IDS Reference Architecture Model 3.0 2019
IDS Reference Architecture Model 3.0 2019
ARCHITECTURE
MODEL
Prof. Dr. Sören Auer, L3S Research Center Jacob Köhler, Deloitte
Sebastian Bader, Fraunhofer IAIS Dr. Christoph Lange, Fraunhofer IAIS
Dr. Harrie Bastiaansen, TNO Dorothea Langer, Deloitte
Hannes Bauer, orbiter Jörg Langkau, nicos
Dr.-Ing. Pascal Birnstil, Fraunhofer IOSB Dominik Lis, Fraunhofer ISST
Martin Böhmer, Fraunhofer IML Sven Löffler, T-Systems
Dr. Jürgen Bohn, Schaeffler Dr. Ulrich Löwen, Siemens
Gernot Böge, FIWARE Foundation Dr. Christian Mader, Fraunhofer IAIS
Uwe Brettner, nicos AG Bernhard Müller, SICK
Gerd Brost, Fraunhofer AISEC Nadja Menz, Fraunhofer FOKUS
Juan Ceballos, Deutsche Telekom Christoph Mertens, International Data Spaces Association
Dr.-Ing. Jan Cirullies, Fraunhofer ISST Andreas Müller, Schaeffler
Constantin Ciureanu, T-Systems Lars Nagel, International Data Spaces Association
Eva Corsi, Boehringer Ingelheim Dr. Ralf Nagel, Fraunhofer ISST
Simon Dalmolen, TNO Harri Nieminen, Fastems
Søren Danielsen, GateHouse Logistics Thomas Reitelbach, Bosch
Alexander Duisberg, Bird & Bird Aleksei Resetko, PricewaterhouseCoopers
Andreas Eitel, Fraunhofer IESE Daniel Pakkala, VTT Technical Research Centre of Finland
Thilo Ernst, Fraunhofer FOKUS Florian Patzer, Fraunhofer IOSB
Fabiana Fournier, IBM Heinrich Pettenpohl, Fraunhofer ISST
Marquart Franz, Siemens AG René Pietzsch, eccenca
Dr. Sandra Geisler, Fraunhofer FIT Jaroslav Pullmann, Fraunhofer FIT
Joshua Gelhaar, Fraunhofer ISST Matthijs Punter, TNO
Roland Gude, Fraunhofer IAIS Dr. Christoph Quix, Fraunhofer FIT
Dr.-Ing. Christian Haas, Fraunhofer IOSB Aleksei Resetko, PwC
Jürgen Heiles, Siemens Dr. Dominik Rohrmus, Siemens
Burkhard Heisen, cybus Lena Romer, Boehringer Ingelheim
Juanjo Hierro, FIWARE Jörg Sandlöhken, REWE Systems
Joachim Hoernle, ATOS Patrick Schöwe, agma data
Manuel Huber, Fraunhofer AISEC Daniel Schulz, Fraunhofer IAIS
Christian Jung, Fraunhofer IESE Dr. Julian Schütte, Fraunhofer AISEC
Prof. Dr. Jan Jürjens, Fraunhofer ISST Dr. Karsten Schweichhart, Deutsche Telekom
Dr. Anna Kasprzik, L3S Research Center Inna Skarbowski, IBM
Dr. Markus Ketterl, msg systems Prof. Egbert-Jan Sol, TNO
Judith Koetzsch, Rittal
004 //
IMPRINT & CONTRIBUTING RESEARCH PROJECTS //
005 //
TABLE OF CONTENTS
1 INTRODUCTION 008
1.1 GOALS OF THE INTERNATIONAL DATA SPACES ................................................................................... 009
1.2 PURPOSE AND STRUCTURE OF THE REFERENCE ARCHITECTURE MODEL .......................................... 011
006 //
TABLE OF CONTENTS //
APPENDIX 106
A GLOSSARY .............................................................................................................................................. 107
B SECURITY PROFILES .............................................................................................................................. 111
C LIST OF FIGURES ................................................................................................................................... 116
D LIST OF TABLES ...................................................................................................................................... 118
007 //
KAPITEL // UNTERKAPITEL
INTRODUCTION 1
8 //
INTRODUCTION // 1.1
THE INTERNATIONAL DATA SPACES (IDS) IS A VIRTUAL DATA SPACE LEVERAGING EXISTING STANDARDS AND
TECHNOLOGIES, AS WELL AS GOVERNANCE MODELS WELL-ACCEPTED IN THE DATA ECONOMY, TO FACILITATE SECURE
AND STANDARDIZED DATA EXCHANGE AND DATA LINKAGE IN A TRUSTED BUSINESS ECOSYSTEM. IT THEREBY
PROVIDES A BASIS FOR CREATING SMART-SERVICE SCENARIOS AND FACILITATING INNOVATIVE CROSS-COMPANY
BUSINESS PROCESSES, WHILE AT THE SAME TIME GUARANTEEING DATA SOVEREIGNTY FOR DATA OWNERS.
Data sovereignty is a central aspect of the International Data form the operational IDS ecosystem. As each offering
Spaces. It can be defined as a natural person’s or corporate must comply with the International Data Spaces standard,
entity’s capability of being entirely self-determined with re- it must undergo a certification process. Therefore, the
gard to its data. The International Data Spaces initiative pro- market requires offerings from evaluation and certifica-
poses a Reference Architecture Model for this particular capa- tion facilities.
bility and related aspects, including requirements for secure
and trusted data exchange in business ecosystems. THE INTERNATIONAL DATA SPACES AIMS AT MEETING
Overall, there are three types of activities in which the work of THE FOLLOWING STRATEGIC REQUIREMENTS:
the International Data Spaces initiative can be grouped: 1) re-
search activities, 2) standardization activities, and 3) activities »» TRUST: Trust is the basis of the International Data Spac-
for the development of products and solutions for the market es. Each participant is evaluated and certified before being
(see Figure 1.1): granted access to the trusted business ecosystem.
1. Fraunhofer runs the Strategic Initiative Data Spaces as a »» SECURITY AND DATA SOVEREIGNTY: All components of
large internal research program aiming at the design and the International Data Spaces rely on state-of-the-art se-
continuous development of the core principles of the IDS curity measures. Apart from architectural specifications,
Reference Architecture Model (IDS-RAM). An increasing security is mainly ensured by the evaluation and certifi-
number of further research projects conducted by various cation of each technical component used in the Interna-
partners complement these activities. tional Data Spaces. In line with the central aspect of en-
suring data sovereignty, a data owner in the International
2. The International Data Spaces Association (IDSA), a Data Spaces attaches usage restriction information to their
non-profit organization, aims at promoting the IDS-RAM in data before it is transferred to a data consumer. To use the
order to establish an international standard. To achieve data, the data consumer must fully accept the data own-
this goal, the Association pools the requirements from var- er’s usage policy.
ious industries and provides use cases to test the results
gained from the model’s implementation. The standard is »» ECOSYSTEM OF DATA: The architecture of the Internation-
intended to materialize in the IDS-RAM itself, but also in al Data Spaces does not require central data storage ca-
defined methods for secure data exchange and data shar- pabilities. Instead, it pursues the idea of decentralization
ing facilitated by the IDS Connector, the central technical of data storage, which means that data physically remains
component of the International Data Spaces. To ensure with the respective data owner until it is transferred to a
the international ambition of the initiative, Regional Hubs trusted party. This approach requires a comprehensive de-
have been established in different countries. In addition, scription of each data source and the value and usability
the activities of the IDSA aim at supporting the adoption of of data for other companies, combined with the ability to
IDS concepts and technologies in the market. integrate domain-specific data vocabularies. In addition,
brokers in the ecosystem provide services for real-time
3. Actors in the market can make use of the International data search.
Data Spaces standard for providing software services and
technology to the market. These products and solutions
009 //
INTRODUCTION // 1.1
»» STANDARDIZED INTEROPERABILITY: The International software implementations, and thus for a variety of com-
Data Spaces Connector, being a central component of the mercial software and service offerings.
architecture, is implemented in different variants and can
be acquired from different vendors. Nevertheless, each All research and development activities, as well as all ac-
Connector is able to communicate with any other Connec- tivities with regard to standardization, are driven by the
tor (or other technical component) in the ecosystem of the following guidelines:
International Data Space.
»» OPEN DEVELOPMENT PROCESS: The International Data
»» VALUE ADDING APPS: The International Data Spaces al- Spaces Association is a non-profit organization institution-
lows to inject apps into the IDS Connectors in order to alized under the German law of associations. Every organi-
provide services on top of data exchange processes. This zation is invited to participate, as long as it adheres to the
includes services for data processing, data format align- common principles of work.
ment, and data exchange protocols, for example. Further-
more, data analytics services can be provided by remote »» RE-USE OF EXISTING TECHNOLOGIES: Inter-organization-
execution of algorithms. al information systems, data interoperability, and infor-
mation security are well-established fields of research and
»» DATA MARKETS: The International Data Space enables the development, with plenty of technologies available in the
creation of novel, data-driven services that make use of market. The work of the International Data Spaces initia-
data apps. It also fosters new business models for these tive is guided by the idea not to “reinvent the wheel”, but to
services by providing clearing mechanisms and billing use existing technologies (e.g., from the open-source do-
functions, and by creating domain-specific broker solu- main) and standards (e.g., semantic standards of the W3C)
tions and marketplaces. In addition, the International Data to the extent possible.
Spaces provides templates and other methodological sup-
port for participants to use when specifying usage restric- »» CONTRIBUTION TO STANDARDIZATION: Aiming at estab-
tion information and requesting legal information. lishing an international standard itself, the International
Data Spaces initiative supports the idea of standardized ar-
Being the central deliverable of the research project, the chitecture stacks.
Reference Architecture Model of the International Data
Spaces (IDS-RAM) constitutes the basis for a variety of
010 //
INTRODUCTION // 1.2
Focusing on the generalization of concepts, functionality, and place between the different components of the Internation-
overall processes involved in the creation of a secure “net- al Data Spaces; using the BPMN notation, it provides a dy-
work of trusted data”, the IDS-RAM resides at a higher ab- namic view of the Reference Architecture Model. The Infor-
straction level than common architecture models of concrete mation Layer defines a conceptual model which makes use
software solutions do. The document provides an overview of linked-data principles for describing both the static and the
supplemented by dedicated architecture specifications defin- dynamic aspects of the International Data Space’s constitu-
ing the individual components of the International Data Spac- ents. The System Layer is concerned with the decomposition
es (Connector, Broker, App Store, etc.) in detail. of the logical software components, considering aspects such
as integration, configuration, deployment, and extensibility of
In compliance with common system architecture models and these components.
standards (e.g., ISO 42010, 4+1 view model), the Reference
Architecture Model uses a five-layer structure expressing var- In addition, the Reference Architecture Model comprises
ious stakeholders’ concerns and viewpoints at different levels three perspectives that need to be implemented across all
of granularity. five layers: Security, Certification, and Governance.
Certification
Governance
er defines the functional requirements of the International Functional
Security
011 //
KAPITEL // UNTERKAPITEL
CONTEXT OF
2
THE INTERNATIONAL
DATA SPACES
012 //
CONTEXT OF THE INTERNATIONAL DATA SPACES // 2.1
Novel digital
Examples of business
products ecosystems
and servicesare often
numerous
emerge and
in business
can be Examples of business ecosystems are numerous and can be
found across which
ecosystems, all industries.
organizations
Many ofenter
them to have
jointly
beenfulfill
analyzedthe found across all industries. Many of them have been analyzed
and documented
needs of customers by the
better
Smartthan
Service
they Welt
can do
working
on their
group.own.1
and documented by the Smart Service Welt working group.1
In such ecosystems, which emerge and dissolve much faster
A data-driven
than traditionalbusiness ecosystem
value creating is an ecosystem
networks, in which
the partners have A data-driven business ecosystem is an ecosystem in which
data
a is the
clear strategic
focus resourcecustomer
on end-to-end used by the members
processes in to jointly
order to data is the strategic resource used by the members to jointly
create innovative
jointly value offerings.
develop innovative productsKeyand to success
services.isActors
to share in create innovative value offerings. Key to success is to share
and jointly
such maintain
ecosystems can data within such
be businesses an direct
(also ecosystem, as end- and jointly maintain data within such an ecosystem, as end-
competitors),
to-end customer
research process intermediaries
organizations, support can only be achieved
(electronic if the to-end customer process support can only be achieved if the
market-
partners
places, forteam up and
example), jointly utilizeagencies,
governmental their data
andresource
customers. (as partners team up and jointly utilize their data resource (as
shown by a number of examples in Figure 21). shown by a number of examples in Figure 2.1).
Ecosystems are characterized by the fact that no member is
capable of creating innovation on its own. Instead, the eco-
system as a whole needs to team up. In other words: Every
member has to contribute something for the benefit of all.
Ideally,Industrial Data inSpace
ecosystems function – Reference
an equilibrium Architecture Model
state of mutual
Data Sharing in Ecosystems
benefits for all members.
© Fraunhofer 1
1
¹ https://www.digitale-technologien.de/DT/
¹Redaktion/DE/Downloads/Publikation/
https://www.digitale-technologien.de/DT/Redaktion/DE/Downloads/
¹ https://www.digitale-technologien.de/DT/Redaktion/DE/
Publikation/SSWII_Programmbroschuere.html
SSWII_Programmbroschuere.html Downloads/Publikation/SSWII_Programmbroschuere.pdf
013 //
CONTEXT OF THE INTERNATIONAL DATA SPACES // 2.2 // 2.3
From these two developments – 1) data turning into a strate- It is indisputable that data has a value, and that data manage-
gic resource, and 2) companies increasingly collaborating in ment generates costs. Today, data is traded in the market like
business ecosystems – results a fundamental conflict of goals a commodity; it has a price, and many companies monitor the
as a main characteristic of the digital economy: on the one costs incurred for data management. However, data, being
hand, companies increasingly need to exchange data in busi- an intangible good, differs from tangible goods with regard
ness ecosystems; on the other hand, they feel they need to to a number of properties, among which the fact that data is
protect their data more than ever before, since the impor- non-rival is considered the most important one. The value of
tance of data has grown so much. This conflict of goals is all data increases as it is being used (and, in many cases, as the
the more intensified, the more a company is engaged in one number of user increases). While these differences hinder the
or more business ecosystems, and the higher the value con- adoption and application of legal provisions to the manage-
tributed by data to the overall success of the collaborative ef- ment and use of data, they do not dispute the fact that data
fort. is an economic good.
Data sovereignty is about finding a balance between the Depending on what type data is of, or what category it can be
need for protecting one’s data and the need for sharing subsumed under, the value it contributes to the development
one’s data with others. It can be considered a key capa- of innovative products and services can vary. Therefore, the
bility for companies to develop in order to be successful need for protection of data is not the same across all data
in the data economy. types and data categories. Public data, for example, which
can be accessed by anyone, requires a lower level of protec-
To find that balance, it is important to take a close look at the tion than private data or club data.
data itself, as not all data requires the same level of protec-
tion, and as the value contribution of data varies, depending Because of these differences and distinctions made with re-
on what class or category it can be subsumed under. gard to data, a generally accepted understanding of the value
of data has not been established so far. Nevertheless, there
Industrial Data Space – Reference Architecture Model
is a growing need to determine the value of data, given the
Data Exchange Standards rapid developments taking place in the Smart Service Welt.
Inventory levels ·
Industrial
manufacturing steps ·
Data Space
Supply network structures
Electronic
Master data · change requests · safety data sheets …
Business
014 //
CONTEXT OF THE INTERNATIONAL DATA SPACES // 2.4
Cross-company data exchange with the help of inter-organi- This does not mean that existing standards will become ob-
zational information systems is not a new topic; it has been solete. Instead, the overall set of standards companies need
around for decades. With the proliferation of Electronic Data to comply with when exchanging and sharing data needs to
Interchange (EDI) in the 1980s, many different data exchange be extended. It is therefore necessary to distinguish between
scenarios have emerged over time, which were accompanied data exchange and data sharing:
by the development of certain technical standards.
»» Data exchange takes place in the vertical cooperation be-
Figure 2.2 shows the evolution of technical standards for data tween companies to support, enable or optimize value
exchange since the 1980s, using the example of automotive chains and supply chains (e.g. EDI messages in logistics or
logistics. Data sovereignty, which is one of the main goals HL7 in medical scenarios).
of the International Data Spaces, materializes in “terms and
conditions” that are linked to data before it is exchanged and »» Data sharing takes place in the vertical and horizontal col-
shared. However, these terms and conditions (such as time to laboration between companies to achieve a common goal
live, forwarding rights, pricing information etc.) have not been (e.g. predictive maintenance scenarios in manufacturing)
standardized yet. In order to foster the establishment of data or to enable new business models by generating addition-
sovereignty in the exchange of data within business ecosys- al value out of data (e.g. in data marketplaces). Further-
tems, more standardization activities are needed. more, data sharing implies a mode of collaboration to-
wards coopetition.
015 //
CONTEXT OF THE INTERNATIONAL DATA SPACES // 2.5 // 2.6 // 2.7
2.5 INDUSTRIAL why the need for data sharing with regard to using AI will rise.
A standardized architecture for data exchange and data
CLOUD PLATFORMS
sharing would support the development and acceptance of
both Big Data and AI applications in industry. At the same
The growing number of industrial cloud platforms will also time, it is necessary to define usage policies for data sharing
drive the need for a standard for data sovereignty. With a lot and retaining data sovereignty for data providers.
of different platforms emerging – driven by technology pro-
viders, software companies, system integrators, but also ex-
isting intermediaries – it is very likely that the platform land-
scape will be very heterogeneous, at least for some time. 2.7 THE INTERNET OF THINGS
Platform providers will increasingly have to provide capabil- AND THE INDUSTRIAL
ities for secure and trusted data exchange and data sharing INTERNET OF THINGS
between their own platform and other platforms in the eco-
system.
The Internet of Things (IoT) and the Industrial Internet
Furthermore, the cloud platform landscape is likely to be of Things (IIoT), respectively, comprises an ever-growing
characterized by a plurality of architectural patterns, ranging number of devices generating more and more data. While
from approaches characterized by a high level of centraliza- there is mostly a clear focus on the primary use of that
tion (e.g. data lakes) to concepts promoting utmost decentral- data, it may be of interest for additional stakeholders as
ization (e.g. distributed applications using blockchain technol- well. This requires standardization with regard to the (I)
ogy). IoT architecture, but also standardization regarding data
exchange and data sharing – in order to enable the data
Which platform a data owner or data provider will choose to economy and facilitate the establishment of data market-
take advantage of will depend on the business criticality and places. The wide use of data generated within the (I)IoT will
the economic value of the data goods they want to exchange lead to new, smart and data centric services in conjunction
and share. As the data resource of a company consists of data with new business models.
of different criticality and value, it can be expected that many
companies will use different platforms for different purposes.
016 //
CONTEXT OF THE INTERNATIONAL DATA SPACES // 2.8
In the use cases of the International Data Spaces, two basic From a functional perspective, it is expected that blockchain
patterns of data sharing can be found: technology will play an important role in maintaining these
‘shared data assets’ in an IDS environment. This would
»» Data is shared to feed new, data-driven services, such as complement the existing capabilities of the IDS architec-
using the data in a new app, smart algorithm, or other dig- ture to share (potentially large) datasets with the help of
ital service in which data of different sources/providers is IDS Connectors. For instance, a shared data asset might en-
combined. compass a hash code (‘fingerprint’ of a piece of data) which
can be used to verify a larger file (e.g. a complex product
»» Data is shared for some form of business process synchro- design for which an order was sent) being shared with the
nization, such as using the data to execute transactions help of an IDS Connector. In terms of the IDS-RAM, block-
(e.g. exchange orders), enable production (e.g. exchange chain technology could be used for the Clearing House or
product data), check quality (e.g. monitor the temperature the Broker, for example (see Business Layer).
of perishable goods), or synchronize processes (e.g. ex-
change status data). In general, the use of Blockchain technology can ensure
data consistency and transparency in combination with the
In many of these cases, this sharing of data enables trans- general IDS approach for data sovereignty and secure data
actions with the data itself becoming what one could call a exchange and sharing. In contrast, typical Data Lakes focus
‘shared data asset’, resulting in liability/responsibility for on the integration of data for the purpose of knowledge
the participating organizations. extraction.
Figure 2.4: General architectural patterns for data exchange and data sharing
017 //
CONTEXT OF THE INTERNATIONAL DATA SPACES // 2.9
By proposing an architecture for secure data exchange and In broadening the perspective from an individual use case
trusted data sharing, the International Data Spaces con- scenario to a platform landscape view, the International
tributes to the design of enterprise architectures in com- Data Spaces positions itself as an architecture that links dif-
mercial and industrial digitization scenarios. It does so by ferent cloud platforms through policies and mechanisms
bridging the gaps between research, industrial stakehold- for secure data exchange and trusted data sharing (or, in
ers, political stakeholders, and standards bodies. The ar- other words, through the principle of data sovereignty).
chitecture is designed with the objective to overcome the Over the IDS Connector, the International Data Space’s
differences between top-down approaches and bottom-up central component, industrial data clouds, as well as indi-
approaches. Figure 2.5 shows a typical architecture stack vidual enterprise clouds, on-premises applications and in-
of the digital industrial enterprise. The International Data dividual, connected devices can be connected to the Inter-
Spaces connects the lower-level architectures for commu- national Data Spaces (see Figure 2.6).
nication and basic data services with more abstract ar-
chitectures for smart data services. It therefore supports With this integrating ambition, the International Data Spac-
the establishment of secure data supply chains from data es initiative positions itself in the context of cognate ini-
source to data use, while at the same time making sure tiatives on both national and international level. Founded
data sovereignty is guaranteed for data owners. in Germany, the activities of the International Data Spac-
es are closely aligned with Plattform Industrie 4.0, in par-
ticular the Reference Architectures, Standards and Norms
working group.
Production … (other
Mobility Healthcare Logistics Energy
Services Industries)
018 //
CONTEXT OF THE INTERNATIONAL DATA SPACES // 2.9
Legend: IDS IDS Connector Data Usage Constraints Non-IDS Data Communication
Data
Marketplace
Industrial
Data Internet of
IDS
Cloud Things Cloud
IDS
IDS
Open Data
Source
IDS
IDS
Enterprise
Cloud
The International Data Spaces initiative has established, Furthermore, the International Data Spaces initiative seeks
and will continue to establish, liaisons with other initia- collaboration and exchange of ideas with existing research
tives, among them and standardization initiatives. By functioning as a mediator
between top-down and bottom-up approaches, bridging the
»» Alliance for Internet of Things Innovation, gaps between research, industry, politics, and standards bod-
»» Big Data Value Association, ies, aligning the requirements of the economy and society,
»» Data Market Austria, and fostering ties with other initiatives, the International Data
»» Data Trading Alliance, Spaces can be considered a unique initiative in the landscape
»» eCl@ss, of Industry 4.0.
»» FIWARE Foundation,
»» Industrial Internet Consortium,
»» iSHARE,
»» Industrial Valuechain Initative,
»» OPC Foundation,
»» Plattform Industrie 4.0,
»» Standardization Council Industrie 4.0, and
»» World Wide Web Consortium.
019 //
LAYERS OF THE
3
REFERENCE
ARCHITECTURE MODEL
020 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.1
021 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.1
The Reference Architecture Model takes an operational data Exchanging data with a Data Consumer needs not necessarily
management perspective, defining a Data Owner as a legal be the only activity of the Data Provider. At the end of a data
entity or natural person creating data and/or executing con- exchange transaction completely or partially executed, for ex-
trol over it. This enables the Data Owner to define Data Us- ample, the Data Provider may log the details of the success-
age Policies and provide access to its data. Data Ownership ful (or unsuccessful) completion of the transaction at a Clear-
includes at least two major concepts: ing House (see below) to facilitate billing or resolve a conflict.
Furthermore, the Data Provider can use Data Apps to enrich
»» having the (technical) means and the responsibility to de- or transform the data in some way, or to improve its quali-
fine Usage Contracts and Usage Policies, and to provide ty. (Data Apps are specific applications that can be integrated
access to data; and into the data exchange workflow between two or more partic-
ipants in the International Data Spaces.)
»» having the (technical) means and the responsibility to de-
fine the Payment Model, including the model for reuse of If the technical infrastructure for participating in the Interna-
data by third parties. tional Data Spaces is not deployed by the Data Consumer, a
Data Provider may use a Service Provider (see below) to con-
Usually, a participant acting as Data Owner automatically as- nect to the International Data Spaces.
sumes the role of the Data Provider as well. However, there
may be cases in which the Data Provider is not the Data Own- DATA CONSUMER
er (e.g., if the data is technically managed by a different entity The Data Consumer receives data from a Data Provider. From
than the Data Owner, such as in the case of a company using a business process modeling perspective, the Data Consum-
an external IT service provider for data management, or if data er is the mirror entity of the Data Provider; the activities per-
management activities are handed over to a data trustee). formed by the Data Consumer are therefore similar to the
activities performed by the Data Provider.
In cases in which the Data Owner does not act as the Data
Provider at the same time, the only activity of the Data Own- Before the connection to a Data Provider can be established,
er is to authorize a Data Provider to make its data available to the Data Consumer can search for existing datasets by mak-
be used by a Data Consumer. Any such authorization should ing an inquiry at a Broker Service Provider. The Broker Ser-
be documented by a contract, which should include data us- vice Provider then provides the required metadata for the
age policy information for the data provided (see. Section Data Consumer to connect to a Data Provider. Alternatively,
4.1.3.6). The contract needs not necessarily be a paper docu- the Data Consumer can establish a connection with a Data
ment, but may be an electronic file as well. Provider directly (i.e., without involving a Broker Service Pro-
vider). In cases in which the information to connect with the
DATA PROVIDER Data Provider is already known to the Data Consumer, the
TThe Data Provider makes data available for being ex- Data Consumer may request the data (and the corresponding
changed between a Data Owner and a Data Consumer. As metadata) directly from the Data Provider.
already mentioned above, the Data Provider is in most cases
identical with the Data Owner, but not necessarily. To sub- Like a Data Provider, the Data Consumer may log the details
mit metadata to a Broker, or exchange data with a Data Con- of a successful (or unsuccessful) data exchange transaction
sumer, the Data Provider uses software components that are at a Clearing House, use Data Apps to enrich, transform, etc.
compliant with the Reference Architecture Model of the In- the data received, or use a Service Provider to connect to the
ternational Data Spaces. International Data Spaces (if it does not deploy the technical
infrastructure for participation itself).
Providing a Data Consumer with data from a Data Owner is
the main activity of the Data Provider. To facilitate a data re- DATA USER
quest from a Data Consumer, the Data Provider should pro- Similar to the Data Owner being the legal entity that has the
vide a Broker Service Provider (see below) with proper meta- legal control over its data, the Data User is the legal entity that
data about the data. However, a Broker Service Provider is has the legal right to use the data of a Data Owner as specified
not necessarily required for a Data Consumer and a Data by the usage policy. In most cases, the Data User is identical
Provider to establish a connection. with the Data Consumer. However, there may be scenarios in
022 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.1
which these roles are assumed by different participants. For The activities of the Broker Service Provider mainly focus on
example, a patient could use a web-based software system receiving and providing metadata. The Broker Service Provid-
to manage their personal health data and grant access to this er must provide an interface for Data Providers to send their
data to a health coach. The data could be received from a hos- metadata. The metadata should be stored in an internal re-
pital. In this case, the health coach would be the Data User pository for being queried by Data Consumers in a structured
and the provider of the web-based software system would be manner. While the core of the metadata model must be spec-
the Data Consumer. ified by the International Data Spaces (i.e., by the Informa-
tion Model, see Section 3.4), a Broker Service Provider may
APP PROVIDER extend the metadata model to manage additional metadata
App Providers develop Data Apps to be used in the Interna- elements.
tional Data Spaces. To be deployable, a Data App has to be
compliant with the system architecture of the International After the Broker Service Provider has provided the Data Con-
Data Spaces (see Section 3.5). In addition, Data Apps can be sumer with the metadata about a certain Data Provider, its
certified by a Certification Body in order to increase trust in job is done (i.e., it is not involved in the subsequent data ex-
these applications (especially with regard to Data Apps pro- change process).
cessing sensitive information). Each Data App must be pub-
lished in the App Store for being accessed and used by Data CLEARING HOUSE
Consumers and Data Providers. App Providers should de- The Clearing House is an intermediary that provides clearing
scribe each Data App using metadata (in compliance with a and settlement services for all financial and data exchange
metadata model) with regard to its semantics, functionality, transactions. In the International Data Spaces, clearing activi-
interfaces, etc.). ties are separated from broker services, since these activities
are technically different from maintaining a metadata reposi-
tory. As already stated above, it might still be possible that the
CATEGORY 2: INTERMEDIARY two roles “Clearing House” and “Broker Service Provider” are
Intermediaries act as trusted entities. Roles assigned to this assumed by the same organization, as both roles require act-
category are Broker Service Provider, Clearing House, Identi- ing as a trusted intermediary between the Data Provider and
ty Provider, App Store, and Vocabulary Provider. These roles the Data Consumer.
may be assumed only by trusted organizations.
The Clearing House logs all activities performed in the course
Benefit for participants in the International Data Spaces is of a data exchange. After a data exchange, or parts of it, has
created by these roles by establishing trust, providing meta- been completed, both the Data Provider and the Data Consum-
data, and creating a business model around their services. er confirm the data transfer by logging the details of the trans-
action at the Clearing House. Based on this logging informa-
BROKER SERVICE PROVIDER tion, the transaction can then be billed. The logging information
The Broker Service Provider is an intermediary that stores can also be used to resolve conflicts (e.g., to clarify whether a
and manages information about the data sources available data package has been received by the Data Consumer or not).
in the International Data Spaces. As the role of the Bro- The Clearing House also provides reports on the performed
ker Service Provider is central but non-exclusive, multiple (logged) transactions for billing, conflict resolution, etc.
Broker Service Providers may be around at the same time
(e.g., for different application domains). An organization IDENTITY PROVIDER
offering broker services in the International Data Spaces The Identity Provider should offer a service to create, main-
may assume other intermediary roles at the same time tain, manage, monitor, and validate identity information of
(e.g., Clearing House or Identity Provider, see below). Nev- and for participants in the International Data Spaces. This
ertheless, it is important to distinguish organizations and is imperative for secure operation of the International Data
roles (e.g., assuming the role of a Broker Service Provider Spaces and to avoid unauthorized access to data.
means that an organization deals only with metadata man-
agement; at the same time, the same organization may as- The Identity Provider consist of a Certification Authority (man-
sume the role of a Clearing House, for which completely aging digital certificates for the participants of the Interna-
different tasks are defined). tional Data Spaces), a Dynamic Attribute Provisioning Service
023 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.1
(DAPS, managing the dynamic attributes of the participants), International Data Spaces to a Service Provider hosting the
and a service named Dynamic Trust Monitoring (DTM, for con- required infrastructure for other organizations.
tinuous monitoring of the security and behavior of the net-
work. More details about identity management can be found This role includes also providers offering additional data ser-
in section 4.1. vices (e.g., for data analysis, data integration, data cleansing,
or semantic enrichment) to improve the quality of the data
APP STORE PROVIDER exchanged in the International Data Spaces. From a techni-
The App Store provides Data Apps. These are applications cal point of view, such a Service Provider can be considered a
that can be deployed inside the Connector, the core technical Data Provider and a Data Consumer at the same time (e.g., as
component required for a participant to join the International a Data Consumer, it receives data from a Data Provider, then
Data Spaces. Data Apps facilitate data processing workflows. provides its specific service, and then turns into a Data Provid-
They may be certified by a Certification Body, following the er itself and offers the data in the International Data Spaces).
certification procedures defined in Section 4.2.
Unlike the services provided by a Service Provider, Data Apps
The App Store is responsible for managing information about can be installed in the IT environment of a Data Consumer
Data Apps offered by App Providers (see below). The App or Data Provider for implementing additional data processing
Store should provide interfaces for publishing and retrieving functionality. To use the functionality of a Data App, the data
Data Apps plus corresponding metadata. therefore does not have to be transferred to an external Ser-
vice Provider.
VOCABULARY PROVIDER
The Vocabulary Provider manages and offers vocabularies SOFTWARE PROVIDER
(i.e., ontologies, reference data models, or metadata ele- A Software Provider provides software for implementing the
ments) that can be used to annotate and describe datasets. In functionality required by the International Data Spaces (i.e.,
particular, the Vocabulary Provider provides the Information through software components, as described in Section 3.5).
Model of the International Data Spaces, which is the basis for Unlike Data Apps, software is not provided by the App Store,
the description of data sources (see Section 3.4). In addition, but delivered over the Software Providers’ usual distribution
other domain specific vocabularies can be provided. channels, and used on the basis of individual agreements be-
tween the Software Provider and the user (e.g., a Data Con-
sumer, a Data Provider, or a Broker Service Provider). This
CATEGORY 3: SOFTWARE / SERVICE PROVIDER procedure implies that the agreements between Software
This category comprises IT companies providing software Providers and Data Consumers, Data Providers, etc. remain
and/or services (e.g., based on a software-as-a-service mod- outside the scope of the International Data Spaces.
el) to the participants of the International Data Spaces. Roles
subsumed under this category are Service Provider and Soft-
ware Provider. CATEGORY 4: GOVERNANCE BODY
The Certification Body, Evaluation Facilities, and the Interna-
Benefit is created by these roles by providing software and tional Data Spaces Association are the Governance Bodies of
services to the participants of the International Data Spaces. the International Data Spaces.
It should be noted that the process of providing software to Benefit for participants in the International Data Spaces is cre-
be used for establishing the endpoints of a data exchange ated by the Certification Body and the Evaluation Facilities by
transaction (e.g. Enterprise Systems like ERP or MES, or other taking care of the certification process and issuing certificates
platforms) is not part of the International Data Spaces, as it (both with regard to organizations that want to participate and
takes place before an organization joins the IDS. with regard to software components that are to be used).
024 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.1
es. These Governance Bodies make sure that only compliant 3.1.2 INTERACTION OF ROLES
organizations are granted access to the trusted business eco-
system. In this process, the Certification Body supervises the
actions and decisions of the Evaluation Facilities. BASIC INTERACTIONS FOR DATA EXCHANGE AND DATA
SHARING IN THE INTERNATIONAL DATA SPACES
The Certification Scheme applied in the process is described Figure 31 gives an overview of the roles and the interactions
in Section 4.2 taking place between them. As some of the roles (Certification
Body and Evaluation Facilities) are not actively involved in the
INTERNATIONAL DATA SPACES ASSOCIATION (IDSA) everyday operations of the International Data Spaces, they
The International Data Spaces Association (IDSA) is a non-prof- are omitted from the illustration. Also, the figure does not in-
it organization promoting the continuous development of the clude Software Providers and Identity Providers, because of
International Data Spaces. More specifically, it supports and the necessary connection of those roles with all other roles.
governs the continuous development of the Reference Archi- The Software Provider would be connected to all other roles
tecture Model and the participant certification process. The with the relation “provides software”. Likewise, the Identity
International Data Spaces Association is currently organized Provider would be connected to all other roles with the rela-
across several working groups, each one addressing a spe- tion “provides identity”.
cific topic (e.g., architecture, use cases and requirements, or
certification). Members of the Association are primarily large Figure 31 shows only the basic interactions taking place be-
industrial enterprises, IT companies, SMEs, research institu- tween the different roles in the International Data Spaces. For
tions, and industry associations. data exchange, additional, more specific interactions are nec-
essary. These interactions are described in the Process Layer
As the International Data Spaces Association is not directly section of the Reference Architecture Model (see section 3.3).
involved in the data exchange activities of the International
Data Spaces, its role will not be further addressed in the sec- Table 3.1 gives an overview of possible (mandatory or option-
tions on the other Layers. al) interactions taking place in the IDS.
Certification
Vocabulary
Evaluation
Consumer
Data User
App Store
Provider
Provider
Provider
Provider
Provider
Clearing
Identity
Service
Facility
Broker
Owner
House
Body
Data
Data
Data
App
Table 3.1: Interactions between roles in the IDS – X --> mandatory interaction, (X) --> optional interaction
025 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.1
Establishing trust for data sharing and data exchange is a fun- CERTIFICATION
damental requirement. The IDS-RAM defines two basic types Certification of a participant or core component involves the
of trust: 1) Static Trust, based on the certification of partici- Certification Body and an Evaluation Facility (see section 4.2).
pants and core technical components, and 2) Dynamic Trust, Evaluation of a participant or a core component is executed
based on active monitoring of participants and core technical upon request of the participant and relies on the contract be-
components. For data sharing and data exchange in the IDS, tween the participant and the Evaluation Facility. In the same
some preliminary actions and interactions are required. These way, a Service Provider can request evaluation of a compo-
are necessary for every participant, and involve the Certifica- nent. In this process, the Certification Body is responsible for
tion Body, Evaluation Facilities, and the Dynamic Attribute Pro- supervision of the Evaluation Facility involved.
visioning Service (DAPS). Figure 3.2 illustrates the roles and in-
teractions required for issuing a digital identity in the IDS. CERTIFICATION AUTHORITY
The Certification Authority is responsible for issuing, validat-
PARTICIPANT ing and revoking digital certificates (see section 4.1). A digi-
Certification is required for every participant and the majority tal certificate is provided for a participant if both a valid cer-
of roles in the IDS, as defined above. Certification refers both tification for the participant and a valid certification for the
to the organizational capabilities of the participant and the core component is available. This means that the Certifica-
technical capabilities of the core technical components. tion Authority provides an IDS-ID for a combination of par-
026 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.1
Figure 3.2: Interactions required for issuing a digital identity in the IDS
ticipant and core component. The digital certificate is valid 1. Certification request: This is a direct interaction between
not exceeding the validity of both certifications, participant a participant and an evaluation facility to trigger an evalu-
certification and the certification of core component used by ation process based on IDS certification criteria.
the participant. The Certification Authority provides the digi-
tal certificate to the participant upon request. 2. Notification of successful certification: The Certifica-
tion Body notifies the Certification Authority of the suc-
DYNAMIC ATTRIBUTE PROVISIONING SERVICE (DAPS) cessful certification of the participant and the core compo-
The information resulting from the certification process is nent. Validity of both certifications must be provided.
passed on to the Dynamic Attribute Provisioning Service
(DAPS). This includes master data and information on secu- 3. Generating the IDS-ID: The CA generates a unique ID for
rity profiles (see section 4.1.3.3.6 and Appendix B). The CA the pair (participant and component) and issues a digital
provides the details on the digital certificate (public key and certificate (X.509).
IDS-ID). The participant registers at the DAPS after successful-
ly deploying the digital certificate inside the component. 4. Provisioning of X.509 Certificate: The Certification Au-
thority sends a digital certificate (X.509) to the participant
DYNAMIC ATTRIBUTE PROVISIONING SERVICE (DAPS) in a secure and trustworthy way and notifies the DAPS.
Continuous monitoring of participants is necessary for clas-
sification of the trustworthiness of all participants in the eco- 5. Register: After the digital certificate (X.509) is deployed in-
system. Dynamic Trust Monitoring (DTM) implements a mon- side the component, the component registers at the DAPS.
itoring function for every IDS Component. The DTM shares
information with the DAPS to notify each of the two partic- 6. DTM Interaction: The DTM and the DAPS exchange infor-
ipant in a data exchange transaction of the current level of mation on the behavior of the component, e.g. about secu-
trustworthiness of the other participant. rity issues (vulnerabilities) or attempted attacks.
INTERACTIONS
The roles described above interact with each other in a struc-
tured way, as described in Figure 3.2. In the following, a brief
description of these interactions is given (they are described
in more detail in subsequent sections of the document):
027 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.1
028 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.2
Figure 3.4 shows the functional architecture of the Interna- IDENTITY MANAGEMENT
tional Data Spaces, subdividing the requirements into six Every Connector participating in the International Data Spac-
groups of software functionality to be provided by the IDS. es must have a unique identifier and a valid certificate. In ad-
These six groups comply with the strategic requirements out- dition, each Connector must be able to verify the identity of
lined in Section 1.1. other Connectors (with special conditions being applied here;
e.g., security profiles).
The following subsections give a brief summary of these func-
tional requirements. The full list of functional requirements USER CERTIFICATION
can be found in a separate document entitled “Functional Each participant in the International Data Spaces must un-
Overview”. dergo certification in order to establish trust among all par-
ticipants. More information about the certification process is
given in Section 4.2.
3.2.1 TRUST
029 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.2
030 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.2
VOCABULARIES
To create and structure metadata, the operator of a Connector
may use vocabularies. In doing so, an operator of a Connector
can use existing vocabularies, create own vocabularies, or work
with other operators on new vocabularies provided by vocabu-
lary hubs. Vocabulary hubs are central servers that store vocab-
ularies and enable collaboration. Collaboration may comprise
search, selection, matching, updating, requests for changes,
version management, deletion, duplicate identification, and
unused vocabularies. Vocabulary hubs need to be managed.
More information about vocabularies is given in Section 3.4.
031 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.2
Before or after the actual data exchange, data may need to be Data to be exchanged in the International Data Spaces may
processed or transformed. For this purpose, the Internation- have monetary value. Therefore, the International Data Spac-
al Data Spaces offers Data Apps. Each Data App has a lifecy- es has to integrate data market concepts, like clearing and
cle, spanning its implementation, provision in the App Store, billing, but also governance.
installation, and support. The App Store should therefore be
clearly visible and recognizable to every participant. CLEARING & BILLING
The Data Owner can define the pricing model (e.g. pay per
DATA PROCESSING AND TRANSFORMATION transfer, pay per access, pay per day/month/year), and the
A data processing app (which is a subtype of a Data App) price of data. Any transaction of any participant can be
should provide a single, clearly defined processing function logged. The clearing and billing process must be simple and
to be applied on input data for producing an expected out- standardized.
put. A data transformation app (also a subtype of a Data App)
should be able to transform data from an input format into a USAGE RESTRICTIONS, AND GOVERNANCE
different output format in order to comply with the require- Governance in the International Data Spaces comprises five
ments of the Data Consumer (without any substantial change aspects: data as an economic good, data ownership, data sov-
made to the information contained in the data; i.e., loss-less ereignty, data quality, and data provenance. More informa-
transformation). tion about governance is given in Section 4.3.
032 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.3
The Process Layer specifies the interactions taking place be- The overall “Onboarding” process consists of several sub pro-
tween the different components of the International Data cesses. The first step for an organization to join the Interna-
Spaces. It thereby provides a dynamic view of the Reference tional Data Spaces as a Data Provider or Data User is to acquire
Architecture Model. an identity to be used in the IDS. This identity, which forms
the basis for establishing trusted communication in the IDS,
In the following, three major processes and their sub process- is provided by the Certification Body and an Evaluation Facili-
es are described: ty in the form of a certificate issued by an Identity Provider. In
a second step, the organization needs to request a Connector
1. Onboarding, i.e. what to do to be granted access to the from a Software Provider. The Connector, being the core tech-
International Data Spaces as a Data Provider or Data User; nical component for becoming part of the IDS, must then be
installed. After that, it receives a digital certificate (X.509 cer-
2. Exchanging data, i.e. searching for a suitable Data Provid- tificate) to make sure it complies with IDS specifications and
er and invoking the actual data operation; and requirements. The digital certificate is based on the certifica-
tion of the participant and the certification of the Connector
3. Publishing and using Data Apps, i.e. interacting with the (see section 3.1 and section 4.2). In a third step, the Connector
IDS as an App Provider and user of a Data App, respectively. needs to be configured for internal use and prepared for se-
cure communication (“Security Setup”, see below). In the final
These three processes are related to the International Data step, the Connector needs to be made available for other par-
Space’s key value propositions and involve most of the roles in- ticipants in the IDS so that it can finally enter live operation.
troduced in the Business Layer section. The processes are illus-
trated using the Business Process Modeling Notation (BPMN). The overall “Onboarding” process is illustrated in Figure 3.5.
ACQUIRE IDENTITY
Any organization that wants to operate a connector in order
to exchange data in the International Data Spaces as a Data
provider or Data Consumer needs to acquire a unique identi-
ty in the form of a certificate. This certificate enables them to
establish secure and trusted connections to other IDS partici-
pants (see section 3.1).
033 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.3
034 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.3
035 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.3
036 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.3
037 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.3
deployed inside both Connectors. The policy both parties 3.3.3 PUBLISHING AND USING
agree upon needs to be persisted in an immutable way by
DATA APPS
both sides. After the data usage policy has been established,
the consuming Connector can be configured to deal with fur-
ther data coming in from the Data Provider in the future as Data Apps can be used by Connectors for specific data pro-
specified by the policy. The retrieval of the self-description cessing or data transformation tasks. They can perform tasks
and the negotiation of policies must make use of HTTPS or of different complexity, ranging from simple data transforma-
mqtt protocols. If this has been done, the Data Operation call tion to complex data analytics. An example of data transfor-
can be invoked – this is usually done by a request using a mation may be a Data App parsing a single string field with
common protocol (e.g., HTTP) to retrieve a data artifact from address information and producing a data structure consist-
the Data Provider. ing of street name and number, zip code, name of the city,
and name of the country.
The Data Provider then sends the result of the data operation
to the Data Consumer. Usage control on both sides signals the On a conceptual level, Data Apps can be treated the same way
data operation to the data provenance tracking infrastructure as data offerings in the International Data Spaces. Therefore,
(accessible via the Clearing House), so that provenance infor- just as data is provided by a Data Provider using a Connector
mation about the data transferred is kept up to date. Usage and registering this Connector at a Broker, Data Apps are cre-
control on the Data Consumer side also signals receipt of the ated by an App Provider and registered at an App Store (us-
data operation result to the data provenance tracking infra- ing the App Provider’s Connector as a means to communicate
structure, in order to confirm that the transaction has been with the App Store). As a consequence, App Providers also
completed successfully (see sections 4.1.3.6 and 4.1.3.7).
038 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.3
need to undergo the Onboarding process. However, instead For each Data App that was successfully certified, the cor-
of registering their Connector at a Broker, App Providers reg- responding metadata is stored in the App Store for being
ister their Data Apps at an App Store. retrieved by users (e.g., Data Consumers or Data Providers)
via a search interface. Searching for a Data App is part of the
In order to be published, certain Data Apps require certifica- “Find App” sub process depicted in Figure 313. If a user finds
tion from the Certification Body (see section 3.5.1) (see first a suitable Data App (i.e., matching in functionality and com-
step of the process shown in Figure 3.12). patible with the user’s Connector packaging format) in the
App Store, the App can be requested. This is indicated in the
When it comes to using a Data App that is offered by an App “Retrieve App” sub process, which is conceptually identical
Store, App Users (Data Provider or Data Consumer) need to with the “Invoke Data Operation” process outlined in section
execute a process that is very similar to the “Exchange Data” 3.3.2, which is why a detailed discussion is omitted here.
process described above.
039 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.4
3.4
1 INFORMATION LAYER 3.4.2 MODEL REPRESENTATIONS
The Information Layer specifies the Information Model, the The Information Model has been specified at three levels of
domain-agnostic, common language of the International formalization. Each level corresponds to a digital representa-
Data Spaces. The Information Model is an essential agree- tion, ranging from this high-level, conceptual document down
ment shared by the participants and components of the IDS, to the level of operational code, as depicted in Figure 314.
facilitating compatibility and interoperability. The primary Every representation depicts the complete Information Mod-
purpose of this formal model is to enable (semi-)automated el in its particular way. Among the different representations,
exchange of digital resources within a trusted ecosystem of the Declarative Representation (IDS Ontology) is the only nor-
distributed parties, while preserving data sovereignty of Data mative specification of the Information Model. As such, it is
Owners. The Information Model therefore supports the de- accompanied by a set of auxiliary resources (e.g. guidance
scription, publication and identification of data products and documents, reference examples, validation tools, and editing
reusable data processing software (both referred to herein- tools intended to support a competent, appropriate, and con-
after as “Digital Resources”, or simply “Resources”). Once the sistent usage of the IDS Ontology).
relevant Resources are identified, they can be exchanged and
consumed via semantically annotated, easily discoverable 3.4.2.1 CONCEPTUAL REPRESENTATION
services. Apart from those core commodities, the Informa- The Conceptual Representation of the Information Model
tion Model describes essential constituents of the Interna- presents a high-level overview of the main, largely invariant
tional Data Spaces, its participants, its infrastructure compo- concepts, with no commitment to a particular technology or
nents, and its processes. domain. It targets a general audience, management boards,
and media, as it provides basic information and promotes
a shared understanding of the concepts by means of a tex-
3.4.1 SCOPE tual document and a plausible visual notation. If available,
references to related elements of the Declarative Represen-
tation4 and a Programmatic Representation5 are provided,
The Information Model is a generic model, with no commit- encouraging the reader to take a look at these alternative
ment to any particular domain. Domain modeling is dele- implementations.
gated to shared vocabularies and data schemata, as provid-
ed e.g. by domain-specific communities of the International 3.4.2.2 DECLARATIVE REPRESENTATION
Data Spaces. The Information Model does not provide a me- The Declarative Representation (IDS Ontology) provides a
ta-model for defining custom datatypes comparable to stan- normative view of the Information Model of the Internation-
dards such as OData2 or OPC-UA3. Concerns beyond the scope al Data Spaces. It has been developed along the analysis,
of modeling Digital Resources and their interchange are con- findings, and requirements of the Conceptual Representa-
sidered out of scope. The Information Model therefore does tion. Based on a stack of W3C Semantic Web technology stan-
not deal with the side effects of data exchange (e.g. in scenar- dards6 and standard modeling vocabularies (DCAT7, ODRL8,
ios in which data is used for time-critical machine operations). etc.), it provides a formal, machine-interpretable specifica-
tion of concepts envisaged by the Conceptual Representa-
tion. Furthermore, it details and formally defines entities of
the International Data Spaces in order to be able to share,
search for, and reason upon the structured metadata de-
scribing these entities. As such, it comprises a complete ref-
2
https://www.odata.org/
3
https://opcfoundation.org/
4
https://github.com/IndustrialDataSpace/InformationModel
5
https://maven.iais.fraunhofer.de/artifactory/eis-ids-snapshot/
040 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.4
erential model allowing the derivation of a number of Pro- 3.4.2.3 PROGRAMMATIC REPRESENTATION
grammatic Representations. The IDS Ontology is typically The Programmatic Representation of the Information Mod-
used and instantiated by knowledge engineers, ontology el targets Software Providers by supporting seamless inte-
experts, or information architects. It defines a fairly mini- gration of the Information Model with a development infra-
mal, domain-agnostic “core model” and relies on third-party structure software developers are familiar with. It comprises
standard and custom vocabularies in order to express do- a programming language data model (e.g., Java, Python, C++)
main-specific facts. According to the common practice, ex- shipped as a set of documented software libraries (e.g., JAR
isting domain vocabularies and standards are reused where files). The Programmatic Representation provides best-ef-
possible, fostering acceptance and interoperability. fort mapping of the IDS Ontology onto native structures of a
target programming language. This approach supports type-
safe development, well-established unit testing, and quality
assurance processes. It allows developers to easily create
instances of the Information Model that are compliant with
the IDS Ontology, relieving them from the intricacies of on-
tology processing.
Programmatic Representation
specific
transformation IDS Information
Integration, tooling, processing
Model Library
Java, Python, C++ shared library
feedback
Conceptual Representation
IDS Reference
Analysis, overview, explanation
Architecture
generic Document, visual notation (UML)
descriptive executable
6
https://www.w3.org/standards/semanticweb/
7
https://www.w3.org/TR/vocab-dcat-2/
8
https://www.w3.org/TR/odrl-model/
041 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.4
9
https://www.ics.uci.edu/~fielding/pubs/dissertation/rest_arch_style.htm#tab_5_1
10
http://www.cs.utexas.edu/users/EWD/ewd04xx/EWD447.PDF
042 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.4
3.4.3.5.1 RESOURCE
Digital content at the Resource level of description abstracts
away from a particular physical manifestation and deals with
aspects that are shared equally by any of the content’s em-
bodiments.
043 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.4
RESOURCE TYPE There are various types of Digital Resourc- Audio refers to media content primarily intended for aural
es11,12. Resources may differ with regard to the intended pur- perception; consumption of such content normally requires
pose, the level of structuring, or the (sensory) requirements for an audio output device (i.e. a loudspeaker). Image is static (i.e.
its consumption and interpretation. Distinguished sets of prop- time invariant) media content intended for visual perception,
erties are expected to evolve per Resource type, depending on normally requiring a display device (i.e. a screen). Video is dy-
their (future) use and relevance. namic (i.e. time variant) media content intended for visual
and aural perception, combining the rendering requirements
Regarding the IDS-RAM, Data is defined in alignment with ISO/ of Image and Audio as well as further requirements on pro-
IEC 2382:201513 (Information technology – Vocabulary) as a cessing (decoding etc.). Software is a collection of machine-in-
statement of facts provided in a formalized, structured format terpretable instructions, such as executable software (binary),
intended primarily for machine processing (i.e. atomic values program code (source), or fragments thereof; after option-
or arrangements of data fields, optionally defined by a sche- al preprocessing (compilation, installation etc.) its intended
ma). Text represents a meaningful sequence of characters writ- purpose is a subsequent execution exposing functionality.
ten in human language, which is intended for being read and Opaque is another, unspecified type of custom, binary con-
interpreted by humans (or other intelligent agents) regardless tent. The Container is a collection of multiple (implicit) con-
of its Representation (e.g. document or screenshot image). tent elements that are distributed as a single unit (archive).
11
https://tools.ietf.org/html/rfc2046
12
http://dublincore.org/documents/dcmi-terms/#section-7
13
https://www.iso.org/standard/63598.html
044 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.4
14
http://dublincore.org/documents/dcmi-terms/#terms-hasPart
15
https://joinup.ec.europa.eu/release/statdcat-ap-v100
045 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.4
3.4.3.5.3 INSTANCE Accurate context modeling helps a client in searching for and
At a certain point in time, a Representation materializes into assessing the relevance of a Resource with respect to her in-
instances, which are either transient values or persisted files formational needs, for example, by looking at most recent
(Artifacts). Going beyond the prototypical level of Representa- data (Time) available for water pipelines (Entity) within a par-
tion, an Instance captures properties that are unique to this ticular area of interest (Space)
materialization of the Resource’s content or particular ele-
ments thereof. 3.4.3.6.1 TIME AND SPACE
Time and space are quantifiable context dimensions usually
Example: Version 3.1 of the above mentioned report; date of expressed by coordinates with regard to a shared reference
creation: 2018/01/17; file size: 1,73 MB (PDF) and 1,81 MB system, such as Coordinated Universal Time (UTC16) or World
(MS Word), respectively. Geodetic System 1984 (WGS 8417), allowing for unambiguous
interpretation. One-dimensional temporal context is limited
IDENTITY A rendered artifact may be provided with (par- to either a single point in time (instant) or an interval with
tial) identity features, such as a file name or hash sum. It be- a non-empty duration. Thanks to the linear nature of time,
comes identifiable and distinguishable from other artifacts, open-end intervals may express a continuous period with
and is suited for file-oriented provision. (Representations, in only an endpoint defined18. In contrast to temporal context,
contrast, are suited for interactive, service-oriented provision, spatial context is capable of expressing two-dimensional and
due their nature of being prototypical „blueprints“.) three-dimensional shapes as bounding boxes defined by a set
of coordinates.
SIZE The Size (specified e.g. in bytes) is another inherent char-
acteristic of an artifact. Example: Time period covered by the report, starting at
01/01/2000 UTC (end time is undefined here, as the report is
3.4.3.6 CONTEXT continuously updated).
The Context concern deals with temporal and spatial aspects
as well as with real-world entities a Resource’s content relates 3.4.3.6.2 REAL-WORLD ENTITIES
to (intrinsic context). It addresses questions like: This type of qualitative context refers to identifiable tempo-
ral and spatial entities, i.e. which are (implicitly) defined by
»» What time period does the content cover? spatio-temporal coordinates. These are conventionalized
named entities, such as time periods19 (“Renaissance”), coun-
»» When and where was it gathered? try codes (according to ISO 316620), national21 and interna-
tional road names (ECE/TRANS/SC.1/2016/3/Rev.122) etc. Be-
»» Which sub-entity of a larger entity does a certain dataset ing based upon an established reference system, standard,
relate to? or convention, such entities are considered universally valid.
In addition, within restricted domains (e.g. a building), cus-
tom context entities may be defined (e.g. individually num-
bered rooms), serving the purposes of contextualizing data
(e.g. for sensor observations). The usability of custom context
entities is limited by the characteristics of the defining model,
i.e. being a machine-interpretable, widely accepted one (ISO
1673923), and the context entities themselves. These should
have a (semantic) type or concept information attached in or-
der to support general, categorical queries for data (e.g. tem-
perature sensed in all “laboratories”). This type of annotation
is, among others, supplied by the Concept concern.
046 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.4
3.4.3.7 CONCEPT (formally) defined and reusable Terms, which can be shared
The Concept concern deals with the modeling of the “mean- across different scenarios and domains. In addition, concep-
ing”, annotation, and interpretation of entities introduced by tual schemas and ontologies define Types of entities, if these
the orthogonal Resource concerns (Content, Context, Com- are to be individually modeled as custom instances.
munication etc.). It addresses questions like:
KEYWORD Keywords are natural language annotations (tags)
»» What type of observation does the data refer to “tempera- arbitrarily chosen by the Data Provider to accurately charac-
ture” ? terize the Resource from their perspective. As such, they are
likely to be subjective and more domain specific than general
»» What kind of object does a context entity represent (facto- terms provided by controlled vocabularies. Consistency and
ry, building)? alignment of custom tag sets can be supported by means of
documentation (guidance), editing tools (tag suggestions), or
»» What is the meaning of a certain date parameter (begin- quality gates during the publication process, for example.
ning or end of a range)?
Examples: “statistics”, “highway”, “usage”, “traffic”, “Europe”.
Example: http://example.org/traffic_statistics.
Example: http://example.org/TabularTrafficReport.
16
https://www.itu.int/dms_pubrec/itu-r/rec/tf/R-REC-TF.460-6-200202-I!!PDF-E.pdf
17
http://earth-info.nga.mil/GandG/publications/tr8350.2/wgs84fin.pdf
18
https://www.loc.gov/standards/datetime/edtf.html
19
https://en.wikipedia.org/wiki/List_of_time_periods
20
https://www.iso.org/iso-3166-country-codes.html
21
https://en.wikipedia.org/wiki/List_of_autobahns_in_Germany
22
https://www.unece.org/trans/main/sc1/sc1doc_2016.html
23
https://www.iso.org/standard/70303.html
047 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.4
3.4.3.8 COMMUNICATION into service interfaces (i.e., sets of a coherent functionality de-
The Communication concern deals with means to communi- fining an abstract “interaction contract”).
cate a Resource’s content in one of the Representations avail- Example: Read operation providing access to a parameter-
able. It addresses questions like: ized report (may expect a start year parameter, an end year
parameter, or both).
»» Is there any input required on client to retrieve the content?
PARAMETER Parameters are named slots of an operation’s
»» What communication protocols are supported? interface. They define the least level of content granularity an
operation may (optional) or must (mandatory) expect as an
»» What does a valid request look like? input or output. Each parameter mediates a particular kind of
digital content. This is defined by reusing the triadic content
»» What is the address of the endpoint handling the request? model from Section 3.4.3.5. Thereby abstract aspects (i.e. the
meaning) and concrete aspects (i.e. the shape) of the parame-
ter are covered. Optionally, the default value or lists of select-
able, enumerated values can be defined as instances of that
content model. Additional parameter types (e.g., an ID or the
start or end of a period) provide information for operation cli-
ents about the purpose and intended usage of the parameter
and may e.g. support a query generation process.
24
https://www.ics.uci.edu/~fielding/pubs/dissertation/rest_arch_style.htm
25
https://www.w3.org/TR/xpath-31/
26
https://tools.ietf.org/search/rfc4511#section-4.5.1
048 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.4
27
https://www.w3.org/TR/wsdl20-adjuncts/#meps
049 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.4
3.4.3.8.2 ENDPOINT munication (e.g. addresses, transaction ID) and allows inter-
An Endpoint is a concrete point of content exchange (Re- pretation of the context (i.e. type of content, usage contract)
source Endpoint) and service interaction (Service Endpoint) within which an Instance of a Resource’s digital content is
that is uniquely identifiable via a specific communication pro- mediated. Depending on the implementation, this metada-
tocol. ta may be supplied as a standalone part of an initial session
negotiation or as an integral part of the content transfer (e.g.,
Example: https://stathub.org/report?start={year1}&end={- as header part of a compound multi-part message30). Thus,
year2}. the Message metadata may either complement interactions
of legacy application protocols or may be used independently
BINDING An individual operation or an entire interface can as a foundation for modeling the exchange of the Resource
be invoked at an Endpoint by bindings to communication in a generic, technology-agnostic manner. In the latter case,
protocols (such as HTTP/228) by means of established, ma- each state of the interaction is mapped onto an instance of an
chine-readable interface description languages (e.g., Open appropriate Message type (ArtifactRequestMessage).
API29).
Example: Message of the “ArtifactRequestMessage” type request-
HOST The address scheme type (e.g., HTTPS URL, MQTT topic) ing provision of the artifact named “Report_2000-2010.pdf”.
and communication protocol are defined by the implement-
ing host, which is a server node installed within a Connector. MESSAGE TYPE Figure 3.21 illustrates an excerpt of the Mes-
Within the address space of the host, each Endpoint is regis- sage taxonomy. Request-response interactions between the
tered at a particular path, topic, or queue. Connectors of interacting participants are reflected by the
dedicated subclasses of the RequestMessage and the Reques-
3.4.3.8.3 MESSAGE tResponse type. Event-like notifications are reflected by the
In contrast to the general communication capabilities de- NotificationMessage subclasses.
scribed above, the Message concept describes the content
payload being exchanged at runtime between Connectors.
Message metadata provides traceable evidence of the com-
28
https://tools.ietf.org/html/rfc7540
29
https://www.openapis.org/
30
https://tools.ietf.org/html/rfc7578
050 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.4
31
https://jwt.io/
32
https://www.w3.org/TR/prov-o/
051 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.4
33
Juran, J.M., Juran on Planning for Quality. 1988, New York: The Free Press.
34
https://iso25000.com/index.php/en/iso-25000-standards/iso-25012
35
https://certificates.theodi.org/
052 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.4
36
https://www.w3.org/TR/odrl-vocab/#actionConcepts
37
https://www.w3.org/TR/odrl-vocab/#term-LeftOperand
053 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.4
054 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.4
3.4.3.10.1 PARTICIPANT SITE Each Participant is associated with at least one site that
A Participant is a legal or natural person assuming a role (or serves the purpose of addressing geo-spatial queries (for rea-
more than one role) in the International Data Spaces. Partici- sons of proximity) or finding out about the local law in force.
pants must undergo a formal certification process.
BUSINESS Participants may indicate the type of business and
Example: AAStat, a public agency maintaining an infrastruc- the domain in which they operate by making references to an
ture for monitoring, analysis, and prediction of highway sta- established business classification (such as NAICS39 or ISIC40).
tistics in Germany, has branches in Bonn and Berlin; since This information may support clients searching for digital
it provides open data that is available without any liability, content by business category.
it has refrained from undergoing an expensive certification
process. CERTIFICATION Depending on the role a Participant wants
to assume in the IDS, the Participant may choose (or be re-
IDENTITY Participants are registered at the International quired) to undergo an evaluation process resulting in a certi-
Data Spaces with a digital identity (X.509 certificate), along- fication that states its compliance with a criteria catalog based
side with other established, external identifiers (such asthe on an evaluation method.
D-U-N-S Number38). In accordance with linked-data princi-
ples, a Participant should always be unambiguously identifi-
able by a resolvable HTTPS URL, which links to a live metadata
document describing the Participant.
38
https://www.dnb.com/duns-number/
39
https://www.census.gov/cgi-bin/sssd/naics/naicsrch?chart=2017
40
https://unstats.un.org/unsd/publication/seriesm/seriesm_4rev4e.pdf
055 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.4
056 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.4
41
https://www.mydata-control.de/
057 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.4
RESOURCE Usage Policies originally published alongside with »» The Content concern deals with the description of a Re-
a Resource (Contract Offer) are the starting point of a Con- source’s inherent substance, i.e. its “content” available in
tract negotiation process. Over the course of this process, any any machine-interpretable, binary format.
incomplete or newly agreed details regarding Resource ex-
change are complemented, such as the identification of the »» The Context concern deals with temporal and spatial as-
Resource content in question, communication Endpoints, au- pects as well as with real-world entities a Resource’s con-
thorization token(s), or the provisioning period. tent relates to.
RULE Likewise, applicable Rules are selected and configured »» The Concept concern deals with the modeling of the mean-
in accordance with the Data Provider’s demand and the Data ing, annotation, and interpretation of entities introduced
Consumer’s economic, legal and technical options. By agree- by another Resource concerns such as Content and Con-
ing on a Usage Contract, the Data Consumer explicitly con- text.
firms its capability of implementing and enforcing the stipu-
lated rules. »» The Communication concern deals with means to commu-
nicate a Resource’s content in one of the Representations
available.
058 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.4
059 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.4
3.4.5 DATA APP INTERFACES The description of Data Apps facilitates the discovery and
selection of a Data App in an IDS App Store. Consequently,
metadata must contain all necessary information to specify
Similar to an IDS Connector providing information on its iden- the value proposition and the applicability of the respective
tity, functional range, and interaction capabilities, an IDS Data Data App. Furthermore, metadata is a fundamental building
App provides information about itself according to the IDS block for the deployment and composition of several Data
Information Model. A description file contains details about Apps inside an IDS Connector. Therefore, all operations have
the intended usage and purpose of the Data App, the security to be defined in terms of input and output parameters, bound
level, and the licensing model applied. In addition, a Data Pro- protocols, and endpoints. Preconditions and postconditions
vider may describe a Data App with vocabularies outside the need to be made explicit, and effects on the environment
IDS core ontology (for instance, domain specific explanations must be outlined.
may require further terms and concepts).
Store App
Meta
Meta
App
Meta
Data Data
Connector Data Connector
Source Sink
Data
Dataset(s) transferred from
Provider to Consumer Data exchange (active)
060 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.5
»» the Broker, and Connectors can be further distinguished into External Con-
nectors and Internal Connectors:
»» the App Store.
»» An External Connector executes the exchange of data be-
How these components interact with each other is depicted tween participants of the International Data Spaces. The
in Figure 3.31. International Data Spaces network is constituted by the to-
tal of its External Connectors. Each External Connector
The Connector, the Broker, and the App Store are supported provides data via the Data Endpoints it exposes. Applying
by four additional components (which are not specific to the this principle, there is no need for a central instance for
International Data Spaces, but specified for the International data storage. An External Connector is typically operated
Data Spaces): behind a firewall in a specially secured network segment
of a participant (so-called “Demilitarized Zone”, DMZ).
»» the Identity Provider as defined in the Security From a DMZ, direct access to internal systems is not possi-
Perspective, ble. It should be possible to reach an External Connector
using the standard Internet Protocol (IP), and to operate it
»» the Vocabulary Hub currently as defined outside the IDS, in any appropriate environment. A participant may oper-
ate multiple External Connectors (e.g., to meet load bal-
»» the Update Repository (i.e. the source for updates of de- ancing or data partitioning requirements). External Con-
ployed Connectors) depending on the connectors technol- nectors can be operated on-premises or in a cloud
ogy, and environment.
»» the Trust Repository (i.e. the source for trustworthy soft- »» An Internal Connector is typically operated in an internal
ware stacks and fingerprints as well as remote attestation company network (i.e., a network which is not accessible
checks) as discussed in the Security Perspective. from outside). Implementations of Internal Connectors
and External Connectors may be identical, as only the pur-
pose and configuration differ. The main task of an Internal
A distributed network like the International Data Spaces re- Connector is to facilitate access to internal data sources in
lies on the connection of different member nodes where Con- order to provide data to External Connectors.
nectors or other core components are hosted (a Connector
comprising one or more Data Endpoints). The Connector is
responsible for the exchange of data or as a proxy in the ex-
change of data, as it executes the complete data exchange
process (see Section 3.3.2) from and to the internal data re-
sources and enterprise systems of the participating organiza-
tions and the International Data Spaces. It provides metadata
061 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.5
3.5.1 CONNECTOR ARCHITECTURE Data Apps are data services encapsulating data processing
and/or data transformation functionality bundled as con-
tainer images for simple installation by application container
The Connector Architecture uses application container man- management.
agement technology to ensure an isolated and secure envi-
ronment for individual data services. A data service matches Using an integrated index service, the Broker manages the
a system which offers an API to store, access or process data. data sources available in the International Data Spaces and
To ensure privacy of sensitive data, data processing should supports publication and maintenance of associated meta-
take place as close to the data source as possible. Any data data. Furthermore, the Broker Index Service supports the
preprocessing (e.g., filtering, anonymization, or analysis) search for data resources. Both the App Store and the Broker
should be performed by Internal Connectors. Only data in- are based on the Connector architecture (which is described
tended for being made available to other participants should in detail in the following paragraphs) in order to support se-
be made visible through External Connectors. cure and trusted data exchange with these services.
Data
Bus
Network Workflow
Execution Execution
Data Data Execution Configurator Configurator …
App App Core
Operating System
062 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.5
Figure 332 illustrates the internal structure of the Connector. placed by alternative implementations in order to meet
A concrete installation of a Connector may differ from this the requirements of the operator. The selection of an
structure, as existing components can be modified and op- appropriate Data Bus may depend on various aspects
tional components added. The components shown in Figure (e.g., costs, level of support, throughput rate, quality of
332 can be assigned to two phases: Execution and Configu- documentation, or availability of accessories).
ration.
»» An App Store Container is a certified container download-
The Execution phase of a Connector involves the following ed from the App Store, providing a specific Data Service to
components: the Connector.
»» Application Container Management: In most cases, the »» A Custom Container provides a self-developed Data Ser-
deployment of an Execution Core Container and selected vice. Custom containers usually require no certification.
Data Services is based on application containers. Data Ser-
vices are isolated from each other by containers in order »» A Data Service defines a public API, which is invoked from
to prevent unintended interdependencies. Using Applica- a Data Router. This API is formally specified in a meta-de-
tion Container Management, extended control of Data Ser- scription that is imported into the configuration model.
vices and containers can be enforced. During develop- The tasks to be executed by Data Services may vary. Data
ment, and in case of systems with limited resources, Services can be implemented in any programming lan-
Application Container Management can be omitted. Diffi- guage and target different runtime environments. Existing
culties in container deployment can be handled by special components can be reused to simplify migration from oth-
Execution Configurators (see below). er integration platforms.
»» An Execution Core Container provides components for in- »» The Runtime of a Data Service depends on the selected
terfacing with Data Services and supporting communica- technology and programming language. The Runtime to-
tion (e.g., Data Router or Data Bus to a Connector). gether with the Data Service constitutes the main part of a
container. Different containers may use different run-
–– A Data Router handles communication with Data Ser- times. What runtimes are available depends only on the
vices to be invoked according to predefined configura- base operating system of the host computer. From the
tion parameters. In this respect, it is responsible of how runtimes available, a service architect may select the one
data is sent (and received) to (and from) the Data Bus deemed most suitable.
from (and to) Data Services. Participants have the op-
tion to replace the Data Router component by alterna- The Configuration phase of a Connector involves the follow-
tive implementations of various vendors. Differences in ing components:
configuration can be handled by specialized Execution
Configurator plug-ins. If a Connector in a limited or em- »» The Configuration Manager constitutes the administrative
bedded platform consists of a single Data Service or a part of a Connector. Its main task is the management and
fixed connection configuration (e.g., on a sensor de- validation of the Configuration Model, followed by deploy-
vice), the Data Router can be replaced by a hard-coded ment of the Connector. Deployment is delegated to a col-
software, or the Data Service can be exposed directly. lection of Execution Configurators by the Configurator
The Data Router invokes relevant components for the Management.
enforcement of Usage Policies, e.g. a Policy Enforce-
ment Point (see section 4.1.3.6), as configured in the »» The Configuration Model is an extendable domain model
connector or specified in the Usage Policy. for describing the configuration of a Connector. It consists
of technology-independent, inter-connected configuration
–– The Data Bus exchanges data with Data Services and aspects.
Data Bus components of other Connectors. It may also
store data within a Connector. Usually, the Data Bus »» Configurator Management loads and manages an ex-
provides the method to exchange data between Con- changeable set of Execution Configurators. When a Connec-
nectors. Like the Data Router, the Data Bus can be re-
063 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.5
tor is deployed, the Configurator Management delegates the Data Services and the Data Bus (for multiple
each task to a special Execution Configurator. data pipelines).
»» Execution Configurators are exchangeable plug-ins which • “Networking” relates to the definition of net-
execute or translate single aspects of the Configuration work parameters (ports, IPs, etc.) for being used
Model to a specific technology. The procedure of executing inside the Connector as well as for connections
a configuration depends on the technology used. Com- to External Connectors.
mon examples would be the generation of configuration
files or the usage of a configuration API. Using different • “Security” contains information about, for ex-
Execution Configurators, it is possible to adopt new or al- ample, which SSL certificates should be used for
ternative technologies and integrate them into a Connec- connections, or which public key infrastructure
tor. Therefore, every technology (operating system, appli- should be used.
cation container management, etc.) gets its own Execution
Configurator. • “Compliance / Data Sovereignty” specifies rules
to be checked by the Validator before Connector
»» The Validator checks if the Configuration Model complies deployment. If warnings or errors occur, deploy-
with self-defined rules and with general rules specified by ment may be canceled. This feature is used to
the International Data Spaces, respectively. Violation of prevent incorrect configuration of the Connec-
rules can be treated as warnings or errors. If such warn- tor.
ings or errors occur, deployment may fail or be rejected.
–– “Service Configuration” defines how configuration pa-
As the Configuration phase and the Execution phase are sep- rameters for Data Services or other Connector compo-
arated from each other, it is possible to develop, and later nents have to be set.
on operate, these components independently of each other.
Different Connector implementations may use various kinds • “Metadata” describes the data types for input and
of communication and encryption technologies, depending output used by different Connector components
on the requirements given. (see chapter 3.4.5 - App Interfaces). Data Services
can provide metadata descriptions, which can be
3.5.1.1 CONNECTOR CONFIGURATION MODEL imported to the Configuration Model. This infor-
The Connector Configuration Model describes the configura- mation is used to configure the Data Flow.
tion of a Connector, which is set-up during deployment. The
model is technology-independent. A Connector can be config- –– “Publishing” defines which Data Flows or Data Services
ured for different statuses (development, test, or live). are provided to external participants. This information
is submitted to a Broker.
The components of the Connector Configuration Model are
implemented with the help of special Execution Configurators: • “Identity Management” defines the Identity
Provider, which is closely integrated with the
»» “General Information” includes the configuration type, Connector. To be able to connect to an Identity
the Connector type (Base, Trusted, Mobile, Embedded, Provider, a Data Service may need additional li-
Developer), the Connector version, a timestamp of the braries.
last change made to the configuration, the configuration
status (development, test, live), and a name of a contact • For “Accounting” of a data exchange transaction
person. between participants, it is necessary to record
additional information, such as contract specifi-
»» “Lifecycle” contains information on the Data Flow, the cations, pricing models, or billing details.
Service Configuration, and Publishing.
• “Clearing” describes which Clearing House
–– “Data Flow” defines the configuration of tasks and should be informed regarding a certain data ex-
connections established by the Data Router between change transaction.
064 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.5
065 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.5
MOBILE CONNECTOR
Mobile operating systems (e.g., Android, iOS, or Windows
Mobile) use platforms with limited hardware resources. In
such environments, application container management is
not necessarily required. The same applies for operating sys-
tems which do not support application containers, or systems
without any operating system (e.g. microcontrollers). In such
environments, Data Services (and the execution core) can be
started directly on the host system, without requiring any vir-
tualization. The differences between Connectors with con-
tainers and Connectors without containers can be met by dif-
ferent Execution Configurator modules.
066 //
LAYERS OF THE REFERENCE ARCHITECTURE MODEL // 3.5
3.5.2 BROKER »» Smart Data Apps (or Data Sink Connectors) are Data Apps
on the Data Consumer side, executing any kind of data
processing, transformation, or storage functionality. Nor-
The IDS Broker consists of an IDS Connector (see section mally, the data provided by, or sent to, a Smart Data App is
3.5.1), a service for data source registration, publication, already annotated with metadata (as described in the In-
maintenance, and query, based on an index. Therefore, for formation Layer section).
any interaction with the IDS Broker the processes defined
on the Process Layer, the descriptions defined on the Infor- »» Other Apps providing a certain use of the data on Data
mation Layer, and descriptions defined on the System Layer Consumer or Data Provider side. Usage Policies can en-
can be applied. The Information Layer describes the message force the processing of the data in a trusted environment,
types for Broker registration and query. An IDS Broker may i.e. a Trusted Connector.
provide additional services that must be described by the IDS
Information Model. The IDS App Store is a secure platform for distributing Data
Apps; features different search options (e.g. by functional or
non-functional properties, pricing model, certification status,
community ratings, etc.).An IDS App Store consists of a regis-
3.5.3 DATA APPS AND APP STORE try for available Data Apps in this App Store. Therefore an App
Store supports operations for Data App registration, publica-
tion, maintenance, and query, as well as operations for the
As described in section 3.5.1 Connectors can make use of provisioning of a Data App to a connector. These basic opera-
Apps for several purposes. Three types of Data Apps can be tions can be complemented by additional services, e.g. billing
distinguished: or support activities.
067 //
PERSPECTIVES OF
4
THE REFERENCE
ARCHITECTURE MODEL
68 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.1
DIRECTLY RELATED TO THE FIVE LAYERS OF THE IDS-RAM ARE THREE CROSS-SECTIONAL PERSPECTIVES:
SECURITY, CERTIFICATION, AND GOVERNANCE.
THESE ARE DESCRIBED IN DETAIL IN THE FOLLOWING SECTIONS.
069 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.1
Policy Set
Data Flow Control Data Flow Control
Data Service Message Queue Connection Mgmt. Message Queue Connection Mgmt. Target App
IDS Protocol
Trusted Container Management Layer Trusted Container Management Layer
070 //
© Fraunhofer 1
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.1
IDS Connectors must communicate with each other over an 4.1.3.2.1 MAPPING OF PARTICIPANT CERTIFICATION
encrypted tunnel (e.g., TLS), as depicted in Figure 41, and may AND CONNECTOR CERTIFICATION TO
use IDSCP or another appropriate protocol, like https or mqtt. IDENTITY MANAGEMENT
There are two targets of certification: Participants (receiving
The IDSCP is a high-level protocol established via WebSocket a Participant Certificate) and Core Components (receiving a
Secure (WSS). It contains several “conversations”, which can Core Component Certificate). If a Participant (e.g., a company)
be initiated by either side and must be confirmed by the other is successfully certified, it is allowed to participate in the In-
side to be entered. Currently, two conversations are provid- ternational Data Spaces. The Participant has to use a certified
ed: remote attestation and metadata exchange. The protocol IDS Connector. With both certificates, the Participant Certifi-
itself is performed inside a tunneled connection. The protocol cate and the Core Component Certificate, the Participant can
supports and enables several communication aspects: request a digital X.509 certificate for identification, authenti-
cation, and encryption.
»» identification and authentication,
A X.509 certificate contains only the most relevant, static in-
»» remote attestation, formation:
»» data exchange (together with usage policy information at- »» O (organizationName): name of the organization (e.g.
tached). Fraunhofer);
The last aspect, data exchange, provides the basic mechanism »» OU (organizationalUnitName): name of the organiza-
of data usage control, as it is possible to attach data usage tional unit (e.g. AISEC),
policy information in order to specify how the data may be
used by the Data Consumer. However, the specification of the »» CN (commonName): Universally Unique Identifier (UUID)
IDSCP is not part of this document. (e.g. 59C3BAE6-1C06-4723-802B-12C7DCF94E58);
»» authorization (i.e., making access decisions based on an It is important to note that any modification of attributes leads
identity). to revocation and reissuing of the certificate. For this reason,
the number of attributes that are contained in a cer tificate
The Certificate Authority (CA) issues certificates for all en- needs to be kept at a minimum. Dynamic attributes are kept
tities. These certificates are used for authentication and en- by the Dynamic Attribute Provisioning Service (DAPS).
cryption between Connectors.
071 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.1
Trust Provider
IDS Certification Authority (CA)
© Fraunhofer 1
This allows for specific parties to issue certificates for specif- The attributes for Connectors to be embedded in the X.509
ic purposes. It is also possible to support multiple instances certificate are defined above.
(e.g., multiple Connector Sub-CAs). The structure of the PKI is
not defined in this document. Once received, the Connector Certificate can be deployed
onto the Connector. The X.509 Certificate ensures that data is
always exchanged in an authenticated and encrypted manner.
Certification Body
Figure 4.3:
© Fraunhofer 1 Embedding the Connector Certificate
072 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.1
4.1.3.2.4 USING THE DYNAMIC ATTRIBUTE 4.1.3.2.5 USING AN AUTHORIZATION SERVICE FOR
PROVISIONING SERVICE (DAPS) FOR RESOURCE ACCESS CONTROL
IDENTITY MANAGEMENT Using an Authorization Service (featuring access tokens) al-
Using a service to hand out attributes in a dynamic fashion lows use case dependent modeling of access control deci-
reduces the need for certificate revocation and enables more sions. Delegation of access decisions is possible. In complex
flexible attribute handling for participants in the Internation- workflows, multiple Connectors can use a dedicated Autho-
al Data Spaces. This allows dynamic assignment of attributes rization Service to delegate resource access decisions. The
and status flags to Connector instances. Examples of status DAPS acts as the Authorization Service for the IDS.
flags are:
A workflow for accessing a resource (e.g., a Data Service) us-
»» Withdraw a security status if known vulnerabilities have ing dynamic attributes and access tokens is defined as follows:
not been fixed.
1. A Dynamic Attribute Token (DAT) is requested from the Dy-
»» Upgrade the certification status without reissuing a X.509 namic Attribute Provisioning Service, presenting the Con-
certificate. nector’s X.509 certificate. Depending on the verification
policy specified, the attribute can be verified at the CA.
»» Assign membership status to a workflow with contractors.
2. Before accessing a resource, a TLS tunnel is established
Notification of temporary changes of a Participant’s level of using the same X.509 certificate. Again, depending on the
trustworthiness. policy specified, the certificate can be verified at the CA.
Provisioning of mutable attributes (e.g. address of the orga-
nization). 3. (Optional) If using several Access Tokens (ATs), a token re-
quest is performed at a separate Authorization Service in
This concept avoids revocation of certificates in most cases, the domain of a use case operator or the domain of the
as it allows to include new attributes if need arises. Connector’s (or, more specifically, resource’s) owner.
not defined in this document.
4. The resource is requested by handing in either the Dynam-
ic Attribute Token (DAT) or the Access Token (AT).
© Fraunhofer 1
073 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.1
Due to the small size of access tokens, it is possible to incor- 4.1.3.3.1 PKI ROLLOUT
porate these tokens into any resource request and support To guarantee secure identity management, the International
stateless access management. Both DATs and ATs use the Data Spaces defines technical roles for implementing a PKI
JSON Web Token (IETF RFC 7519)42 standard. system that is flexible enough to support all roles defined on
the Business Layer. In particular, six entities with different
4.1.3.3 TRUST MANAGEMENT security levels are relevant for the Security Architecture. In
To establish trust across the entire business ecosystem (i.e., the following, these entities and the technical roles related to
to protect Participants from fraud and ensure they abide by them are described.
the designated rules), the International Data Spaces makes
use of cryptographic methods. One such method is the pub-
lic key infrastructure (PKI). A central principle of a PKI is that
every entity is allocated with secret keys, allowing each entity
to authenticate against other Participants. Thereby, a hierar-
chy is created, with the Identity Provider on top issuing certifi-
cates to the other entities, which in turn may issue certificates
to other entities, and so on. In the following, the PKI rollout is
described for mapping roles and entities required for the de-
ployment of the International Data Spaces.
Identity Provider
42
https://tools.ietf.org/html/rfc7519
074 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.1
As a trusted entity, the Identity Provider manages the PKI CA is used by the App Store to ensure the validity of services
rollout. It takes care if certificates expire or must be revoked. downloaded by other Connectors. This means that if an App
There are two separate PKI hierarchies: one for software sig- Store signs a CSR (i.e., issues a certificate), a Connector re-
natures (Software Signing Root CA) and one for the Connec- ceives a certificate for a downloaded Data App.
tors (Service Root CA). An entity is assigned with either an end
certificate or a sub/root-CA certificate. The two hierarchies 4.1.3.3.1.5 APP PROVIDER
protect the interests of the six entities. App Providers must seek approval of Data Apps from the Cer-
tification Body. Upon successful certification of a Data App,
The Identity Provider also acts as an authorization service (as the App Provider may publish the Data App by uploading it to
described above) by incorporating the DAPS. the App Store. Each App Provider can be unambiguously iden-
tified by a certificate issued by the Identity Provider.
4.1.3.3.1.2 SOFTWARE PROVIDER
A Software Provider produces and distributes basic software 4.1.3.3.1.6 CERTIFICATION BODY
stacks for Connectors (for rollout and deployment). To ev- When an App Provider uploads a Data App, the App Store not
ery Software Provider seeking admission to the International only checks if the Data App comes from an approved App Pro-
Data Spaces, the Identity Provider issues a service sub-CA re- vider, but also if the software meets certain quality and secu-
quest. An approved Software Provider uses the service sub- rity standards. Therefore, App Providers must send the Data
CA during rollout and deployment of the Connector in order App to a Certification Body for inspection. The Certification
to provide it with an initial, valid and preconfigured system. Body checks the validity of the App Provider’s signature. If the
signature is valid, the source code of the respective Data App
4.1.3.3.1.3 CONNECTOR is inspected. If the Data App meets the quality and security
A Connector is allowed to communicate with other Connec- standards, the Certification Body signs the Data App with the
tors only if acquired from an approved Software Provider. certificate’s private key. To do so, it does not need a sub-CA,
Connectors download Data Apps from the App Store. For as it only signs the software, but does not create a certificate.
each Data App downloaded, the Connector creates a service
key pair and a Certificate Signing Request (CSR). While the 4.1.3.3.2 CONNECTOR MANIFESTATIONS
private key is used to identify the Data App and to protect A Connector can run different services and communicate
its data, the CSR is sent to the App Store, which uses it to is- with other Connectors. Using the PKI, a Connector protects
sue a certificate. This also allows entities to check whether the persistent storage of its services and the communication
the license of a certain Data App is still valid (see e.g. remote with other Connectors (in terms of authenticity, confidential-
attestation). Furthermore, the private key and the certificate ity, etc.). The following items characterize a Connector in the
are used for establishing a secure channel with other Connec- International Data Spaces from the security perspective:
tors. During rollout, the Software Provider deploys an initial
system onto the Connector and signs the Connector’s corre- 4.1.3.3.2.1 CONFIGURATION
sponding service CSRs for the initial system. Among other things, the configuration specifies from where
the Connector downloads new services, or which Brokers or
4.1.3.3.1.4 APP STORE Online Certificate Status Protocol (OCSP)43 servers it uses.
A Connector downloads the software it requires (i.e. Data Configuration is required in order to boot the system. It is ex-
Apps) from an App Store. Connectors can only connect with ecuted during the Connector’s deployment.
the App Store for requesting downloads and updates. As the
App Store is a Connector itself, it additionally stores its own 4.1.3.3.2.2 CA CERTIFICATES
sub-CA. When a new provider sets up an App Store, the Iden- In order to verify PKI signatures (e.g., for authentication or for
tity Provider signs a sub-CA request issued by the App Store Data Apps that were downloaded), the Connector stores the
provider. The App Store provider deploys this sub-CA inside trusted root certificates (Service Root CA and Software Sign-
the App Store (i.e., inside the respective Connector). This sub- ing Root CA) in a way their integrity is preserved (Figure 4.7).
1
43
https://tools.ietf.org/html/rfc6960
075 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.1
4.1.3.3.3.3 APPS prove every new App Store. The CSR identifies the App Store
Apps offered in the International Data Spaces run inside iso- and makes it possible to sign the service CSRs from the Con-
lated containers (see section 3.5.1.2 for details). The Connec- nectors requesting apps.
tor creates a key pair for every App it downloads. The private
key protects the App’s persistent data. When downloading an 4.1.3.3.4 APP DEVELOPMENT AND DEPLOYMENT
App from the App Store, the Connector creates a CSR using The following steps describe the lifecycle of Data Apps used in
the public key. The App Store signs the CSR and issues a cer- the International Data Spaces, from an app’s development to
tificate. The Connector uses this certificate to make sure that its deployment onto a Connector (Figure 4.8):
the App it is running is valid (i.e., licensed, not expired, etc.).
1. The Identity Provider signs a key pair and a certificate for
An App is a generalization of the following types of software: each Software Provider on behalf of the International Data
Spaces Association. When the app is fully developed and
»» Core System: Every Connector runs exactly one Core Sys- ready for being offered, the Software Provider signs the
tem. The Core System, together with its certificate, is de- app using its private key, before the signed app is sent to a
ployed during the Connector’s deployment after being re- trusted Certification Body.
trieved from the Software Provider providing the Connector.
The Core System’s certificate identifies the underlying 2. If the Certification Body approves the app, a second signa-
hardware device. The Core System can connect to other ture is added to it.
Connectors (e.g., to communicate with the App Store for
app downloads). When a Connector establishes a commu- 3. The Software Provider uploads the app to an App Store;
nication channel with another Connector, it uses the Core the app thereby becomes an IDS Data App. The App Store
System’s private key and certificate for authentication. only accepts valid (i.e., correctly signed) Data Apps (since
the App Store is a Connector with corresponding root CAs,
»» Data App: A Data App is any data processing or data it is able to verify all signatures).
collecting app, or a System Adapter.
4. A Connector downloading the Data App connects with the
»» Broker: A Broker is a Connector providing a broker service. App Store. The Connector creates a service key pair and a
CSR, requests a service download, and sends the CSR to
»» OCSP Server: A Connector is considered an OCSP Server if the App Store. The App Store signs the CSR using the ser-
it runs the OCSP Server app. vice sub-CA and returns it to the Connector.
App Store: An App Store has a service sub CA. The Interna- 5. The Connector downloads the service and checks its signa-
tional Data Spaces Association signs this CSR in order to ap- tures. If the signatures are found to be valid, the Connec-
tor installs the service. From now on, the downloading
Connector can check the validity of the downloaded ser-
vice based on the certificate received.
076 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.1
077 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.1
4.1.3.3.6 CONNECTOR SECURITY PROFILES To define a “common sense” for every IDS Participant and
Static security levels would make it necessary to anticipate all Connector, and to distinguish the different Security Profiles,
possible needs of every Participant, now and in the future. four dimensions are defined:
Since the IDS is designed to grow over time, and remain flex-
ible with regard to the individual security needs of every par- »» Development, relating to the requirements and capabili-
ticipant, it offers the possibility to base access control deci- ties regarding the development of components;
sions on fully customized criteria. Access control policies can
be based on a set of attributes of the requesting Connector. »» IDS Roles supported, relating to the IDS Roles (as de-
Besides a unique identifier, these attributes include a set of scribed in section 3.1) supported by the respective Security
properties describing the security level of Data Apps as well Profile;
as the security properties of the technical setup of the Con-
nector and the organizational capabilities of the Participant. A »» Communication abilities supported, specifying the com-
set of security properties is called a Security Profile. munication features supported by the respective Security
Profile; and
A Security Profile comprises attributes of the Connector and
may be used in an attribute-based access control policy. Each »» Higher security features, specifying the security level pro-
Connector must provide its Security Profile upon request. The vided by the respective Security Profile.
Security Profile must never be empty.
The attributes of the Security Profiles are listed in Appendix B
A Security Profile contains the following properties: of this document.
078 //
Base Free Base Trust Trust+
IDS Roles supported Not certified, there- All IDS Roles (section All IDS Roles (section All IDS Roles (section
fore the public IDS 3.1.1) supported, but 3.1.1) supported, 3.1.1) supported,
infrastructure is not support for Clearing
available House is optional
Communication Cannot connect to Can connect to other Can connect to other Can connect to other
abilities supported public IDS services connectors and connectors and connectors and
or connectors. exchange data. exchange data. Can exchange data. Can
refuse a connection refuse a connection
with a Connector with a Connector
with Base Profile. with Base Profile.
Higher security Security level not Standard security Extended security High security level
features defined level level
079 //
4.1.3.4 TRUSTED PLATFORM 4.1.3.4.1 ISOLATION AND REMOTE EXECUTION
The International Data Spaces consists of multiple GUARANTEE
manifestations of the Connector Architecture (as used by e.g. Isolation is a form of integrity enforcement for a Data App’s
the Broker or the App Store). This is why a trusted platform runtime environment. Data Apps can be isolated against each
is a central element of trustworthy data exchange. A trusted other by deploying each one inside a separate container (or
platform comprises certain key aspects: all Data Apps of a specific Software Provider into one contain-
er), as illustrated in Figure 410. This allows implementation
»» To be able to specify minimal requirements for Partici- of additional security features, such as time-to-live policy en-
pants that want to exchange data, a common understand- forcement for complete container instantiations.
ing of each other’s Security Profiles needs to be estab-
lished. The Connector supports mutual verification of The Connector should provide some mechanism to isolate
these profiles. Data Apps, system apps, and the core platform from each
other, in order to prevent applications from interfering with
»» To enable trustworthy execution of Data Apps and guaran- each other. Each Connector has a Security Profile attached to
tee system integrity, strong isolation of components is nec- it, describing its isolation capabilities. Users of Data Apps may
essary. The Connector’s application container manage- make data access control decisions based on the set of isola-
ment supports full isolation of Data Apps deployed, and tion capabilities stated in the Security Profile.
limitation of illegitimate communication channels. This
means that Data Apps have access only to data that is ex-
plicitly meant for them.
080 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.1
4.1.3.4.2 REMOTE INTEGRITY VERIFICATION To enable a Connector to get technically reliable informa-
During system setup, trust remains strictly limited to each tion about the integrity of the software stack and the runtime
party’s domain. Two levels of trust are supported in the Inter- configuration of another Connector, Connectors may sup-
national Data Spaces: port remote attestation for more secure Connector instantia-
tions. Trustworthy measurement is possible by using e.g. TPM
»» verification of each party’s identity by exchanging creden- 1.2/2.0 in a Connector, or equivalent security measures.
tials that originate from an entity both parties trust (e.g.,
credentials signed by a trusted PKI, or identity tokens is- 4.1.3.4.3 DYNAMIC TRUST MONITORING
sued by a trusted Identity Provider); As Remote Integrity Verification as described above can only
verify the current status and configuration of a Connector,
»» verification of the integrity of each Connector’s software Dynamic Trust Monitoring (DTM) is intended to verify the in-
stack by applying integrity measurement using trusted tegrity of a Connector for a longer period of time. In addition,
platform modules, and by remote attestation (for remote DTM is able to trigger certain actions, starting from simple no-
integrity verification, trust into the identity of a party is a tification of the Participant up to revocation of the X.509 cer-
mandatory requirement). tificate, depending on the severity of integrity violation.
Verifying the integrity of a Connector software stack (and its 4.1.3.5 DATA ACCESS CONTROL
configuration) is required for deploying trusted Data Apps. If In information security, access control restricts access to re-
platform integrity were not verified (either through certifica- sources. Authorization is the process of granting permission
tion or by technical measures), one or more of the following to resources. There are several models of access control,
problems would occur: such as Discretionary Access Control (DAC), Mandatory Ac-
cess Control (MAC), Role-Based Access Control (RBAC), Attri-
»» A Connector could pretend to run a certified and trusted bute-Based Access Control (ABAC), etc. RBAC and ABAC are
software stack in order to feign an unjustifyingly high level the most frequently used models.
of trust.
The XACML (eXtensible Access Control Markup Language)
»» A Connector might not run Data Apps as expected (i.e., the standard44 is used to introduce commonly used terms in the
Data Apps do not receive the desired amount of resources field of access control. XACML is a policy language to express
in terms of CPU and memory, and neither execution nor ABAC rules. The main building blocks of the language are sub-
communication is trustworthy); if that was the case, the ject, action, resource, and environment:
data consumed and provided by Data Apps running on an
untrusted and unattested Connector platform would not »» The subject describes who is accessing a data asset (e.g., a
be reliable. user).
»» Edge-computing use cases, where Data Consumers push »» The action describes what the subject wants to do with the
their Data Apps to the data source (i.e., onto a remote Con- data asset (e.g., read, write).
nector), would be difficult to implement, because correct
execution of these Data Apps could not be guaranteed. »» The resource describes the data asset.
w
1
44
Standard OASIS and O. Standard, “eXtensible Access Control Markup Language (XACML) Version 3.0,” 22 January 2013. [On-
line]. Available: http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-os-en.html
081 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.1
Figure 4.11 illustrates the XACML data flow diagram and the In the IDS, access control is a resource-centric regulation of ac-
main actors or components to implement it: the Policy En- cess requests from subjects (i.e., IDS participants) to resourc-
forcement Point (PEP), the Policy Decision Point (PDP), the es (i.e., Data Services). Data Owners define attribute-based
Policy Information Point (PIP), and the Policy Administration access control policies for their endpoints. In addition, they
Point (PAP). define the attribute values a subject must attest in order to
grant access to the resource. These attributes may include:
»» In general, attributes can describe anything or anyone.
Nevertheless, they can be divided into four major catego- »» Specific identity of Connector(s) (only access requests
ries: from one or more specific Connectors will be granted);
»» Subject attributes, describing the user by e.g. their age, »» Connector attributes (only access requests from a Connec-
role, or clearance; tor that possesses specific attributes will be granted);
»» Action attributes, describing the intended action (e.g. read, »» Security profile requirements (only access requests from a
write, or delete); Connector that meets specific security requirements will
be granted; e.g., having a TPM >= 1.2 and doing application
»» Resource (or object) attributes, describing the resource it- isolation).
self (e.g. object type, location, or classification);
Figure 4.11: XACML data flow diagram [Source: eXtensible Access Control Markup Language (XACML) Version 3.0 ]
082 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.1
The actual access control decision has to be made within the The following examples illustrate security requirements that
Connector and can be implemented using technologies such cannot be achieved by data access control, but require da-
as XACML or JAAS, depending on the implementation of the ta-centric usage control:
Connector. The IDS Security Architecture does not dictate a
specific access control enforcement language or implemen- »» SECRECY: Classified data must not be forwarded to nodes
tation. which do not have the respective clearance.
Alongside with data access control, regulating access to spe- »» INTEGRITY: Critical data must not be modified by untrust-
cific digital resources (e.g., a service or a file), the IDS Security ed nodes, as otherwise its integrity cannot be guaranteed
Architecture also supports data usage control. In general, the anymore.
overall goal is to enforce data usage restrictions on the Data
Consumer side after access to data has been granted. »» TIME TO LIVE: Data must be deleted from storage after a
certain period of time.
Usage control is an extension of access control (see figure
4.11). It is about the specification and enforcement of re- »» ANONYMIZATION BY DATA AGGREGATION: Personal
strictions regulating what may be done with a data asset, and data may be used only in an aggregated form by untrusted
what not. Thus, usage control is concerned with requirements parties. To do so, a sufficient number of distinct data re-
that pertain to data processing (obligations) rather than data cords must be aggregated in order to prevent deano-
083 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.1
Enforcement
rity. Vice versa, technical solutions can be accompanied by
organizational rules or legal contracts (e.g., to compensate
missing capabilities of the technical solution).
Technical Enforcement
Organizational / Legal Enforcement
t
Figure 4.13: Technical enforcement vs. organizational/legal enforcement
084 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.1
For example: It is possible to model the transition of data as The policy decision may also depend on additional informa-
an event with attributes about the data itself and the recipient. tion that is not present in the intercepted system action it-
The attributes contain metadata and information on the tar- self. This includes information about the context, such as data
get system (e.g., supplier management system). The decision flows or the geographical location of an entity. It is also possi-
engine makes a deny decision if the target system does not ble to specify pre- or post-conditions that have to hold before
correspond to the expected supplier management system. (e.g., integrity check of the environment) and after (e.g., data
item is deleted after usage) decision-making. In addition, it is
possible to define on-conditions that have to hold during us-
age (e.g., only during business hours). These conditions usual-
ly specify constraints and permissions that have to be fulfilled
before, during, and after using data (see Figure 4.15).
Figure 4.14: Communication Policy Enforcement Point and Policy Decision Point
085 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.1
45
M. C. Mont and S. Pearson, “Sticky Policies: An Approach for Managing Privacy
across Multiple Parties,” Computer, pp. 60-68, 09 September 2011.
46
R. Iannella, S. Guth, D. Paehler and A. Kasten, “ODRL Version 2.1 Core Model,” 05 03 2015. [Online]. Available:
https://www.w3.org/community/odrl/model/2.1/.
086 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.1
Figure 4.16: ODRL Core Model 2.1 (ODRL Version 2.1 Common Vocabulary Final Specification: 5 March 2015)
47
R. Iannella, M. Steidl, S. Myles and V. Rodríguez-Doncel, “ODRL Vocabulary & Expression -
3.14.9 Left Operand,” 26 09 2017. [Online]. Available: https://www.w3.org/TR/odrl-vocab/#term-LeftOperand.
48
The Object Management Group, “Data Residency Working
Group,” [Online]. Available: http://www.omg.org/data-residency/.
087 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.1
088 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.1
089 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.1
4.1.3.6.4 ROLES INVOLVED IN USAGE CONTROL This kind of traceability is similar to the data protection re-
Usage control is a cross-sectional concept and technology, quirements a data controller is confronted with, so as to be
which involves several IDS Roles. able to fulfill its data subjects’ right to access. It is also closely
related to the question of proving compliance with contracts,
BROKER agreements, or legal regulations. And data provenance track-
The IDS Broker manages connector self-descriptions that can ing can be used to facilitate clearing in decentralized data eco-
contain Usage Policies. Therefore the Broker must be able systems, since it is capable of aggregating information con-
to support Usage Policies. In addition the connector self-de- cerning data exchange transactions and data usage.
scription itself may be subject of Usage Policies.
However, while distributed data usage control is concerned
CONNECTOR with the enforcement of rights and duties when exchang-
The Connector is the main technical component for imple- ing data across system boundaries, the focus of data prove-
menting usage control. Hence, usage control enhanced Con- nance tracking is on transparency and accountability. In oth-
nectors, such as the Trusted Connector, contain relevant er words: While a Policy Enforcement Point (PEP) serving for
components to perform usage control enforcement as Data distributed data usage control in most cases needs to be able
Consumer (PEPs, such as the Apache Camel interceptor; PDPs, to proactively intercept data usage actions within the control
PMPs). However, PMPs and PDPs need not be part of the Con- flow (i.e. preventive enforcement), a PEP for data provenance
nector. In addition, Connectors as Data Providers should pro- tracking only needs to passively observe, interpret and log
vide the technology-dependent policies to the data they pro- data exchange transactions and data usage for retrospective
vide – for all kinds of systems and enforcement technologies examination (in terms of usage control, this kind of enforce-
that are part of the ecosystem. ment is denoted as “detective enforcement”). Despite this
fact, a data provenance tracking infrastructure can be built
CLEARING HOUSE upon the same PEPs as distributed data usage control. Fur-
By means of Data Provenance Tracking (as described in the thermore, data provenance tracking does not require a policy
next section), it is possible to track the usage of data and the specification language, but rather a specification of how ob-
enforcement of usage restrictions. The Clearing House is able served actions are to be interpreted in terms of data flow or
to use this data later on. data usage (i.e., a so-called data flow semantics specification).
By this, data provenance tracking maintains a data flow mod-
APP STORE el that keeps track of the particular representations of data
Data Apps can take advantage of usage control technology. items. This kind of information can also be leveraged for data
The IDS App Store needs to be able to provide information as usage control enforcement; i.e., the data flow model is imple-
to whether a Data App implements such technology. mented as a Policy Information Point (PIP).
090 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.1
4.1.3.7.2 ARCHITECTURE
The PEP resides within the message routing component of the
Connector (or Data App). It is registered at the data flow track-
ing component via a registry component (i.e., a local Policy
Management Point, PMP). The same applies for the data flow
tracking component. Thereby a PEP can query the local PMP
for the communication interface of the local data flow track-
ing component, which is then used to deploy semantics spec-
ifications for its observed events and to forward actual events
during operation.
Figure 4.21: Architecture with centralized component for provenance information storage
Figure 4.22: Architecture with distributed component for provenance information storage
091 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.1
Data provenance information is queried at a Privacy Dash- 4.1.3.7.4 INTEGRATION WITH DISTRIBUTED USAGE
board, which is accessible via a Clearing House. The Privacy CONTROL
Dashboard returns a provenance graph for the unique iden- In complex usage control scenarios, such as establishing data
tifier of data content. There are two options for storing data sovereignty for managing globally distributed supply chains,
provenance information: data is passed on from one Data Consumer to another. De-
pending on the usage control policy in place, data may be
»» Centralized architecture (see Figure 4.21): A Provenance forwarded in its original form, or it may be somehow pro-
Storage Point (ProSP) is attached to the Clearing House. cessed, aggregated, or anonymized before being forwarded.
After data usage or a data flow has been observed by the This indicates the relevance of establishing transparency con-
data flow tracking component inside the Connector, the cerning data flows and data usage in compliance with usage
transaction is logged at this ProSP. control policies, business contracts, or legal regulations. For
this purpose, distributed data usage control and data prove-
»» Distributed architecture (see Figure 4.22): Each Connector nance tracking complement each other. As explained before,
is equipped with a ProSP, which is directly connected to the the PEPs used for usage control (detective enforcement) can
data flow tracking component. The Clearing House accom- also serve as a basis for data provenance tracking, whereas in
modates only a stateless Provenance Collection Point turn data provenance information can be fed back into usage
(ProCP), which aggregates provenance information com- control enforcement (i.e., a usage control PDP can query for
ing in from the distributed ProSPs whenever a query oc- all locations of representations of some given data content
curs at the Privacy Dashboard. protected by a usage control policy).
092 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.1
093 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.2
49
IDSA White Paper Certification – Framework for the IDS Certification Scheme, Version 2.0
https://www.internationaldataspaces.org/publications/whitepaper-certification/
094 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.2
4.2.2 CERTIFICATION PROCESS certification process are outlined in the following paragraphs.
An in-depth description of their responsibilities can be found
in Part 1 of the White Paper Certification50.
Figure 4.23 outlines the basic structure of the certification
process, together with the roles involved in this process. The It should be noted that all roles described in this section are
Certification Body and the Evaluation Facility belong to the specific to the International Data Spaces (i.e. terms such as
“Governance Body” category specified on the Business Layer “Certification Body” should not be misunderstood to refer to
(see section 3.1.1). The tasks of these roles with regard to the an existing organization already granting certificates).
Competence Monitoring
International Data
Spaces Association
Certification
Body
Evaluation
Fieldwork
// 1
50
IDSA White Paper Certification – Framework for the IDS Certification Scheme, Version 2.0
https://www.internationaldataspaces.org/publications/whitepaper-certification/
095 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.2
51
IDSA White Paper Certification – Framework for the IDS Certification Scheme, Version 2.0
https://www.internationaldataspaces.org/publications/whitepaper-certification/
096 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.2
4.2.3 CERTIFICATION OF
PARTICIPANTS AND CORE
COMPONENTS
PARTICIPANT CERTIFICATION
Participants in the International Data Spaces collaborate by
exchanging and sharing valuable data. For this collaboration,
the IDS provides a trusted business ecosystem. Furthermore,
it is essential for the International Data Spaces and its reputa-
tion that the participants themselves are trustworthy. This is
achieved by evaluating each participant regarding fulfilment
of defined levels of security, including infrastructure reliabili-
ty and process compliance.
52
IDSA White Paper Certification – Framework for the IDS Certification Scheme, Version 2.0
https://www.internationaldataspaces.org/publications/whitepaper-certification/
097 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.3
»» acting as a trustee for mediation between participants; From an internal perspective of one single organization, the
execution and allocation of decision rights for the manage-
»» facilitating negotiation of agreements and contracts; ment and use of data manifests itself within organizational
structures. They ensure that relevant guidelines and princi-
»» aiming at transparency and traceability of data exchange ples regarding data assets are in place and monitored. How-
and data use; ever, traditional instruments for assigning decision rights and
accountabilities in terms of data usually do not reach beyond
»» allowing private and public data exchange; an organization’s borders. Thus, the influence of authority for
the individual actor within a data ecosystem might be limited.
»» taking into account individual requirements of the partici- The IDS-RAM addresses this challenge in a federated manner
pants; and by distributing decision rights for data governance and man-
agement activities to the different roles in the International
»» offering a decentralized architecture that does not require Data Spaces ecosystem. It thereby supports the requirements
a central authority. to be met by the actors within the ecosystem to achieve se-
cure and reliable interoperability as well as desirable behav-
The Governance Perspective in the context of the IDS-RAM re- ior regarding the use of data.
lates to concepts from an organizational and technical point
of view to establish the development of a healthy and trustful
098 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.3
099 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.3
Table 4.2: Data governance and management activities of Data Owners and Data Providers
100 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.3
Data Consumer
Table 4.4: Data governance and management activities of Broker Service Provider
101 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.3
Clearing House
Data-related activities »» Monitor and log data transactions and data value chains
»» Monitor policy enforcement
»» Provide data accounting platform
Table 4.6: Data governance and management activities of App Store Provider
IDS DATA GOVERNANCE MODEL ments that do not rely on a central instance for data stor-
The IDS Data Governance Model defines a framework of de- age, but instead allow self-organization of different heteroge-
cision-making rights and processes with regard to the defini- neous databases. Additionally, data lifecycle management is
tion, creation, processing, and use of data. While governance concerned with the creation and capturing of data, including
activities set the overall directive of the decision-making sys- data processing, enrichment, storage, distribution, and use.
tem, data management comprises three groups of activities
with regard to the creation, processing, and use of data. In The following responsibility assignment matrix (RACI matrix)
the IDS context, data governance comprises also usage rights supports the allocation of these activities to enable a gover-
of data shared and exchanged within the IDS ecosystem. The nance mechanism in the IDS ecosystem. RACI stands for “re-
management of metadata specifies data about data and com- sponsible”, “accountable”, “consulted” and “informed”. The
prises both syntactical, semantic and pragmatic information. focus lies on the „R“ and „A“ of the RACI matrix, supported by
This is of particular importance in distributed system environ- the notation „S“, which stands for „supported“.
102 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.3
Management
Determine data
usage restrictions
R, A - S -
(execute data ow-
nership rights)
Enable data
S S - R, A
provenance
Provide clearing
S S - R, A
services
Metadata
Describe and
R, A - S -
publish metadata
Look up and
- R, A S -
retrieve metadata
Data Lifecycle
Capture
R, A - - -
and create data
Store data R, A S - -
Enrich and
S R, A S -
aggregate data
Distribute and
R, A - S -
provide data
Link data S S R, A -
103 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.3
The following subsections describe five topics that are ad- From a legal perspective, there is no ownership regarding
dressed by the Governance Perspective. These topics play an data, as data is an intangible good. With the “Free Flow of
important role when it comes to the management of data as- Data” Regulation53, the European Commission supports data
sets. exchange and data sharing across borders in the means of
technical hurdles. The IDS approach supports the implemen-
tation of the regulation for non-personal data. At the same
4.3.3 DATA AS AN ECONOMIC GOOD time the democratization of data is not the aim of the IDS
concept, as data ownership is an important aspect when it
comes to offering data and negotiating contracts in digital
As data can be decoupled from specific hardware and soft- business ecosystems, especially because data can easily be
ware implementations, it turns into an independent econom- duplicated.
ic good. While this opens up new opportunities, it creates
challenges as well. To ensure competitiveness of organiza- The International Data Spaces makes sure the need of a Data
tions, a solution is required that facilitates new, digital busi- Provider or a Data Producer is comprehensively addressed
ness models. by providing a secure and trusted platform for authoriza-
tion and authentication within a decentralized architecture.
The International Data Spaces offers a platform for organiza- This allows Data Providers as well as Service Providers to be
tions to offer and exchange data and digital services. In doing identified and controlled by an Identity Provider (see Chapter
so, it offers a basic architecture for organizations that want 3.1.1). Decentralized data exchange by means of Connectors,
to optimize their data value chains. The main goal is to en- in contrast to other architectures of data networks (e.g., data
able participants to leverage the potential of their data within lakes or cloud services), ensures full data sovereignty. In addi-
a secure and trusted business ecosystem. The International tion to these self-control mechanisms, the architecture allows
Data Spaces thereby covers the information system perspec- logging of data transfer information at a Clearing House (see
tive and provides the components that enable participants to Chapter 3.2.5).
define individual business cases.
As the need for Data Sovereignty is obvious, but the term of
The International Data Spaces neither makes any statements ownership is not defined for data, the term “Data Sovereign”
on legal perspectives, nor does it restrict participants to any indicates the rights, duties, and responsibilities for this role.
predefined patterns. Instead, it offers the possibility to de- The term and the role of the Data Owner is defined for this
sign digital business models individually and as deemed ap- document in section 3.1.1 and does not cover a legal state-
propriate. ment on data ownership. This is indeed relevant on every lay-
er of the architecture.
4.3.4 DATA OWNERSHIP As the International Data Spaces intends to build upon and
apply existing law, it will not include any purely technolo-
gy-oriented solutions to prevent data duplication or misuse
In the material world, the difference between the terms “pos- of data assets. However, it supports these important aspects
session” and “property” is an abstract, yet necessary con- over the entire data lifecycle. Furthermore, it supports the ar-
struct. It is accepted that moving a good from one place to rangement of collaborative solutions by providing an appro-
another and changing possession of the good does not nec- priate technical infrastructure.
essarily have an impact on the property rights. Regarding the
specific concept of the International Data Spaces, it is neces-
sary to take into account that the Data Owner and Data Pro-
vider may not be identical (see Chapter 3.1.1).
1
53
Regulation (EU) 2018/1807 of the European Parliament and of the Council of 14 November 2018 on a framework for
the free flow of non-personal data in the European Union
104 //
PERSPECTIVES OF THE REFERENCE ARCHITECTURE MODEL // 4.3
Data sovereignty is a natural person’s or corporate entity’s By creating transparency and offering clearing functional-
capability of being entirely self-determined with regard to ity, the International Data Spaces provides a way to track
its data. The Reference Architecture Model presented in this the provenance and lineage of data. This is strongly linked
document particularly addresses this capability, as it specifies to the topics of data ownership and data sovereignty. Data
requirements for secure data exchange and restricted data provenance tracking can be implemented with local tracking
use in a trusted business ecosystem. components integrated into IDS Connectors and a central-
ized provenance storage component attached to the Clearing
The International Data Spaces promotes interoperability be- House (see Chapter 3.1.1), which receives all logs concerning
tween all participants based on the premise that full self-de- activities performed in the course of a data exchange transac-
termination with regard to one’s data goods is crucial in such tion, and requests confirmations of successful data exchange
a business ecosystem. Data exchange takes place by means of from the Data Provider and the Data Consumer. In doing so,
secured and encrypted data transfer including authorization data provenance is always recursively traceable. In, addition
and authentication. The Data Provider may attach metadata provenance information can be integrated into the IDS Vo-
to the data transferred using the IDS Vocabulary. In doing so, cabulary, so as to enable the participants to maintain data
the terms and conditions to ensure data sovereignty can be provenance as part of the metadata during the process of
defined unambiguously (e.g., data usage, pricing information, data exchange.
payment entitlement, or time of validity). The International
Data Spaces thereby supports the concrete implementation The International Data Spaces thereby provides the possibili-
of applicable law, without predefining conditions from a busi- ty to implement and use appropriate concepts and standards.
ness point of view, by providing a technical framework that However, it does not force participants to use these concepts
can be customized to the needs of individual participants. and standards. It is therefore up to the individual participant
to provide correct information (i.e., metadata) on the prove-
nance of data.
105 //
APPENDIX
A // GLOSSARY
B // SECURITY PROFILES
C // LIST OF FIGURES
D // LIST OF TABLES
106 //
APPENDIX A // GLOSSARY
APPENDIX A // GLOSSARY
Term Definition
App Store Secure platform for distributing Data Apps; features different search options (e.g. by
functional or non-functional properties, pricing model, certification status, community
ratings, etc.)
Applicant Organization formally applying for being certified by the Certification Body
Broker Service Provider Intermediary managing a metadata repository that provides information about the
Data Sources available in the International Data Spaces; multiple Broker Service
Providers may be around at the same time, maintaining references to different, do-
main-specific subsets of Data Endpoints
Certification Authority Trusted third-party entity issuing digital certificates (e.g., x509 certificates); may host
services to validate certificates issued
Certification Body Governance body certifying components and entities seeking admission to the Interna-
tional Data Spaces; aside from having the final word on granting or denying a certifi-
cate, it is responsible for maintaining the Certification Scheme (including its catalog of
requirements), overseeing and approval of Evaluation Facilities, and ensuring compati-
bility of evaluation procedures carried out by Evaluation Facilities
Certification Scheme Scheme defining the processes, roles, targets, and criteria involved in the certification
of components and entities; maintained by the Certification Body
Clearing House Intermediary providing clearing and settlement services for all financial and data
exchange transactions within the International Data Spaces
Connector Dedicated communication server for sending and receiving data in compliance
with the general Connector specification; different types of Connectors can be
distinguished (Base Connector vs. Trusted Connector, or Internal Connector vs.
External Connector)
107 //
APPENDIX A // GLOSSARY
Term Definition
Connector-Self- Description of a Connector participating in the IDS for being read by other IDS Parti-
description cipants; created by the Data Provider or Data User as the first step of the Connector
configuration process; contains information such as the name of the Connector provi-
der or the name of the maintainer, as well as information about the content and type
of the data offered or requested, about data communication interfaces, and about
usage policies and contracts
Data App Self-contained, self-descriptive software package that is distributed via the App Store
and deployed inside a Connector; provides access to data and data processing capabi-
lities; the interface of a Data App is semantically described by the IDS Vocabulary
Data Asset Content exposed for exchange via Data Endpoints according to a parametrized Data
Service interface; Data Assets are expected to be focused, homogeneous, and con-
sistent over time with regard to granularity, coverage, context, data structure, and
conceptual classification
Data Consumer Core Participant in the International Data Spaces requesting and using data provided
by a Data Provider
Data Endpoint Data interface for data publication (Data Source) and data consumption (Data Sink),
respectively
Data Exchange Contractual agreement between a Data Provider and a Data Consumer regarding the
Agreement exchange of data in the International Data Spaces
Data Operation Method or operation with defined functionality to be invoked on a Data Endpoint.
Data Owner Core Participant having complete control over the data it makes available in the Inter-
national Data Spaces; defines the terms and conditions of use of its data
108 //
APPENDIX A // GLOSSARY
Term Definition
Data Provider Core Participant exposing Data Sources via a Connector; a Data Provider may be an
enterprise or other organization, a data marketplace, an individual, or a “smart thing”
Data Sink Data Endpoint consuming data uploaded and offered by a Data Provider
Data Source Data Endpoint exposing data for being retrieved or subscribed to by a Data Consumer
Data Sovereignty The capability of an entity (natural person or corporate) of being entirely self-deter-
mined with regard to its data
Demilitarized Zone (DMZ) A Demilitarized Zone is an IT system (or a part of an IT system) with controlled access.
Dynamic Attribute Issues Dynamic Attribute Tokens (DATs) to verify dynamic attributes of Participants or
Provisioning Service Connectors
(DAPS)
Dynamic Attribute Contains signed dynamic attributes for participants and Connectors
Token (DAT)
Evaluation Facility Governance body providing services related to the certification of components and
entities (certification targets) seeking admission to the International Data Spaces;
responsible for detailed technical evaluation of targets in consistence with the Certifi-
cation Scheme and its catalog of requirements; reports evaluation results to the
Certification Body
Governance Concept defining the rights and duties (“rules of the game”) for formal data manage-
ment, ensuring quality and trust throughout the International Data Spaces; mission
critical to the International Data Spaces, as a central supervisory authority is missing
109 //
APPENDIX A // GLOSSARY
Term Definition
Identity Provider Intermediary offering services to create, maintain, manage and validate identity infor-
mation of and for Participants in the International Data Spaces
Information Model Set of vocabularies and related schema information for the semantic description of
International Data Spaces entities (e.g., Data Endpoints or Data Apps), data provenan-
ce, or licensing information; the core IDS Vocabulary is domain-independent; it can be
extended and/or reference third-party vocabularies to express domain-specific aspects
International Data Spaces Distributed network of Data Endpoints (i.e., instantiations of the International Data Spa-
ces Connector), allowing secure exchange of data and guaranteeing Data Sovereignty
Participant Stakeholder in the International Data Spaces, assuming one or more of the prede-
fined roles; every Participant is given a unique identity by the Identity Provider
Security Profile Defined set of a Connector’s security properties; specifies several security aspects
(e.g., isolation level, attestation, or authentication), expressing the minimum requi-
rements a Data Consumer must meet to be granted access to the Data Endpoints
exposed
System Adapter Data App used for integration of custom Data Sources and legacy systems with
a Connector
Usage Contract Set of rules and conditions regarding one or more transactions in the Internati-
onal Data Spaces.
Usage Policy Set of rules specified by the Data Owner restricting usage of its data; covers as-
pects like time-to-live or forwarding conditions (e.g., anonymization or scope of
usage); transmitted along with the respective data, and enforced while residing
on the Connector of the Data Consumer
Vocabulary Hub Server providing maintenance facilities for editing, browsing and downloading
vocabularies and related documents; mirrors a set of external third-party voca-
bularies ensuring seamless availability and resolution
110 //
APPENDIX B // SECURITY PROFILES
Lifecylce Community IDS community (indi- IDS community (via IDS community (via
Management vidual developments SW major release), SW major release),
from companies quality evaluation, quality evaluation,
possible), weaker contributions of the contributions of the
SLAs IDS Community, IDS Community,
fixed SLAs for patch fixed SLAs for patch
management management
Centrally managed Open Source IDS members only, IDS members only, IDS members only,
(preferred) Open Source not Open Source not Open Source not
excluded excluded excluded
DIMENSION: DEVELOPMENT
The IDS Roles supported dimension relates to the IDS Roles (as described in section 3.1) supported
by the respective Security Profile. Basically the Base Free Profile cannot make use of a
public IDS infrastructure (e.g. Identity Provider, Broker) as its components are not certified.
111 //
APPENDIX B // SECURITY PROFILES
Interoperability Base Free Base Free Trust, Trust+, Base Trust, Trust+, Base
112 //
DIMENSION: SECURITY FEATURES SUPPORTED
The Higher security features dimension specifies the security level provided by the
respective Security Profile regarding Attacker Models and .detailed security and safety requirements.
2. Safety requirements
IEC 62443 security level None None SL2 (7 base SL2 or SL3 (7 base
requirements) requirements)
Downward compatibility Base Free Base Trust, Trust+, Base Trust, Trust+, Base
113 //
APPENDIX B // SECURITY PROFILES
114 //
APPENDIX B // SECURITY PROFILES
System utilization
Data usage
Enforcement of data usage No No Yes (only against Yes (no full pro-
rules on the connector faulty operation) tection against
(external criteria): position, manipulation)
time, legal requirements
Enforcement of data No No No No
usage rules outside of the
connector
115 //
APPENDIX C // LIST OF FIGURES
FIGURE 1.1: THREE TYPES OF ACTIVITIES OF THE INTERNATIONAL DATA SPACES .................................................................010
FIGURE 1.2: GENERAL STRUCTURE OF REFERENCE ARCHITECTURE MODEL ......................................................................011
FIGURE 2.1: DATA-DRIVEN BUSINESS ECOSYSTEMS ..............................................................................................................013
FIGURE 2.2: EVOLUTION OF TECHNICAL STANDARDS FOR DATA EXCHANGE .....................................................................014
FIGURE 2.3: DATA EXCHANGE VS. DATA SHARING .................................................................................................................015
FIGURE 2.4: GENERAL ARCHITECTURAL PATTERNS FOR DATA EXCHANGE AND DATA SHARING ......................................017
FIGURE 2.5: TYPICAL ENTERPRISE ARCHITECTURE STACK ...................................................................................................018
FIGURE 2.6: INTERNATIONAL DATA SPACES CONNECTING DIFFERENT CLOUD PLATFORMS ............................................019
FIGURE 3.1: ROLES AND INTERACTIONS IN THE INDUSTRIAL DATA SPACE ........................................................................026
FIGURE 3.2: INTERACTIONS REQUIRED FOR ISSUING A DIGITAL IDENTITY IN THE IDS ....................................................027
FIGURE 3.3: TECHNICAL ENFORCEMENT AND ORGANIZATIONAL ENFORCEMENT OF USAGE POLICIES .........................028
FIGURE 3.4: FUNCTIONAL ARCHITECTURE OF THE INTERNATIONAL DATA SPACES ...........................................................029
FIGURE 3.5: “ONBOARDING” OVERALL PROCESS .................................................................................................................034
FIGURE 3.6: “CONNECTOR CONFIGURATION AND PROVISIONING” SUB PROCESS ...........................................................034
FIGURE 3.7: “SECURITY SETUP” SUB PROCESS ......................................................................................................................035
FIGURE 3.8: “AVAILABILITY SETUP” SUB PROCESS ................................................................................................................036
FIGURE 3.9: “EXCHANGING DATA” OVERALL PROCESS .........................................................................................................037
FIGURE 3.10: “FIND DATA PROVIDER” SUB PROCESS ............................................................................................................037
FIGURE 3.11: “INVOKE DATA OPERATION” SUB PROCESS.....................................................................................................038
FIGURE 3.12: “DATA APP CERTIFICATION” PROCESS .............................................................................................................039
FIGURE 3.13: “USE DATA APP” PROCESS ................................................................................................................................039
FIGURE 3.14: REPRESENTATIONS OF THE INFORMATION MODEL .......................................................................................041
FIGURE 3.15: OUTLINE OF THE CONCERN-BASIC CONCERN HEXAGON .............................................................................042
FIGURE 3.16: TAXONOMY OF THE RESOURCE CONCEPT ......................................................................................................044
FIGURE 3.17: RESOURCE CONCEPT (OUTLINE) ......................................................................................................................045
FIGURE 3.18: REPRESENTATION CONCEPT (OUTLINE) ..........................................................................................................045
FIGURE 3.19: TAXONOMY OF OPERATION TYPES FOR RESOURCE EXCHANGE ...................................................................049
FIGURE 3.20: OPERATION CONCEPT (OUTLINE)....................................................................................................................049
FIGURE 3:21: MESSAGE TAXONOMY (EXCERPT) ....................................................................................................................050
FIGURE 3:22: PROVENANCE CONCEPT (OUTLINE) ................................................................................................................051
FIGURE 3.23: OUTLINE OF THE: DATA QUALITY CONCEPT (OUTLINE) .................................................................................052
FIGURE 3.24: POLICY CONCEPT (OUTLINE) ...........................................................................................................................053
FIGURE 3.25: PRICING CONCEPT (OUTLINE) .........................................................................................................................054
FIGURE 3.26: PARTICIPANT CONCEPT (OUTLINE) .................................................................................................................055
FIGURE 3.27: CONNECTOR CONCEPT (OUTLINE) ..................................................................................................................056
FIGURE 3.28: CERTIFICATION CONCEPT (OUTLINE) .............................................................................................................057
FIGURE 3.29: USAGE CONTRACT CONCEPT (OUTLINE) .........................................................................................................058
FIGURE 3.30: DETAILED CONCERN HEXAGON .......................................................................................................................059
116 //
APPENDIX C // LIST OF FIGURES
117 //
APPENDIX C // LIST OF FIGURES
TABLE 3.1: INTERACTIONS BETWEEN ROLES IN THE IDS – X --> MANDATORY INTERACTION, (X) --> OPTIONAL ............
INTERACTION) ......................................................................................................................................................025
TABLE 4.1: OVERVIEW OF IDS SECURITY PROFILES AND RELATED DIMENSIONS ...............................................................079
TABLE 4.2: DATA GOVERNANCE AND MANAGEMENT ACTIVITIES OF DATA OWNERS AND DATA PROVIDERS ..................100
TABLE 4.3: DATA GOVERNANCE AND MANAGEMENT ACTIVITIES OF DATA CONSUMER ....................................................101
TABLE 4.4: DATA GOVERNANCE AND MANAGEMENT ACTIVITIES OF BROKER SERVICE PROVIDER ..................................101
TABLE 4.5: DATA GOVERNANCE AND MANAGEMENT ACTIVITIES OF CLEARING HOUSE ...................................................102
TABLE 4.6: DATA GOVERNANCE AND MANAGEMENT ACTIVITIES OF APP STORE PROVIDER .............................................102
TABLE 4.7: ROLES RESPONSIBLE, ACCOUNTABLE AND SUPPORTING IN DATA GOVERNANCE ..........................................103
118 //
HEAD OFFICE:
LEGAL OFFICE: