direct naar de inhoud

For Data Spaces

Establishing or evolving a data space involves critical elements, adopting a federated infrastructure capable of driving substantial change within the domain. Governance and trust among participants are key aspects beyond the fundamental development of the data space. The iSHARE Trust Framework offers solutions for:

  1. Scaling up Data Spaces

While adhering to design principles can establish trust individually, the real challenge lies in scaling and designing for cross-data space interoperability and trust. This is precisely where the iSHARE Trust Framework empowers data spaces.

  1. Federated Legal Standard: 

The Trust Framework provides clear, all-encompassing terms of use that apply to every data interaction in a unified, federated manner. This provides a legal standard for all participants, accommodating optional data space-specific legal requirements or agreements. This ensures participants take full accountability and responsibility for data handling. It establishes clear, comprehensive terms of use to govern everyday interaction uniformly, eliminating the necessity for individual bilateral contracts and providing a comprehensive legal framework for all transactions within the Trust Framework.

Note: The iSHARE Trust Framework also accommodates specific operational and service level agreements (SLAs) and liability clauses tailored to data space-specific contract additions.

  1. Participant Trust Registration and Management 

To ensure the registration of all participants in the data space and enable digital verification of their adherence to the Trust Framework, the Participant Registry was introduced as a pivotal technical component. Through the Participant Registry Management Point, the Data Space Governance Authority can register its participants, while also verifying their compliance. This registry operates on a Distributed Ledger, ensuring visibility across all data spaces utilising iSHARE, serving as a core decentralised component with the networks of the data space.

With the Participant Registry Management Point, data space governance authority or administrator can register participants using various identifiers, including:

  • Unique ID (EORI numbers in accordance with EU Identification) 
  • eIDAS identification and public key 
  • Signed Terms of Use and any additional terms 
  • Valid of Chamber of Commerce documentation to ensure the legality of contracts

Upon completion of the initial registration process, the Registry or Ledger retains critical information essential for discovery and cross-domain interoperability, including: 

  • Capabilities endpoints for locating where a participant’s data services can be accessed and their standard specifications. 
  • Authorisation endpoints for identifying where a participant’s authorisations can be queried. 

For further details on the exact usage, please consult the For Developers page.

The administration of participants is made convenient through our web interface for the Participant Registry Management Point or through APIs for automated registration:

Participant Details information
Participant Additional Details
  1. Participant Discovery and Cross-Data Space Interoperability

To facilitate automated participant discovery in data spaces, the Parties End-point offers essential insights crucial for the data space operation.

Parties End-point 

This feature enables access to data from individual participants within the data space (or network of data spaces) and aggregates data from multiple participants across various data spaces. Each node implementation is equipped with APIs, serving as the primary source for party information within the data space.

  1. Interoperability Among Data Spaces and Secure External Data Exchange

The Participant Registry, through established authorisations, facilitates secure data access for organisations outside of the data space.

  1. iSHARE Network of Authorisation Registry Service Providers 

Alongside the open-source resources available on GitHub (iSHARE, i4Trust), the iSHARE network hosts several Authorization Registry Service Providers. These providers empower data owners in the data space, offering a straightforward entry point. 

  1. Data Space Profiles Registration

Registering in the data spaces is streamlined to ensure efficient administration and discovery. As part of the process, a network pointer is available to assist in locating the data space definition.

Dataspaces Information
  1. Trust Governance 

The iSHARE Trust network and its Framework are overseen by the iSHARE Foundation, with active participation and supervision by our valued participants. For additional information, click here.

To begin utilising the iSHARE Trust Framework and the Participant Registry for your data space, the process is as follow: 

  1. Bring together parties with a shared interest in data sharing. Establish contracts and legal coverage for data exchange, including user licences and digital contracts for each data interaction.
  2. Determine the minimum data quality and service availability requirements.
  3. Consider additional security measures in data services for interaction between service consumers and providers.
  4. Utilise the Participant Registry to register organisations within the new ecosystem and establish authorisations, ensuring compliance with the data space agreements.
  5. Connect the service provider by:
    1. Signing the terms of use and the onboarding procedure (Accession Agreement)
    2. Deploying the connector and implementing the API specifications 
    3. Establishing the data service (e.g. based on a Linked Data standard) along with the basic service covering essential application needs. Test the connector implementation using a test bed, Conformance Testing Tool (CTT) or alternative approach.

By adopting the iSHARE Trust Framework, organisations can streamline their data sharing processes, ensure compliance with legal standards, and enhance trust among participants.

To learn more about how the iSHARE Trust Framework helps to start your data space and to explore implementation options