Maintaining Control over Distributed Data Through a Data Sovereignty Model
In today's global and collaborative virtual product development, massive amounts of data are shared and exchanged between a large number of participants. To store continuous increasing amounts of data, enterprises often outsource their storage to cloud providers. Due to economic factors, cloud...
Saved in:
Published in: | 2022 IEEE 7th International Conference on Information Technology and Digital Applications (ICITDA) pp. 1 - 7 |
---|---|
Main Authors: | , |
Format: | Conference Proceeding |
Language: | English |
Published: |
IEEE
04-11-2022
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | In today's global and collaborative virtual product development, massive amounts of data are shared and exchanged between a large number of participants. To store continuous increasing amounts of data, enterprises often outsource their storage to cloud providers. Due to economic factors, cloud providers often locate their servers (on which the data is stored) in other countries than they are located in themselves. However, the location where data is physically stored plays a critical role since it determines which jurisdiction it falls under and, consequently, which government can legally access the data without even needing permission. In contrast to that, most participants of the design process are lacking essential knowledge and transparency about where their data is located (after the distribution or storage in a cloud) and what consequences this has on their data privacy. Approaching this problem, we identified the necessity of transparent and secure data sharing and storing in virtual product development in order to ensure data owners sovereignty over their data. Therefore, we developed a concept which: 1) generates an overview about the actual location of distributed and stored design data and 2) provides data owners with the ability to maintain control over their data by regulating who can potentially access it. The concept proposes a novel data sovereignty model which consists of a data sovereignty graph and usage licenses (sovereignty criteria). To validate the concept, a prototypical implementation was conducted and evaluated. We came to the conclusion that the presented concept can be used effectively to create transparency, trust, and security of transferred data in the product development supply chain. |
---|---|
AbstractList | In today's global and collaborative virtual product development, massive amounts of data are shared and exchanged between a large number of participants. To store continuous increasing amounts of data, enterprises often outsource their storage to cloud providers. Due to economic factors, cloud providers often locate their servers (on which the data is stored) in other countries than they are located in themselves. However, the location where data is physically stored plays a critical role since it determines which jurisdiction it falls under and, consequently, which government can legally access the data without even needing permission. In contrast to that, most participants of the design process are lacking essential knowledge and transparency about where their data is located (after the distribution or storage in a cloud) and what consequences this has on their data privacy. Approaching this problem, we identified the necessity of transparent and secure data sharing and storing in virtual product development in order to ensure data owners sovereignty over their data. Therefore, we developed a concept which: 1) generates an overview about the actual location of distributed and stored design data and 2) provides data owners with the ability to maintain control over their data by regulating who can potentially access it. The concept proposes a novel data sovereignty model which consists of a data sovereignty graph and usage licenses (sovereignty criteria). To validate the concept, a prototypical implementation was conducted and evaluated. We came to the conclusion that the presented concept can be used effectively to create transparency, trust, and security of transferred data in the product development supply chain. |
Author | Anderl, Reiner Giese, Tim |
Author_xml | – sequence: 1 givenname: Tim surname: Giese fullname: Giese, Tim email: giese@dik.tu-darmstadt.de organization: Technische Universität Darmstadt Darmstadt,Department of Computer Integrated Design (DiK),Germany – sequence: 2 givenname: Reiner surname: Anderl fullname: Anderl, Reiner email: anderl@dik.tu-darmstdt.de organization: Technische Universität Darmstadt Darmstadt,Department of Computer Integrated Design (DiK),Germany |
BookMark | eNotj8tqwzAURFVoF03aL-hGP-BU78cy2H04JHRR74NsXTsCVyqKUsjftyVZDMOB4cAs0G1MERDClKwoJfa5rduuWUtpBFkxwtjKWk0ZNTdoQZWSQlGu5D3a7FyI5S8hTrhOseQ04_QDGTfhWHLoTwU8blxxuDvkdJoO2F3w838FYYrljHfJw_yA7kY3H-Hx2kvUvb509Xu1_Xhr6_W2CsLwykqlejJyISnR1iptpCZyZMYJr6SnZDCDB-uZGagAoS33vWUaiNBcEKf4Ej1dtAEA9t85fLl83l_f8V9v6Ele |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICITDA55840.2022.9971218 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library Online IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEL url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Government |
EISBN | 1665461365 9781665461368 |
EndPage | 7 |
ExternalDocumentID | 9971218 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i483-9566b0f345107996785705f28a4d65d10c8cde9d28c14e4793db927e047340a63 |
IEDL.DBID | RIE |
IngestDate | Wed Jun 26 19:25:44 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i483-9566b0f345107996785705f28a4d65d10c8cde9d28c14e4793db927e047340a63 |
PageCount | 7 |
ParticipantIDs | ieee_primary_9971218 |
PublicationCentury | 2000 |
PublicationDate | 2022-Nov.-4 |
PublicationDateYYYYMMDD | 2022-11-04 |
PublicationDate_xml | – month: 11 year: 2022 text: 2022-Nov.-4 day: 04 |
PublicationDecade | 2020 |
PublicationTitle | 2022 IEEE 7th International Conference on Information Technology and Digital Applications (ICITDA) |
PublicationTitleAbbrev | ICITDA |
PublicationYear | 2022 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.8633525 |
Snippet | In today's global and collaborative virtual product development, massive amounts of data are shared and exchanged between a large number of participants. To... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | Cloud computing cloud storage data sharing data sovereignty Distributed databases Government Licenses Permission Product development Supply chains virtual product development |
Title | Maintaining Control over Distributed Data Through a Data Sovereignty Model |
URI | https://ieeexplore.ieee.org/document/9971218 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09a8MwED2aTJn6kZR-o6FjlSiyrI-xxAlJoaUQD92CLMlQKElp7aH_vjo7TSh06SZLwoaTzfOT7t0DuJVJ_A1PjaNMJIEKV0paMFVQyXWBb0BEJNQ7z5fq6UVnUyyTc7fTwoQQmuSzMMRmc5bvN67GrbKRMWocIakDHWV0q9X6Sc5hZrSYLPLsPo2IyiLv43y4nf7LN6WBjdnh_x54BIO9_o4875DlGA7C-gR6e1vcPjw8RkZfte4OZNKmmxMcJxlWwkUTq-BJZitL8taJh9j2comz0I2z-iJohPY2gHw2zSdzurVFoK9CJzQSGlmwMhHxa1KRrSgsUZ-WXFvhZerHzGnng_Fcu7EIuHHmC8NVYEIlglmZnEJ3vVmHMyCptqVTkcBwKxDY4y2kUb5wqTZOlvoc-hiT1Xtb-GK1DcfF392X0MOwN0I9cQXd6qMO19D59PVNs1TfT02Tww |
link.rule.ids | 310,311,782,786,791,792,798,27934,54767 |
linkProvider | IEEE |
linkToHtml | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NT8IwGH4jeJCTH2D8tgePFsrW9eNoGAQUiAk7eCNb2yUmBoxuB_-9fTeEmHjxtm5dm7Rbnj7t-7wPwJ0I_TI80oYyHjrKTS5oxmRGRaAy_AI8IqHeebyQ8xcVDzFNzv1WC-Ocq4LPXBcvq7N8uzYlbpX1tJZ9D0kN2I-4FLJWa_2E5zDdmwwmSfwQeUxlnvkFQXfzwi_nlAo4Rof_6_IIOjsFHnneYssx7LnVCbR2xrhteJx5Tl_U_g5kUAecE3xOYsyFizZWzpI4LVKS1F48JK2LC6yFfpzFF0ErtLcOJKNhMhjTjTECfeUqpJ7SiIzlIff_k_R8RWKS-igPVMqtiGyfGWWs0zZQps8dbp3ZTAfSMS5DzlIRnkJztV65MyCRSnMjPYUJUo7Q7psQWtrMREobkatzaOOYLN_r1BfLzXBc_H37Fg7GyWy6nE7mT5fQwimoZHv8CprFR-muofFpy5tq2r4BSPiXFA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2022+IEEE+7th+International+Conference+on+Information+Technology+and+Digital+Applications+%28ICITDA%29&rft.atitle=Maintaining+Control+over+Distributed+Data+Through+a+Data+Sovereignty+Model&rft.au=Giese%2C+Tim&rft.au=Anderl%2C+Reiner&rft.date=2022-11-04&rft.pub=IEEE&rft.spage=1&rft.epage=7&rft_id=info:doi/10.1109%2FICITDA55840.2022.9971218&rft.externalDocID=9971218 |