Skip to main content

Towards Collaborative Security Approaches Based on the European Digital Sovereignty Ecosystem

  • Chapter
  • First Online:
Collaborative Approaches for Cyber Security in Cyber-Physical Systems

Abstract

The need for collaboration and digital transformation is among the lessons the world has realized during the pandemic. This chapter argues that the strategy of the European Union to bring the concepts of sovereignty to the digital world is a crucial enabler to achieve these two goals. This strategy is being shaped by several community initiatives, laws, and projects that tackle different aspects of digital sovereignty. In this chapter, we survey the relevant literature to present an understanding of the emerging technology and highlight a research agenda based on challenges and gaps that we identify in different topics. Next, we discuss the requirements and challenges of identity and trust, sovereign data exchange, federated catalogues, and compliance as digital sovereignty pillars. This discussion is helpful to researchers in identifying relevant problems and practitioners in designing future-proof solutions. Finally, we illustrate the benefits of digital sovereignty through a use-case from the domain of collaborative security approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Example would be the GDPR as this set of legal norms is binding for all EU-member states but includes principles different from similar laws in the US or China.

  2. 2.

    Historically, these core values arise from a fundamental human right developed in Germany in the 1980s called “Informationelle Selbstbestimmung”, which roughly translates to informational self-determination.

  3. 3.

    While different perspectives on sovereignty may further categorize it into different classes, e.g., technological sovereignty or data sovereignty; we discuss data sovereignty in this chapter.

  4. 4.

    Tech companies are also acknowledging some of these aspects, e.g., Google (see https://cloud.google.com/blog/products/identity-security/how-google-cloud-is-addressing-data-sovereignty-in-europe-2020).

  5. 5.

    Several representatives of business, science, and administration launched Gaia-X, a project to create a federated data infrastructure for Europe based on values such as sovereignty, openness, transparency, innovation, and connectivity [9, 10].

  6. 6.

    GXFS represent the minimum technical requirements and services necessary to operate the federated Gaia-X Ecosystem of infrastructure and data.

  7. 7.

    “While access control restricts access to specific resources (e.g., a Service or a file), data sovereignty is additionally supported with Data-Centric Usage Control” [21].

  8. 8.

    https://c3isp.eu/.

References

  1. Markus I, Steffen G, Lachmann R, Marquis A, Schneider T, Tomczyk S, Koppe U, Rohde AM, Schink SB, Seifried J et al (2021) Covid-19: cross-border contact tracing in Germany, February to April 2020. Eurosurveillance 26(10):2001236

    Article  Google Scholar 

  2. Cascini F, Causio FA, Failla G, Melnyk A, Puleo V, Regazzi L, Ricciardi W (2021) Emerging issues from a global overview of digital covid-19 certificate initiatives. Front Pub Health 9. https://doi.org/10.3389/fpubh.2021.744356. https://www.frontiersin.org/article/10.3389/fpubh.2021.744356

  3. A digital future for Europe. https://www.consilium.europa.eu/en/policies/a-digital-future-for-europe/

  4. Council A The European union and the search for digital sovereignty

    Google Scholar 

  5. Roberts H, Cowls J, Casolari F, Morley J, Taddeo M, Floridi L (2021) Safeguarding European values with digital sovereignty: an analysis of statements and policies. Internet Policy Rev

    Google Scholar 

  6. Philpott D (2020) Sovereignty. In: Zalta EN (ed) The Stanford encyclopedia of philosophy, Fall, 2020th edn. Stanford University, Metaphysics Research Lab

    Google Scholar 

  7. Braud A, Fromentoux G, Radier B, Le Grand O (2021) The road to European digital sovereignty with GAIA-X and IDSA. IEEE Netw 35(2):4–5. https://doi.org/10.1109/MNET.2021.9387709

    Article  Google Scholar 

  8. Otto B, Hompel MT, Wrobel S (2019) International data spaces. In: Digital transformation, pp 109–128. Springer

    Google Scholar 

  9. Otto PDB (2021) GAIA-X and IDS. https://doi.org/10.5281/zenodo.5675897

  10. C. AISBL E Gaia-X: A federated and secure data infrastructure. https://www.gaia-x.eu/

  11. Mühle A, Grüner A, Gayvoronskaya T, Meinel C (2018) A survey on essential components of a self-sovereign identity. Comput Sci Rev 30:80–86

    Article  Google Scholar 

  12. Pastor M Essif functional scope

    Google Scholar 

  13. Otto BS IDS reference architecture model. Version 3.0. https://internationaldataspaces.org/publications/ids-ram/

  14. i4trust Data spaces for effective and trusted data sharing. https://i4trust.org/

  15. iSHARE: Sharing logistics data in a uniform, simple and controlled way. iSHARE. https://www.ishareworks.org/en

  16. Peterson M What’s next for Europe’s data revolution? AWS joins the GAIA-X initiative. https://aws.amazon.com/blogs/publicsector/what-next-europes-data-revolution-aws-joins-gaia-x-initiative/

  17. Microsoft Azure active directory verifiable credentials documentation. https://docs.microsoft.com/en-us/azure/active-directory/verifiable-credentials/

  18. Kurian G Engaging in a European dialogue on customer controls and open cloud solutions. https://cloud.google.com/blog/products/identity-security/how-google-cloud-is-addressing-data-sovereignty-in-europe-2020

  19. Tobin A, Reed D (2016) The inevitable rise of self-sovereign identity. Sovrin Found 29

    Google Scholar 

  20. Giannopoulou A (2020) Data protection compliance challenges for self-sovereign identity. In: International congress on blockchain and applications. Springer, pp 91–100

    Google Scholar 

  21. GAIA-X (2020) Technical architecture. https://www.data-infrastructure.eu/GAIAX/Redaktion/EN/Publications/gaia-x-technical-architecture.pdf

  22. Software requirements specification for GAIA-X federation services trust services API IDM.TSA (2021). https://www.gxfs.de/federation-services/identity-trust/trust-services/

  23. Dumortier J (2017) Regulation (eu) no 910/2014 on electronic identification and trust services for electronic transactions in the internal market (eidas regulation). In: EU Regulation of e-commerce. Edward Elgar Publishing

    Google Scholar 

  24. Kubach M, Roßnagel H (2021) A lightweight trust management infrastructure for self-sovereign identity. Open Identity Summit 2021

    Google Scholar 

  25. Bandopadhyay S, Dimitrakos T, Diaz Y, Hariri A, Dilshener T, La Marra A, Rosetti A (2021) Datapal: data protection and authorization lifecycle framework. In: 2021 6th South-East Europe design automation, computer engineering, computer networks and social media conference (SEEDA-CECNSM). IEEE, pp 1–8

    Google Scholar 

  26. Dimitrakos T, Dilshener T, Kravtsov A, La Marra A, Martinelli F, Rizos A, Rosett A, Saracino A (2020) Trust aware continuous authorization for zero trust in consumer internet of things. In: 2020 IEEE 19th international conference on trust, security and privacy in computing and communications (TrustCom). IEEE, pp 1801–1812

    Google Scholar 

  27. Hariri A, Bandopadhyay S, Rizos A, Dimitrakos T, Crispo B, Rajarajan M (2021) Siuv: a smart car identity management and usage control system based on verifiable credentials. In: IFIP international conference on ICT systems security and privacy protection. Springer, pp 36–50

    Google Scholar 

  28. Park J, Sandhu R (2002) Towards usage control models: beyond traditional access control. In: Proceedings of the seventh ACM symposium on access control models and technologies, pp 57–64

    Google Scholar 

  29. Catena-X Automotive network. https://catena-x.net/en/

  30. Otto B (2021) Interviewee, talk at the security and trust summit

    Google Scholar 

  31. Tounsi W, Rais H (2018) A survey on technical threat intelligence in the age of sophisticated cyber attacks. Comput Secur 72:212–233

    Article  Google Scholar 

  32. Johnson CS, Feldman L, Witte GA et al (2017) Cyber threat intelligence and information sharing

    Google Scholar 

Download references

Acknowledgements

The authors would like to acknowledge the contribution of the following colleagues: Bithin Alangot, Subhajit Bandopadhyay, Isabelle Hang, Ali Hariri, Ioannis Krontiris, Athanasios Rizos, Tian Wenyuan, Teng Wu, Xuebing Zhou at Huawei’s Munich research center.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amjad Ibrahim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Ibrahim, A., Dimitrakos, T. (2023). Towards Collaborative Security Approaches Based on the European Digital Sovereignty Ecosystem. In: Dimitrakos, T., Lopez, J., Martinelli, F. (eds) Collaborative Approaches for Cyber Security in Cyber-Physical Systems. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-16088-2_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-16088-2_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-16087-5

  • Online ISBN: 978-3-031-16088-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics