Skip to content

Introduction

The Dataspace Ecosystem is a platform designed by Amadeus to enable sovereign, secure, and interoperable data exchange between organizations. This page explains the core principles, architecture philosophy, and typical use cases that drive the ecosystem.

What is a Dataspace?

A dataspace is a federated data ecosystem where participants can share and exchange data in a controlled, secure, and sovereign manner. Unlike traditional centralized data platforms, dataspaces:

  • Preserve data sovereignty: Data owners maintain control over their data
  • Enable decentralization: No single entity controls the entire ecosystem
  • Ensure interoperability: Standards-based protocols for seamless integration
  • Build trust: Verifiable identities and transparent policies

Core Principles

Data Sovereignty

Data owners retain full control over:

  • Who can access their data
  • Under what conditions data can be used
  • How long access is granted
  • What operations can be performed

Decentralization

The ecosystem operates without a central authority:

  • Distributed catalogs for data discovery
  • Peer-to-peer data exchange
  • Self-sovereign identity management
  • Federated governance

Interoperability

Built on open standards to ensure:

  • Compatibility across different implementations
  • Standard protocols (IDS, ODRL, W3C DID/VC)
  • Extensible architecture for custom requirements

Trust

Establishing trust through:

  • Verifiable credentials and attestations
  • Policy enforcement at runtime
  • Audit trails and logging
  • Cryptographic verification

Use Cases

Data Marketplace

Create a marketplace where organizations can:

  • Publish their data offerings with metadata and usage policies
  • Discover available data from other participants via the Federated Catalog
  • Negotiate and agree on usage terms through automated contract negotiation
  • Exchange data securely through the Data Plane with full audit trails

Regulated Data Sharing

Enable data exchange in regulated industries where:

  • Compliance credentials are verified before access is granted
  • Usage policies enforce data handling requirements
  • Consumption metrics track all data exchanges for billing and auditing

Next Steps