Key Concepts¶
This page explains the fundamental concepts used throughout the Dataspace Ecosystem.
Core Concepts¶
Participant¶
A Participant is any organization or entity that joins the dataspace. Participants can act as:
- Data Providers: Organizations that offer data assets
- Data Consumers: Organizations that request and use data
- Both: Most participants act in both roles
Asset¶
An Asset represents any resource that can be shared within the dataspace:
- Datasets (files, databases)
- APIs and services
Policy¶
A Policy defines the rules and conditions for using an asset:
{
"odrl:action": {
"@id": "odrl:use"
},
"odrl:constraint": {
"odrl:leftOperand": {
"@id": "dse-policy:GenericClaim.$.MembershipCredential.name"
},
"odrl:operator": {
"@id": "odrl:eq"
},
"odrl:rightOperand": "testparticipant"
}
}
This policy uses the ODRL (Open Digital Rights Language) standard to define data usage rules. Let's break down each component:
Policy Components¶
-
odrl:action: Defines the permitted action"odrl:use"- Allows general usage of the asset (read, access, process)
-
odrl:constraint: Defines conditions that must be satisfied for the action to be permitted odrl:leftOperand: What is being evaluated"dse-policy:GenericClaim.$.MembershipCredential.name": Extracts the "name" field from a MembershipCredential in the participant's Verifiable Credential
odrl:operator: The comparison operation"odrl:eq": Equals (exact match)
odrl:rightOperand: The value to compare against"testparticipant": The required participant name
Policy Evaluation¶
This policy effectively states: "Allow usage of this asset only if the requesting participant has a MembershipCredential where the name field equals 'testparticipant'"
When a participant requests access: 1. The system extracts their Verifiable Credentials 2. It looks for a MembershipCredential 3. It checks if the name field equals "testparticipant" 4. Access is granted only if this condition is satisfied
Contract¶
A Contract is an agreement between a provider and consumer that binds a policy to an asset:
- Contract Definition: Provider publishes available terms
- Contract Negotiation: Consumer requests and negotiates
- Contract Agreement: Binding agreement after successful negotiation
Catalog¶
The Catalog contains all available data offerings from participants:
- Metadata about assets
- Associated policies and contracts
- Discovery and search capabilities
Identity Concepts¶
Decentralized Identifier (DID)¶
A DID is a globally unique identifier that enables verifiable, decentralized digital identity:
Verifiable Credential (VC)¶
A Verifiable Credential is a tamper-proof claim about a participant:
- Membership credentials
- Compliance certifications
- Business attributes
Verifiable Presentation (VP)¶
A Verifiable Presentation allows participants to present one or more credentials for verification.
Protocol Concepts¶
IDS Protocol¶
The International Data Spaces (IDS) protocol defines the standard communication patterns:
- Catalog Protocol
- Contract Negotiation Protocol
- Transfer Process Protocol
Catalog Protocol¶
The Catalog Protocol enables discovery and browsing of data offerings:
- Catalog Request: Consumer queries available datasets
- Catalog Response: Provider returns catalog with assets, policies, and contract definitions
- Dataset Request: Consumer requests detailed information about specific assets
Contract Negotiation Protocol¶
The Contract Negotiation Protocol handles agreement establishment between participants:
- Contract Request: Consumer initiates negotiation with desired terms
- Contract Offer: Provider responds with counter-offer or acceptance
- Contract Agreement: Final binding contract established
- Contract Verification: Both parties verify the agreed terms
Transfer Process¶
A Transfer Process orchestrates the actual data exchange:
- Transfer Request: Consumer initiates data transfer after successful contract negotiation
- Transfer Preparation: Provider prepares data access and establishes transfer channel
- Data Exchange: Actual data flow occurs from provider to consumer
- Transfer Confirmation: Both parties verify successful completion of data transfer
Architecture Concepts¶
Control Plane¶
The Control Plane handles all management operations:
- Catalog management
- Contract negotiations
- Policy evaluation
- Asset management
Data Plane¶
The Data Plane handles actual data movement:
- Data source connections
- Data transformations
- Transfer protocols (HTTP, S3, etc.)
Extension Points¶
The ecosystem is built on an extensible architecture:
- SPI (Service Provider Interface): Define contracts
- Extensions: Implement specific functionality
- Launchers: Configure runtime behavior
Next Steps¶
- Explore the System Architecture
- Start with the Quick Start Guide