|
| 1 | +## Introduction |
| 2 | +With the rise in data exchange among sectors such as finance, legal, and government, there is a growing need for seamless data interoperability while ensuring compliance with data usage policies and local regulations. Dataspace aims to address these challenges by creating a secure and efficient environment for data sharing. |
| 3 | + |
| 4 | +This project investigates the feasibility of utilizing dataspaces with a focus on data sovereignty. It involves evaluating the maturity of dataspaces, identifying crucial components, and assessing the ease of deployment. The ultimate objective is to facilitate secure and compliant data sharing among diverse entities. |
| 5 | + |
| 6 | +## Component Diagramm |
| 7 | + |
| 8 | + |
| 9 | +## Components |
| 10 | +### 1. Login Interface |
| 11 | + |
| 12 | +The Login Interface serves as the initial access point to the system, facilitating authentication for users. The primary purpose of the Login Interface is to authenticate users and grant access to the system based on their roles: bank, tax advisor, or company. Each of the roles is provided with a unique url, through which they can only login in for their roles and not the other ones. |
| 13 | + |
| 14 | +### 2. Data Connectors |
| 15 | +Data connectors are the core components that enable secure and effective communication and data exchange between different entities. They facilitate the connection of multiple data endpoints, increasing the pool of available data and accelerating the data economy. |
| 16 | + |
| 17 | +Each data connector performs the following functions: |
| 18 | +- **Connectivity Validation**: Ensures secure connection establishment with data sources or destinations. |
| 19 | +- **Data Exchange**: Manages secure data transfer, including encryption and decryption processes. |
| 20 | +- **Compliance Monitoring**: Ensures adherence to data usage policies and local regulations during data exchange. |
| 21 | +- **Audit Logging**: Maintains transaction logs for transparency and accountability. |
| 22 | + |
| 23 | +### 3. Dashboard Interface |
| 24 | +The Dashboard Interface serves as the central hub for users post-authentication, offering a comprehensive overview of available functionalities and navigation options within the system. |
| 25 | + |
| 26 | +#### Dashboard Components |
| 27 | + |
| 28 | +a. **Home Interface**: The default landing page accessible from the Dashboard Interface, providing users with an overview of their connector status and relevant information. The following elements are visible at the Home Interface: |
| 29 | +- *button* **Refresh**: used to refresh the information about the statuses of the connector and the database |
| 30 | +- *status* **Connector Status**: shows whether the connector for the selected role is running or not (is either shown in green or red) |
| 31 | +- *status* **Database Status**: shows whether the database for the selected role is running or not (is either shown in green or red) |
| 32 | +- *button* **Start/Pause Connector**: enables to either start or pause the connector for the logged in user |
| 33 | + |
| 34 | +b. **Upload Interface**: A dedicated page enabling users to upload files to the database, that will later be visible to the other connectors. |
| 35 | +- *button* **Refresh**: used to refresh the information about the currently uploaded files |
| 36 | +- *button* **Upload File**: allows the user to upload a chosen file from their computer. Requires to choose a title and policy for the chosen file |
| 37 | +- *button* **Create Policy**: allows the user to create a new policy |
| 38 | + |
| 39 | +c. **Download Interface**: A dedicated page enabling the users to download files that where uploaded by the other users. |
| 40 | +- *Dropbox* **Select connector**: allows the users to choose the connector from whom they want to download the file. |
| 41 | +- *Table*: a table containing all the accessible files from the chosen connector. |
| 42 | + - *button* **Negotiate**: a button next to the files visible in the table that allows the negotiation of the contract to download the chose file |
| 43 | + |
| 44 | +### 4. Backend Services |
| 45 | +The backend services handle the core logic of the dataspace application, managing connections, data exchanges, and compliance monitoring. |
| 46 | + |
| 47 | +#### Components |
| 48 | +1. **Connection Manager**: |
| 49 | + - **Functionality**: Manages the establishment, maintenance, and termination of connections between data connectors. |
| 50 | + - **Security**: Ensures secure connections using encryption protocols. |
| 51 | + |
| 52 | +2. **Data Exchange Manager**: |
| 53 | + - **Functionality**: Oversees the secure transfer of data between entities. |
| 54 | + - **Compliance**: Ensures data exchanges adhere to predefined rules and regulations. |
| 55 | + |
| 56 | +3. **Compliance Monitor**: |
| 57 | + - **Functionality**: Monitors all data exchanges to ensure compliance with data usage policies and local regulations. |
| 58 | + - **Reporting**: Generates reports on compliance status and any detected violations. |
| 59 | + |
| 60 | +4. **Audit Logger**: |
| 61 | + - **Functionality**: Maintains detailed logs of all transactions and data exchanges. |
| 62 | + - **Transparency**: Provides an audit trail for transparency and accountability. |
| 63 | + |
| 64 | + |
| 65 | +## Conclusion |
| 66 | +The IDS aim to explore the practical implementation of dataspace technology in ensuring secure and compliant data exchange across different sectors. The project focuses on demonstrating the viability of dataspace as a solution for modern data interoperability challenges, with a strong emphasis on data sovereignty, transparency, and fairness. Through this documentation, the design and components of the Dataspace application are detailed to provide a clear understanding of its structure and functionalities. |
0 commit comments