Data is a critical asset in today's world. When multiple actors are involved, ensuring that data is accessible only to authorized parties and protecting it against theft present significant challenges. A potential solution to these issues is creating data spaces that interconnect clusters managed by different actors. The latter can securely exchange data under specific constraints and terminate connections when needed. This paper aims to show how infrastructure-level data spaces, which support both access to data, and processing of it, can facilitate secure data exchange and limit data theft. Furthermore, we investigate how data sovereignty can be maintained through cluster data exchange, which is crucial in an era where data is increasingly regulated and controlled. Additionally, we explore how offloading applications from the data consumer into the data producer cluster can match data gravity patterns, improving overall system efficiency. Finally, this paper presents the potential integration of the proposed solution within the framework of IDSA and Gaia-X, serving as promising option for implementing their proposed functionalities.
Enabling compute and data sovereignty with infrastructure-level data spaces / Marino, Jacopo; Camiciotti, Leonardo; Cheinasso, Francesco; Olivero, Alessandro; Risso, Fulvio. - ELETTRONICO. - (2023), pp. 77-85. (Intervento presentato al convegno 3rd Eclipse Security, AI, Architecture and Modelling Conference on Cloud to Edge Continuum tenutosi a Ludwigsburg (DE) nel October 17, 2023) [10.1145/3624486.3624509].
Enabling compute and data sovereignty with infrastructure-level data spaces
Jacopo Marino;Francesco Cheinasso;Alessandro Olivero;Fulvio Risso
2023
Abstract
Data is a critical asset in today's world. When multiple actors are involved, ensuring that data is accessible only to authorized parties and protecting it against theft present significant challenges. A potential solution to these issues is creating data spaces that interconnect clusters managed by different actors. The latter can securely exchange data under specific constraints and terminate connections when needed. This paper aims to show how infrastructure-level data spaces, which support both access to data, and processing of it, can facilitate secure data exchange and limit data theft. Furthermore, we investigate how data sovereignty can be maintained through cluster data exchange, which is crucial in an era where data is increasingly regulated and controlled. Additionally, we explore how offloading applications from the data consumer into the data producer cluster can match data gravity patterns, improving overall system efficiency. Finally, this paper presents the potential integration of the proposed solution within the framework of IDSA and Gaia-X, serving as promising option for implementing their proposed functionalities.File | Dimensione | Formato | |
---|---|---|---|
Enabling_Compute_and_Data_Sovereignty_with_Infrastructure_Level_Data_Spaces.pdf
accesso aperto
Tipologia:
2. Post-print / Author's Accepted Manuscript
Licenza:
Creative commons
Dimensione
621.79 kB
Formato
Adobe PDF
|
621.79 kB | Adobe PDF | Visualizza/Apri |
3624486.3624509.pdf
accesso aperto
Tipologia:
2a Post-print versione editoriale / Version of Record
Licenza:
Creative commons
Dimensione
658.44 kB
Formato
Adobe PDF
|
658.44 kB | Adobe PDF | Visualizza/Apri |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11583/2982281