Data Exchange

Once participants agree on the meaning of data, they need a secure and reliable way to exchange it.

Data exchange within a data space typically takes place through APIs, but can also include messaging, data streaming, or algorithm-to-data approaches, depending on the sector and technical setup.

Conceptually, the control plane defines the rules of interaction (who can access what, under which terms), while the data plane executes the actual transfer of data.

iSHARE does not prescribe a single method for data exchange. Instead, it aligns with and adheres to widely recognised industry standards that ensure interoperability and trust, such as PKI, OAuth 2.0, and OpenID Connect 1.0, see more here.

When participants use the iSHARE Framework, they automatically operate within these established standards, ensuring that authentication, identification, and authorisation (as defined in the Data Sovereignty & Trust pillar) are consistently applied before any data flow occurs.

By adhering to open standards and iSHARE trust mechanisms, data exchange across the ecosystem becomes secure, repeatable, and interoperable, making it easier for participants to connect and collaborate across data spaces.

This topic is further explained in [The DSSC Description].

Data Exchange connects closely with other building blocks:

  • Data Models: Provides the technical foundation for formats like JSON.

  • Access & Usage Policies and Enforcement: Ensures transactions follow access and usage rules.

  • Trust Framework: Secures transactions through trust protocols.

  • Data, Services, and Offerings Descriptions: Retrieves the correct version and location of data assets.

  • Value Creation Services: Defines protocols and versions for data exchange.

Last updated