Abstract
The need for collaboration and digital transformation is among the lessons the world has realized during the pandemic. This chapter argues that the strategy of the European Union to bring the concepts of sovereignty to the digital world is a crucial enabler to achieve these two goals. This strategy is being shaped by several community initiatives, laws, and projects that tackle different aspects of digital sovereignty. In this chapter, we survey the relevant literature to present an understanding of the emerging technology and highlight a research agenda based on challenges and gaps that we identify in different topics. Next, we discuss the requirements and challenges of identity and trust, sovereign data exchange, federated catalogues, and compliance as digital sovereignty pillars. This discussion is helpful to researchers in identifying relevant problems and practitioners in designing future-proof solutions. Finally, we illustrate the benefits of digital sovereignty through a use-case from the domain of collaborative security approaches.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Example would be the GDPR as this set of legal norms is binding for all EU-member states but includes principles different from similar laws in the US or China.
- 2.
Historically, these core values arise from a fundamental human right developed in Germany in the 1980s called “Informationelle Selbstbestimmung”, which roughly translates to informational self-determination.
- 3.
While different perspectives on sovereignty may further categorize it into different classes, e.g., technological sovereignty or data sovereignty; we discuss data sovereignty in this chapter.
- 4.
Tech companies are also acknowledging some of these aspects, e.g., Google (see https://cloud.google.com/blog/products/identity-security/how-google-cloud-is-addressing-data-sovereignty-in-europe-2020).
- 5.
- 6.
GXFS represent the minimum technical requirements and services necessary to operate the federated Gaia-X Ecosystem of infrastructure and data.
- 7.
“While access control restricts access to specific resources (e.g., a Service or a file), data sovereignty is additionally supported with Data-Centric Usage Control” [21].
- 8.
References
Markus I, Steffen G, Lachmann R, Marquis A, Schneider T, Tomczyk S, Koppe U, Rohde AM, Schink SB, Seifried J et al (2021) Covid-19: cross-border contact tracing in Germany, February to April 2020. Eurosurveillance 26(10):2001236
Cascini F, Causio FA, Failla G, Melnyk A, Puleo V, Regazzi L, Ricciardi W (2021) Emerging issues from a global overview of digital covid-19 certificate initiatives. Front Pub Health 9. https://doi.org/10.3389/fpubh.2021.744356. https://www.frontiersin.org/article/10.3389/fpubh.2021.744356
A digital future for Europe. https://www.consilium.europa.eu/en/policies/a-digital-future-for-europe/
Council A The European union and the search for digital sovereignty
Roberts H, Cowls J, Casolari F, Morley J, Taddeo M, Floridi L (2021) Safeguarding European values with digital sovereignty: an analysis of statements and policies. Internet Policy Rev
Philpott D (2020) Sovereignty. In: Zalta EN (ed) The Stanford encyclopedia of philosophy, Fall, 2020th edn. Stanford University, Metaphysics Research Lab
Braud A, Fromentoux G, Radier B, Le Grand O (2021) The road to European digital sovereignty with GAIA-X and IDSA. IEEE Netw 35(2):4–5. https://doi.org/10.1109/MNET.2021.9387709
Otto B, Hompel MT, Wrobel S (2019) International data spaces. In: Digital transformation, pp 109–128. Springer
Otto PDB (2021) GAIA-X and IDS. https://doi.org/10.5281/zenodo.5675897
C. AISBL E Gaia-X: A federated and secure data infrastructure. https://www.gaia-x.eu/
Mühle A, Grüner A, Gayvoronskaya T, Meinel C (2018) A survey on essential components of a self-sovereign identity. Comput Sci Rev 30:80–86
Pastor M Essif functional scope
Otto BS IDS reference architecture model. Version 3.0. https://internationaldataspaces.org/publications/ids-ram/
i4trust Data spaces for effective and trusted data sharing. https://i4trust.org/
iSHARE: Sharing logistics data in a uniform, simple and controlled way. iSHARE. https://www.ishareworks.org/en
Peterson M What’s next for Europe’s data revolution? AWS joins the GAIA-X initiative. https://aws.amazon.com/blogs/publicsector/what-next-europes-data-revolution-aws-joins-gaia-x-initiative/
Microsoft Azure active directory verifiable credentials documentation. https://docs.microsoft.com/en-us/azure/active-directory/verifiable-credentials/
Kurian G Engaging in a European dialogue on customer controls and open cloud solutions. https://cloud.google.com/blog/products/identity-security/how-google-cloud-is-addressing-data-sovereignty-in-europe-2020
Tobin A, Reed D (2016) The inevitable rise of self-sovereign identity. Sovrin Found 29
Giannopoulou A (2020) Data protection compliance challenges for self-sovereign identity. In: International congress on blockchain and applications. Springer, pp 91–100
GAIA-X (2020) Technical architecture. https://www.data-infrastructure.eu/GAIAX/Redaktion/EN/Publications/gaia-x-technical-architecture.pdf
Software requirements specification for GAIA-X federation services trust services API IDM.TSA (2021). https://www.gxfs.de/federation-services/identity-trust/trust-services/
Dumortier J (2017) Regulation (eu) no 910/2014 on electronic identification and trust services for electronic transactions in the internal market (eidas regulation). In: EU Regulation of e-commerce. Edward Elgar Publishing
Kubach M, Roßnagel H (2021) A lightweight trust management infrastructure for self-sovereign identity. Open Identity Summit 2021
Bandopadhyay S, Dimitrakos T, Diaz Y, Hariri A, Dilshener T, La Marra A, Rosetti A (2021) Datapal: data protection and authorization lifecycle framework. In: 2021 6th South-East Europe design automation, computer engineering, computer networks and social media conference (SEEDA-CECNSM). IEEE, pp 1–8
Dimitrakos T, Dilshener T, Kravtsov A, La Marra A, Martinelli F, Rizos A, Rosett A, Saracino A (2020) Trust aware continuous authorization for zero trust in consumer internet of things. In: 2020 IEEE 19th international conference on trust, security and privacy in computing and communications (TrustCom). IEEE, pp 1801–1812
Hariri A, Bandopadhyay S, Rizos A, Dimitrakos T, Crispo B, Rajarajan M (2021) Siuv: a smart car identity management and usage control system based on verifiable credentials. In: IFIP international conference on ICT systems security and privacy protection. Springer, pp 36–50
Park J, Sandhu R (2002) Towards usage control models: beyond traditional access control. In: Proceedings of the seventh ACM symposium on access control models and technologies, pp 57–64
Catena-X Automotive network. https://catena-x.net/en/
Otto B (2021) Interviewee, talk at the security and trust summit
Tounsi W, Rais H (2018) A survey on technical threat intelligence in the age of sophisticated cyber attacks. Comput Secur 72:212–233
Johnson CS, Feldman L, Witte GA et al (2017) Cyber threat intelligence and information sharing
Acknowledgements
The authors would like to acknowledge the contribution of the following colleagues: Bithin Alangot, Subhajit Bandopadhyay, Isabelle Hang, Ali Hariri, Ioannis Krontiris, Athanasios Rizos, Tian Wenyuan, Teng Wu, Xuebing Zhou at Huawei’s Munich research center.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Ibrahim, A., Dimitrakos, T. (2023). Towards Collaborative Security Approaches Based on the European Digital Sovereignty Ecosystem. In: Dimitrakos, T., Lopez, J., Martinelli, F. (eds) Collaborative Approaches for Cyber Security in Cyber-Physical Systems. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-16088-2_6
Download citation
DOI: https://doi.org/10.1007/978-3-031-16088-2_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-16087-5
Online ISBN: 978-3-031-16088-2
eBook Packages: Computer ScienceComputer Science (R0)