer – IDS internal documentation, to be published in Reference Architecture 2018 INDUSTRIAL DATA SPACE INFORMATION MODEL DATA PRODUCTS
  • 29. www.industrialdataspace.org // 29Source: Fraunhofer – IDS internal documentation, to be published in Reference Architecture 2018 INDUSTRIAL DATA SPACE INFORMATION MODEL HERE IS YOUR API
  • 30. www.industrialdataspace.org // 30 SECURITY PROFILES APPROACH 1. Use Cases: Driven by Use Cases 2. Dimensions Identified: • Development • Roles • Communication Abilities • Higher Security Classes 3. Security Profiles Important Insights: • 4 Profiles Base Free, Base, Trust, Trust+ • All Connectors (not Base Free) can communicate in public IDS • Base Free is public available Development Higher Security Classes Trust+ Trust Base BaseFree Public IDSDIY
  • 31. www.industrialdataspace.org // 31 SECURITY PROFILES BASE FREE, BASE, TRUST, TRUST+ Base Free Base Trust (Managed)Trust+ Reference Development Open Source IDS Community IDS Community Bound to strong SLAs Roles Own infrastructure All IDS Roles supported, Billing and Clearing optional All IDS Roles supported All IDS Roles supported Communication Abilities Only private IDS with self signed certificates Full interoperable, reduced trust Full interoperable, Free decision of communication Full interoperable, Free decision of communication, Hardware anchor Higher Security Classes Standard Security Level required Standard Security Level required High Security Level Higher Security Level
  • 32. // 32 JOIN US !SEBASTIAN STEINBUSS LEAD ARCHITECT INDUSTRIAL DATA SPACE ASSOCIATION WWW.LINKEDIN.COM/IN/SEBASTIAN-STEINBUSS/ @SSTEINBUSS JOSEPH-VON-FRAUNHOFER-STR. 2-4 44227 DORTMUND | GERMANY +49 231 97677 428 SEBASTIAN.STEINBUSS@INDUSTRIALDATASPACE.ORG @ids_association #industrialdataspace www.industrialdataspace.org Ressource Hub – Press Area – Blog