<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>A. De Crecchio);</journal-title>
      </journal-title-group>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Data Spaces to Enable Privacy Preserving Data Exchange in the Energy Supply Chain</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Luigi Coppolino</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alessandro De Crecchio</string-name>
          <email>alessandro.decrecchio@imtlucca.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Roberto Nardone</string-name>
          <email>roberto.nardone@uniparthenope.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alfredo Petruolo</string-name>
          <email>alfredo.petruolo001@studenti.uniparthenope.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Luigi Romano</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Federica Uccello</string-name>
          <email>federica.uccello@assegnista.uniparthenope.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>Smart Grid, Cybersecurity, Cyber Attack, FIWARE</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Scuola IMT Alti Studi Lucca</institution>
          ,
          <addr-line>Piazza S. Ponziano, Lucca</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Naples 'Parthenope', Centro Direzionale</institution>
          ,
          <addr-line>80143 Naples</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2079</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>In the modern digital landscape, ensuring secure data sharing within complex infrastructures is not trivial. This paper presents an in-depth analysis of dataspaces and their crucial role in enhancing privacypreserving data exchange within the energy supply chain. The main contribution of the work includes the design of the architecture of dataspaces, emphasizing their utility in addressing legal and technical challenges while ensuring data sovereignty and stakeholder trust. Through a focused case study and STRIDE analysis, the practical application and security benefits of dataspaces are illustrated, underscoring their significance in fostering a secure, eficient, and collaborative data-sharing environment.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>CEUR
ceur-ws.org</p>
    </sec>
    <sec id="sec-2">
      <title>1. Introduction</title>
      <p>
        In today’s interconnected world, existing systems are asked to fulfil increasing data-sharing
requirements. The rapid expansion of data-centric applications underscoring the real value
of data [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ] also afected smart grids and the energy supply chains. With a specific focus
on energy exchange, current data exchange methods exhibit limitations, particularly when
multiple stakeholders, including Transmission System Operators (TSOs) and Distribution System
Operators (DSOs), need to collaborate and share sensitive information. The evolution introduced
by the ‘Common European Dataspaces’ represents a strategic response to these challenges,
fostering an environment where data can be exchanged securely and eficiently while respecting
privacy and data sovereignty [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ].
      </p>
      <p>
        While the importance of a unified data-sharing ecosystem is evident, the energy sector faces
specific privacy and security challenges that need to be addressed. As an example, the
integration and exchange of data among energy stakeholders necessitates robust privacy-preserving
mechanisms to prevent unauthorized access and to ensure the integrity and confidentiality of
the exchanged information. This is crucial for maintaining operational security and trust within
and across the energy supply chain [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Hence, prioritizing privacy-preserving data exchange
and ensuring data sovereignty are basic requirements guiding this transformation [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>The remainder of this paper is structured as follows. Section 2 addresses the related work.
Section 3 ofers a comprehensive overview to clarify the concept of dataspace and to address
the ambiguities and uncertainties identified. Section 4 outlines specific European initiatives
promoting the advancement of dataspaces, while Section 5 concentrates on eforts pertinent to
the development and enhancement of dataspaces supporting the energy supply chain. Section
6 explores a practical case study where the dataspace paradigm has been applied, providing an
analysis of security considerations and employing STRIDE methodology to assess
communications based on dataspaces. Lastly, Section 7 ends the paper drawing final remarks.</p>
    </sec>
    <sec id="sec-3">
      <title>2. Related Work</title>
      <p>
        The challenges linked to privacy-preserving and secure data sharing have been subject to
multiple research works. Among others, blockchain-based solutions have been proposed in
several application domains [
        <xref ref-type="bibr" rid="ref10 ref7 ref8 ref9">7, 8, 9, 10</xref>
        ], exploiting the inherent properties of such technology
to ensure traceability and integrity. Some others consider security and privacy, mainly using
encryption algorithms. The work in [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] proposes a framework for sharing encrypted data
in the cloud, addressing concerns about privacy breaches. A diferent approach is in [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ],
where two data-sharing algorithms are designed and evaluated in the context of Industrial IoT.
Diferent frameworks with a specific focus on data sharing and standardized data formats have
been proposed in diferent works, as [
        <xref ref-type="bibr" rid="ref13 ref14 ref15 ref16">13, 14, 15, 16</xref>
        ]. These frameworks adopt centralized data
management, where data are acquired and then processed more than shared.
      </p>
      <p>The present research is motivated by the specific need for privacy-preserving data exchange
in the energy supply chain, aiming to clarify and tailor the concept of data spaces to this context.
Additionally, advanced privacy-preserving techniques suited for the energy sector’s demand
are identified and deployed. Furthermore, a detailed case study is presented, applying STRIDE
analysis to develop a targeted threat model for data exchange among energy stakeholders. The
scope of the model is to demonstrate how dataspaces can enhance data security and privacy in
the energy supply chain, aligning with European data strategy goals and fortifying resilience
against cyber threats.</p>
    </sec>
    <sec id="sec-4">
      <title>3. Data Spaces and Data Sovereignty in Europe</title>
      <p>
        To the best of the authors’ understanding, identifying a universally acknowledged definition of
“dataspace” appears unfeasible. The GAIA-X initiative provides an initial perspective,
describing dataspaces as federated, open infrastructures that facilitate data sharing and sovereignty,
based on unified policies, rules, and standards [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. Similarly, Open DEI defines dataspaces as
decentralized infrastructures that ensure trustworthy data sharing and exchange within data
ecosystems, adhering to mutually accepted principles [18]. Meanwhile, the European
Commission envisions a dataspace as a unified global marketplace for both personal and non-personal
data, including sensitive business information, and ensuring robust safeguards while providing
businesses with easy access to top-quality industrial data to drive growth and innovation[19].
      </p>
      <p>Policies
Company A</p>
      <p>R
O
T
C
E
N
N
O
C</p>
      <p>App Store</p>
      <p>Data
Description</p>
      <p>Data Marketplace</p>
      <p>Data Broker
Identity Provider (CA)
Vocabulary Provider
...
Participants
Certificates</p>
      <p>R
O
T
C
E
N
N
O
C</p>
      <p>Policies
Company B
Company A Cloud Platform</p>
      <p>Traditional Inter Data Exchaning</p>
      <p>Company B Cloud Platform</p>
      <p>Given these diferent definitions and the consequent complexity of such a concept, this
section aims to ofer a concise yet right-to-the-point description of a dataspace, detailing the
essential requirements and elucidating the key roles of privacy-preserving mechanisms and
data sovereignty in its definition.</p>
      <p>What a Dataspace Is. A dataspace is an open ecosystem facilitating data sharing and
accessibility among diferent entities. This shift towards dataspaces relies on principles of
transparency and trust that govern these ecosystems. Traditional data exchange methods
face numerous challenges: a primary concern dataspaces seek to mitigate is the complexities
stakeholders experience when establishing legal frameworks for collaboration. Stakeholders
across vital sectors, like energy, encounter obstacles in creating contracts and establishing
reliable data-sharing policies, hindering broader participation and innovation due to legal
complexities. Conventional data exchange lacks full control over post-exchange data, posing
risks in scenarios where data governance is crucial, potentially resulting in financial losses.</p>
      <p>What a Dataspace Requires. To establish a collaborative and open environment for data
sharing, developing a trusted ecosystem where each participant is recognized, has assigned roles,
and is authorized for dataspace activities, is essential. Techniques ensuring privacy-preserving
data exchange, authentication, authorization, and overall security are vital, as highlighted in
the European Claim for dataspaces [20]. For this reason, dataspaces are designed to ensure data
sovereignty, providing a framework where data owners maintain control over the usage and
sharing of their data. This is a key concept in establishing trust and encouraging more entities
to participate in data sharing, as it ensures the respect of their data rights and privacy. In a
dataspace, ensuring compliance with regulations and ethical standards is vital, alongside an
interoperable infrastructure supporting data sharing across diverse systems, achieved through
common standards, vocabulary, and protocols.</p>
      <p>Privacy-Preserving Data Exchange. In the dataspace paradigm, data exchange is enabled
through connectors, which can be deployed on-premises or in a cloud environment, primarily
using helm charts and Kubernetes clusters, following an architecture ensuring security
mechanisms. As depicted in Figure 1, establishing the data marketplace requires, among others,
a Certification Authority (CA) and a shared vocabulary. The former ensures that diferent
stakeholders can be identified and authorized to participate in the marketplace, while the latter
enables participants to comprehend a shared language. This common understanding is essential
for facilitating machine-to-machine (M2M) communication and simplifying the creation of
privacy-preserving policies. From a technical perspective, it is also essential to guarantee the
minimum requirements needed for stakeholders’ computing nodes, verify the level of security
provided (e.g., Trusted Execution Environment support [21]), and confirm their geographical
locations. Stakeholders can publish descriptions of their data oferings on a data broker, while
developers can provide applications that utilize this data to create added-value services. All
transactions between diferent connectors are recorded by a clearing house, to ensure the
accurate processing of payments and data exchanges. Examples of policy enforcement in dataspaces
include restrictions on the duration of data usage, the rights to view and utilize data, and the
conditions under which data may be shared or processed. For instance, policies might dictate
that certain data can only be accessed for a limited time, or specify that data must not be
transferred to unauthorized parties. Additionally, policies can enforce data anonymization or
de-identification before it is shared to protect privacy. These rules ensure that all data handling
within the dataspace adheres to agreed-upon ethical and legal standards, fostering a secure and
trusted environment for all participants.</p>
    </sec>
    <sec id="sec-5">
      <title>4. The European Initiatives for Data Spaces</title>
      <p>The evolving data-driven landscape and the need for value-added services drive European eforts
to establish Common European data spaces [22]. This section highlights the key stakeholders
shaping this shift to a novel paradigm, prioritizing European values and facilitating new criteria
for data sharing.</p>
      <sec id="sec-5-1">
        <title>4.1. International Data Space Association</title>
        <p>The International Data Space Association [23] (IDSA) plays a significant role in the data-sharing
revolution. Its mission focuses on ensuring data sovereignty and bridging the gap between
industry and research communities to establish data spaces. From a technical point of view,
the association has devised the IDSA RAM [24], a reference architecture that delineates the
technical and organizational principles for implementing dataspaces. The Reference Model
(Figure 2) encompasses three primary aspects: security, certificates, and governance, organized
into five layers of granularity: Business, Functional, Information, Process, and System. The
Business Layer is devoted to articulating business models and value chains, clarifying the roles
and interactions of stakeholders to ensure alignment with business goals. In the Functional
Layer, the key capabilities and services necessary for data exchange are delineated, including
specific functions such as data sharing and processing that underpin business requirements.
The focus of the Information Layer is on organizing data, defining its semantics, and managing
its governance to guarantee that data can be exchanged and interpreted across diverse systems.
The Process Layer concentrates on the operational aspects, defining the processes and protocols
that ensure data is exchanged securely and eficiently, adhering to established policies and
standards. Lastly, the System Layer is concerned with the technical foundation, specifying the
necessary infrastructure and components, like connectors and networks, that enable the secure
exchange of data within the data space. IDSA’s key contribution includes the specification of
Roles</p>
        <p>Interactions</p>
        <p>FUNCTIONAL LAYER
TRUST</p>
        <p>SECURITY
DATA ECOSYSTEM</p>
        <p>INTEROPERABILITY
APPS
DATA</p>
        <p>SYSTEM LAYER</p>
        <p>MARKET</p>
        <p>SERVICE
ARCHITECTURE</p>
        <p>INFORMATION LAYER
MODEL SPEC VODCOABMUALINARY</p>
        <p>DIGITAL RESOURCE
REPRESENTATION</p>
        <p>PROCESS LAYER
ONBOARDING DATA OFFERING
CONTRACT
NEGOTIATION</p>
        <p>DATA EXCHANING</p>
        <p>Connectors, essential for establishing a dataspace instance. These, detailed in the IDSA RAM,
enable multiple parties to create the data-sharing platform.</p>
      </sec>
      <sec id="sec-5-2">
        <title>4.2. FIWARE</title>
        <p>As data-driven technologies are becoming increasingly integral in today’s digital world [25], the
FIWARE foundation plays a crucial role in supporting the development of smart applications
and services [26, 27]. FIWARE provides open-source software enabling developers to craft
data-centric applications. The building blocks are the Generic Enablers, which ofer a range of
functionalities to integrate various data sources and services. This enhanced ecosystem of
opensource resources is crafted to optimize the development process, simplifying and accelerating
the ability of developers to create advanced, data-centric solutions. FIWARE is crucial in the
realization of Digital Twins: the core is the Context Broker, a Generic Enabler that orchestrates
the management and storage of context information, bridging the physical devices and their
digital replicas. The Context Broker acts as a central hub, ensuring consistent, up-to-date context
information between various data sources and applications. It synchronizes real-world entities
with digital twin models, enabling real-time responsiveness and dynamic updates. FIWARE’s
commitment to interoperability and manufacturer-independent solutions is evident in its IoT
agents, which translate messages from diverse protocols into a standardized format, facilitating
the creation of manufacturer-agnostic solutions within the FIWARE ecosystem.</p>
        <p>This approach is fundamental in advancing the concept of data spaces, where diverse data
sources and systems coalesce in a unified, interoperable environment. Additionally, FIWARE’s
contribution extends to the standardization of data models through its Smart Data Models
initiative. This efort provides a common vocabulary and a set of standardized data structures,
vital for the homogenization of data and the facilitation of interoperable data exchange. These
data models ofer significant value in the context of data spaces, enabling disparate systems to
understand and interpret shared data consistently, and enhancing collaboration and innovation
in data-driven environments.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>5. The Energy Data Space and the CIM</title>
      <p>The European Common Data Spaces in the energy sector are crucial for several reasons as
illustrated in Table 1. It ofers key benefits and enables utilities and governments to develop
new services for citizens and uncover new revenue streams. It is a transformative paradigm
in the energy sector, uniting stakeholders—energy providers, consumers, grid operators, and
regulators—under a shared digital context. This unification is not only about connecting dots
but about creating a secure exchange of data that bridges the traditional silos, fostering a
seamless flow of information and insights across the energy landscape. Such integration and
interoperability are fundamental for the sector’s eficient resource management and distribution,
ensuring that energy reaches where it is needed most when it is needed. Within this context,
initiatives like Enershare [28] and CyberSEAS [29] emerge in the realization of this vision.
Enershare’s objectives are emblematic of the broader ambitions of the European Common Data
Spaces. It aims to democratize energy data, making it accessible and actionable for a spectrum of
stakeholders. This democratization is not only about data sharing but about creating a platform
where this data can be transformed into actionable intelligence, driving decision-making, and
innovation across the energy sector. In Particular, Enershare focuses on harnessing the power of
shared data to enable more sustainable energy practices, enhance grid eficiency, and foster the
development of new business models and services that can contribute to the energy transition.
Indeed, the CyberSEAS Project, funded by the EU, targets the crucial objective of securing
European data spaces among its strategic objectives. This initiative underscores the importance
of robust security measures in the realm of data sharing and exchange. CyberSEAS is dedicated
to advancing applications of enabling technologies that are crucial for facilitating
privacypreserving data exchange and sharing among various utility operators. By focusing on these
technologies, the project aims to establish a secure framework that ensures data confidentiality
and integrity across diferent entities within the utility sector, enhancing trust and collaboration
in European data spaces.</p>
      <p>The significance of establishing data exchange mechanisms among various operators and
stakeholders within the energy supply chain is well acknowledged. This aspect has been
addressed in the energy domain through the adoption of standardized schemas for representing
assets. This has been made possible by the existence of an industry standard, the IEC 61970
Series, commonly referred to as the Common Information Model (CIM) [34]. The CIM fosters
interoperability, enabling seamless integration and communication across diferent systems
and platforms used by utility operators and stakeholders. By adhering to CIM standards,
organizations can achieve consistency in data representation, ensuring that critical information
about assets, operations, and grid conditions is accurately interpreted and shared among relevant
parties. CIM is implemented using RDF (Resource Description Framework). In this context, RDF
is used to define the hierarchical structure of CIM classes and their relationships. Each CIM
class, such as Substation or VoltageLevel, is represented as a resource identified by a unique</p>
      <sec id="sec-6-1">
        <title>Enhanced Energy Eficiency</title>
      </sec>
      <sec id="sec-6-2">
        <title>Monitoring Facilitation</title>
      </sec>
      <sec id="sec-6-3">
        <title>Innovative Services Development</title>
      </sec>
      <sec id="sec-6-4">
        <title>Description</title>
      </sec>
      <sec id="sec-6-5">
        <title>Enables more eficient management and distribution of energy resources by leveraging data on consumption, production, and grid status [30].</title>
      </sec>
      <sec id="sec-6-6">
        <title>Facilitates better understanding and management of energy consumption, promoting energy-saving measures and technologies [31].</title>
      </sec>
      <sec id="sec-6-7">
        <title>Supports the integration and efective monitoring of en</title>
        <p>ergy assets within the energy grid [32].</p>
      </sec>
      <sec id="sec-6-8">
        <title>Empowers the creation of new, data-driven services for consumers, enhancing user experience and engagement [33].</title>
        <p>URI (Uniform Resource Identifier). Predicates encapsulate the properties and attributes of CIM
classes, while their respective values are embodied as objects. CIM schemas enable Transmission
System Operators (TSOs) to readily access real-time information on RES generation output,
thereby empowering them to efectively balance supply and demand. Likewise, Distribution
System Operators (DSOs) leverage CIM to acquire data on distributed energy resources (DERs),
which supports grid planning and operation. Therefore, when developing an energy data
space, ensuring services compliant with this schema representation should not be overlooked.
To efectively harness the benefits of CIM while mitigating its drawbacks, the solution is the
development of dataspace services and data applications that are compliant with CIM standards.</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>6. A Case Study: Cross-Border Energy Data Sharing</title>
      <p>This section describes a case study focused on the sharing of energy data, which shows how the
strategic alignment of diverse stakeholder requirements can benefit from a more unified and
efective power grid management. It demonstrates that substantial benefits derive from advanced
data-sharing mechanisms within a well-structured dataspace. This case study comes from the
experience with utility operators, within the CyberSEAS project [29], from multiple national
stakeholders involving a wide array of end-users, integrating them into the dataspace to enhance
collective outcomes. The final objective is to create an environment where stakeholders can
exchange vital infrastructure data, thereby enriching the ecosystem’s value and functionality.
This approach also played a pivotal role in providing essential protections for the public,
mitigating cybersecurity risks that could influence critical services, including billing. The
case study allows us to point out the twofold benefit of the proposed approach: augmenting
operational eficiency and fulfilling the consumers’ privacy.</p>
      <sec id="sec-7-1">
        <title>6.1. Data Flow Diagram and Threat Model</title>
        <p>As anticipated in Section 5, to secure the common European energy data space we follow
the STRIDE methodology in conjunction with Data Flow Diagrams (DFDs). The initial phase</p>
        <p>National StakeholderA
SERVER</p>
        <p>T-T Communication</p>
        <p>C-S Communication
SERVER</p>
        <p>T-S Communication</p>
        <p>D
SS</p>
        <p>O
SERVER erviceProviderTrustBoundary SERVER</p>
        <p>TSOs
Services
DSOs
Services</p>
        <p>Customer</p>
        <p>Services
LEGEND</p>
        <p>Software
Analysis
Physical
Device
Entity
Data</p>
        <p>Source
CommDiurencictation
applies the STRIDE threat modelling framework and involves the identification of the system’s
boundaries and the construction of the DFD, shown in Figure 3. This diagram identifies diferent
trust boundaries for each participant in the energy dataspace, acknowledging the premise that
diferent entities do not inherently trust one another. The diagram reports the various energy
sector stakeholders, such as TSOs and DSOs, abstracting their complex internal communications.
In particular, this DFD shows how data related to the power grid’s operational status and the
CIM infrastructural descriptions are essential for the operational and strategic management
of the grid. These data aspects are crucial for TSOs and DSOs to access real-time information
and for supporting grid planning and operational decisions. Another delineated trust boundary
pertains to customer premises. Data from meters, IoT devices, and Demand Response assets
(DR Devices) can be collected by the utility operator or leveraged to develop new services to
enhance power savings, among other objectives. Beyond direct communication with the utility
provider, there may also be data exchanges with untrusted parties, such as cloud-based IoT
control mechanisms that could be hosted globally. This potential interaction warrants careful
consideration within the threat modelling efort.</p>
        <p>Once we have delineated the entire system, we map the assets identified in the DFD with their
corresponding STRIDE threats. This mapping enables us to associate each asset with the specific
security threats it may face, providing a comprehensive understanding of the potential risks
within the system. As depicted in Table 2, each device within this system is subject to various
threats that must be carefully considered. When analyzing the dataspace-facilitated interactions,
it is crucial to recognize that privacy-preserving techniques and policy enforcement measures
must be specifically tailored to address these threats. For example, strong authentication
mechanisms such as multi-factor authentication can be implemented to counteract spoofing.
Policy enforcement can be strengthened by using attribute-based access controls (ABAC) to
finetune who has access to data under what conditions. Furthermore, to protect against information
disclosure, data can be encrypted both at rest and in transit, ensuring that sensitive information
remains confidential. These measures, when carefully specified and applied, can significantly
bolster the security of dataspace interactions.</p>
      </sec>
      <sec id="sec-7-2">
        <title>6.2. Dataspace-based solution</title>
        <p>While the establishment of dataspace-based communication enables participants to devise their
policies for ensuring privacy during data exchanges, it’s important to highlight the intricate
complexities involved in this solution. Specifically, the adoption of a common vocabulary has
been facilitated through the use of smart data models from FIWARE, particularly those related
to the Common Information Model (CIM). This adoption has streamlined the implementation of
communication, allowing participants to comprehend a shared language and exchange valuable
data efectively for information creation. However, another potential drawback is the reliance
on such standardized models, which may not always accommodate the specific needs or nuances
of all participating entities. While standardization promotes interoperability and simplifies
data sharing, it can also constrain organizations’ flexibility to represent their data in ways that
fully capture its unique aspects or proprietary nuances. Additionally, aligning diferent data
models to a common standard can be resource-intensive and require significant transformation
or mapping eforts, which could introduce data fidelity concerns. The resulting framework is
depicted in Figure 4, where the interactions among diferent national stakeholders (including
TSOs and DSOs) and (potential) service providers through the dataspace are mediated by a set
of security policies, well-defined and enforced by the cited technologies and frameworks. It is
important to acknowledge that this set of policies has to be dynamically updated and adjusted
when it is needed.</p>
        <sec id="sec-7-2-1">
          <title>Working Nodes (WNode)</title>
        </sec>
        <sec id="sec-7-2-2">
          <title>Common Information Model (CIM) Data Sources</title>
        </sec>
        <sec id="sec-7-2-3">
          <title>Grid Status Data Sources</title>
        </sec>
        <sec id="sec-7-2-4">
          <title>External Data Sources</title>
        </sec>
        <sec id="sec-7-2-5">
          <title>Concentrators Analysis</title>
        </sec>
        <sec id="sec-7-2-6">
          <title>IoT Aggregator Analysis</title>
        </sec>
        <sec id="sec-7-2-7">
          <title>Demand Response Aggregator</title>
        </sec>
        <sec id="sec-7-2-8">
          <title>Analysis</title>
        </sec>
        <sec id="sec-7-2-9">
          <title>Description STRIDE Element</title>
        </sec>
        <sec id="sec-7-2-10">
          <title>Entities managing the transmission Spoofing, Tampering,</title>
          <p>and distribution of energy Repudiation</p>
        </sec>
        <sec id="sec-7-2-11">
          <title>Systems for monitoring and controlling Information Discloindustrial processes sure, Denial of Service</title>
        </sec>
        <sec id="sec-7-2-12">
          <title>Hardware and software that monitors Elevation of Privilege,</title>
          <p>and controls physical devices Tampering</p>
        </sec>
        <sec id="sec-7-2-13">
          <title>Systems used for managing and pro- Spoofing, Infor</title>
          <p>cessing information mation Disclosure,</p>
        </sec>
        <sec id="sec-7-2-14">
          <title>Denial of Service</title>
        </sec>
        <sec id="sec-7-2-15">
          <title>Devices that measure energy usage and Information Disclocommunicate this information sure, Denial of Service</title>
        </sec>
        <sec id="sec-7-2-16">
          <title>Devices connected to the internet that Elevation of Privilege, collect and exchange data Information Disclosure, Denial of Service</title>
        </sec>
        <sec id="sec-7-2-17">
          <title>Devices that manage energy usage Denial of Service,</title>
          <p>based on demand signals Tampering</p>
        </sec>
        <sec id="sec-7-2-18">
          <title>Nodes responsible for data transmis- Denial of Service, sion within the network Spoofing, Information Disclosure</title>
        </sec>
        <sec id="sec-7-2-19">
          <title>Standardized models describing electri- Tampering, Informacal components and configurations tion Disclosure, Denial of Service</title>
        </sec>
        <sec id="sec-7-2-20">
          <title>Systems providing real-time data on Tampering, Informa</title>
          <p>the status of the electrical grid tion Disclosure</p>
        </sec>
        <sec id="sec-7-2-21">
          <title>External systems providing additional Spoofing, Informa</title>
          <p>data, like weather services tion Disclosure</p>
        </sec>
        <sec id="sec-7-2-22">
          <title>Analysis of the data collected from Spoofing, Tampering, smart meters Information Disclosure</title>
        </sec>
        <sec id="sec-7-2-23">
          <title>Systems that compile and manage data Spoofing, Elevation from multiple IoT devices of Privilege, Information Disclosure</title>
        </sec>
        <sec id="sec-7-2-24">
          <title>Systems that manage and coordinate Spoofing, Tampering, demand response signals and data Denial of Service</title>
        </sec>
      </sec>
      <sec id="sec-7-3">
        <title>Example of Policy Enforcement Loop for Securing Connectors. A dynamic approach to</title>
        <p>enforce security policies in dataspace connectors begins with the initialization of the connector
using baseline security policies and the importation of an initial STRIDE-based threat model.
The enforcement process is structured as a continuous loop that only concludes when the
connector is deactivated. Within this loop, the connector first collects real-time data on its
interactions. Simultaneously, it integrates both external threat intelligence and insights from
internal monitoring logs to comprehensively update the threat model. As the loop continues,
for each type of interaction that the connector facilitates, it is important to assess whether
the existing security policies adequately mitigate the identified risks. This approach involves
strengthening authentication protocols, refining access controls, and bolstering data encryption
to counteract the assessed threats. Finally after implementing the necessary adjustments, these
updated policies are enforced in real time. This proactive and adaptive approach ensures the
connectors are secured against evolving threats throughout their operational life.</p>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>7. Summary and Conclusions</title>
      <p>This paper focuses on the pressing need for methods of exchanging data that preserve privacy
and has shed light on the emerging paradigm of dataspaces. These innovative ecosystems allow
for the free flow of data among various parties, facilitating the establishment of domain-specific
data markets that ofer novel solutions for stakeholders in industry, research, and institutions.
Among the primary contributions, the work addressed the definition, requirements, and
privacypreserving techniques of the dataspace. Then, the most significant European initiatives focusing
on dataspaces utilization and contribution to security were presented. Finally, a real-world
case study was shown, to demonstrate the practical applications, the potential benefits, and
the challenges associated with the adoption of this paradigm. The present research highlights
the significant opportunities ofered by data sovereignty in improving data exchange across
various sectors. However, realizing its full potential requires a thorough understanding of
its operational dynamics and security measures, to ensure stakeholders fully comprehend its
benefits. By promoting understanding and facilitating the adoption of this paradigm, steps
forward can be made toward secure and eficient data exchange, with a focus on individual and
organizational data rights.</p>
    </sec>
    <sec id="sec-9">
      <title>Acknowledgments</title>
      <p>This research has received funding from the European Union’s Horizon 2020 research and
innovation programme under grant agreement No 101020560 CyberSEAS. The content of this
publication reflects the opinion of its authors and does not, in any way, represent the opinions
of the European Union. The European Commission is not responsible for any use that may be
made of the information that this publication contains.</p>
      <p>This work has been also partially funded by the European Union under NextGenerationEU
PRIN 2022 Prot. n. 202297YF75 S2: Safe and Secure Industrial Internet of Things. Views and
opinions expressed are however those of the author(s) only and do not necessarily reflect those
of the European Union or European Commission. Neither the European Union nor the granting
authority can be held responsible for them.
[18] Open DEI, Position paper: Design principles for data spaces,
2022. URL: https://www.opendei.eu/wp-content/uploads/2022/03/
Position-Paper-Design-Principles-for-Data-Spaces.pdf, accessed: 2024-02-26.
[19] European Commission, European Data Spaces, Technical Report, Publications Ofice of
the European Union, 2023. URL: https://op.europa.eu/en/publication-detail/-/publication/
dcac6aee-0e7a-11ee-b12e-01aa75ed71a1/language-en, accessed: 2024-02-26.
[20] European Commission, Data Spaces, 2024. URL: https://digital-strategy.ec.europa.eu/en/
policies/data-spaces, accessed: 2024-02-26.
[21] L. Coppolino, R. Nardone, A. Petruolo, L. Romano, Securing fiware with tee technology, in:
New Trends in Intelligent Software Methodologies, Tools and Techniques: Proceedings of
the 22nd International Conference on New Trends in Intelligent Software Methodologies,
Tools and Techniques (SoMeT_23), volume 371, IOS Press, 2023, p. 149.
[22] E. Union, Commission staf working document on common european data
spaces, 2020. URL: https://op.europa.eu/en/publication-detail/-/publication/
dcac6aee-0e7a-11ee-b12e-01aa75ed71a1/language-en, retrieved from
https://op.europa.eu/.
[23] International Data Spaces, 2024. URL: https://internationaldataspaces.org/.
[24] I. D. S. Association, International data spaces reference architecture model (ids-ram) 4.0,
2023. URL: https://github.com/International-Data-Spaces-Association/IDS-RAM_4_0.
[25] M. A. Camilleri, The use of data-driven technologies for customer-centric marketing,</p>
      <p>International Journal of Big Data Management 1 (2020) 50–63.
[26] Á. Alonso, A. Pozo, J. M. Cantera, F. De la Vega, J. J. Hierro, Industrial data space architecture
implementation using fiware, Sensors 18 (2018) 2226.
[27] L. Coppolino, R. Nardone, A. Petruolo, L. Romano, Building cyber-resilient smart grids
with digital twins and data spaces, Applied Sciences 13 (2023) 13060.
[28] Enershare, Enershare | the energy data space for europe, 2024. URL: https://enershare.eu/.
[29] CyberSEAS | Cyber Securing Energy dAta Services, 2024. URL: https://cyberseas.eu/.
[30] V. Janev, M. E. Vidal, K. Endris, D. Pujic, Managing knowledge in energy data spaces, in:</p>
      <p>Companion Proceedings of the Web Conference 2021, 2021, pp. 7–15.
[31] E. Curry, S. Hasan, S. O’Riain, Enterprise energy management using a linked dataspace for
energy intelligence, in: 2012 Sustainable Internet and ICT for Sustainability (SustainIT),
2012, pp. 1–6.
[32] L. Coppolino, R. Nardone, A. Petruolo, L. Romano, A. Souvent, Exploiting digital twin
technology for cybersecurity monitoring in smart grids, in: Proceedings of the 18th
International Conference on Availability, Reliability and Security, 2023, pp. 1–10.
[33] S. Meneguzzo, A. Favenza, V. Gatteschi, C. Schifanella, Integrating a dlt-based data
marketplace with idsa for a unified energy dataspace: Towards silo-free energy data
exchange within gaia-x, in: 2023 5th Conference on Blockchain Research &amp; Applications
for Innovative Networks and Services (BRAINS), IEEE, 2023, pp. 1–2.
[34] M. Uslar, M. Specht, S. Rohjans, J. Trefke, J. M. González, The Common Information Model
CIM: IEC 61968/61970 and 62325-A practical introduction to the CIM, Springer Science &amp;
Business Media, 2012.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>C.</given-names>
            <surname>Acciarini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Cappa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Boccardelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Oriani</surname>
          </string-name>
          ,
          <article-title>How can organizations leverage big data to innovate their business models? A systematic literature review</article-title>
          ,
          <source>Technovation</source>
          <volume>123</volume>
          (
          <year>2023</year>
          )
          <fpage>102713</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S.</given-names>
            <surname>Bose</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Dey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Bhattacharjee</surname>
          </string-name>
          ,
          <article-title>Big data, data analytics and artificial intelligence in accounting: An overview</article-title>
          ,
          <source>Handbook of Big Data Research Methods: 0</source>
          (
          <year>2023</year>
          )
          <fpage>32</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>B.</given-names>
            <surname>Otto</surname>
          </string-name>
          ,
          <article-title>A federated infrastructure for european data spaces</article-title>
          ,
          <source>Communications of the ACM</source>
          <volume>65</volume>
          (
          <year>2022</year>
          )
          <fpage>44</fpage>
          -
          <lpage>45</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>B.</given-names>
            <surname>Otto</surname>
          </string-name>
          , M. ten
          <string-name>
            <surname>Hompel</surname>
          </string-name>
          , S. Wrobel, Designing Data Spaces: The Ecosystem Approach to Competitive Advantage, Springer Nature,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M.</given-names>
            <surname>Huber</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Wessel</surname>
          </string-name>
          , G. Brost,
          <string-name>
            <given-names>N.</given-names>
            <surname>Menz</surname>
          </string-name>
          ,
          <article-title>Building trust in data spaces, Designing Data Spaces (</article-title>
          <year>2022</year>
          )
          <fpage>147</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>P.</given-names>
            <surname>Hummel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Braun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Tretter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Dabrock</surname>
          </string-name>
          ,
          <article-title>Data sovereignty: A review</article-title>
          ,
          <source>Big Data &amp; Society</source>
          <volume>8</volume>
          (
          <year>2021</year>
          )
          <fpage>2053951720982012</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>I.</given-names>
            <surname>Makhdoom</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Abolhasan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Lipman</surname>
          </string-name>
          , W. Ni,
          <article-title>Privysharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities</article-title>
          ,
          <source>Computers &amp; Security</source>
          <volume>88</volume>
          (
          <year>2020</year>
          )
          <fpage>101653</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>B.</given-names>
            <surname>Le Nguyen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. L.</given-names>
            <surname>Lydia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Elhoseny</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Pustokhina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. A.</given-names>
            <surname>Pustokhin</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. M. Selim</surname>
            ,
            <given-names>G. N.</given-names>
          </string-name>
          <string-name>
            <surname>Nguyen</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Shankar</surname>
          </string-name>
          ,
          <article-title>Privacy preserving blockchain technique to achieve secure and reliable sharing of iot data</article-title>
          ,
          <source>Computers, Materials &amp; Continua</source>
          <volume>65</volume>
          (
          <year>2020</year>
          )
          <fpage>87</fpage>
          -
          <lpage>107</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>F.</given-names>
            <surname>Buccafurri</surname>
          </string-name>
          , V. De Angelis,
          <string-name>
            <given-names>M. F.</given-names>
            <surname>Idone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Labrini</surname>
          </string-name>
          ,
          <article-title>A protocol for anonymous short communications in social networks and its application to proximity-based services</article-title>
          ,
          <source>Online Social Networks and Media</source>
          <volume>31</volume>
          (
          <year>2022</year>
          )
          <article-title>100221</article-title>
          . URL: https://www.sciencedirect.com/science/ article/pii/S2468696422000258. doi:https://doi.org/10.1016/j.osnem.
          <year>2022</year>
          .
          <volume>100221</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>L.</given-names>
            <surname>Tan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Shi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Wei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Lu</surname>
          </string-name>
          ,
          <article-title>Towards secure and privacy-preserving data sharing for covid-19 medical records: A blockchain-empowered approach</article-title>
          ,
          <source>IEEE Transactions on Network Science and Engineering</source>
          <volume>9</volume>
          (
          <year>2021</year>
          )
          <fpage>271</fpage>
          -
          <lpage>281</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>J.</given-names>
            <surname>Sun</surname>
          </string-name>
          , G. Xu,
          <string-name>
            <given-names>T.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , H. Xiong,
          <string-name>
            <given-names>H.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. H.</given-names>
            <surname>Deng</surname>
          </string-name>
          ,
          <article-title>Share your data carefree: An eficient, scalable and privacy-preserving data sharing service in cloud computing</article-title>
          ,
          <source>IEEE Transactions on Cloud Computing</source>
          <volume>11</volume>
          (
          <year>2021</year>
          )
          <fpage>822</fpage>
          -
          <lpage>838</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>X.</given-names>
            <surname>Zheng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Cai</surname>
          </string-name>
          ,
          <article-title>Privacy-preserved data sharing towards multiple parties in industrial iots</article-title>
          ,
          <source>IEEE Journal on Selected Areas in Communications</source>
          <volume>38</volume>
          (
          <year>2020</year>
          )
          <fpage>968</fpage>
          -
          <lpage>979</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>L.</given-names>
            <surname>Coppolino</surname>
          </string-name>
          , S. D'Antonio,
          <string-name>
            <given-names>R.</given-names>
            <surname>Nardone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Romano</surname>
          </string-name>
          ,
          <article-title>A self-adaptation-based approach to resilience improvement of complex internets of utility systems</article-title>
          ,
          <source>Environment Systems and Decisions</source>
          <volume>43</volume>
          (
          <year>2023</year>
          )
          <fpage>708</fpage>
          -
          <lpage>720</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>F.</given-names>
            <surname>Buccafurri</surname>
          </string-name>
          , V. de Angelis, S. Lazzaro,
          <article-title>Mqtt-a: A broker-bridging p2p architecture to achieve anonymity in mqtt</article-title>
          ,
          <source>IEEE Internet of Things Journal</source>
          <volume>10</volume>
          (
          <year>2023</year>
          )
          <fpage>15443</fpage>
          -
          <lpage>15463</lpage>
          . doi:
          <volume>10</volume>
          .1109/JIOT.
          <year>2023</year>
          .
          <volume>3264019</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>L.</given-names>
            <surname>Coppolino</surname>
          </string-name>
          , S. D'Antonio, G. Mazzeo,
          <string-name>
            <given-names>L.</given-names>
            <surname>Romano</surname>
          </string-name>
          , L. Sgaglione, Prisiem:
          <article-title>Enabling privacypreserving managed security services</article-title>
          ,
          <source>Journal of network and computer applications 203</source>
          (
          <year>2022</year>
          )
          <fpage>103397</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>L.</given-names>
            <surname>Coppolino</surname>
          </string-name>
          , S. D'Antonio,
          <string-name>
            <given-names>V.</given-names>
            <surname>Giuliano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Mazzeo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Romano</surname>
          </string-name>
          ,
          <article-title>A framework for sevesocompliant cyber-physical security testing in sensitive industrial plants</article-title>
          ,
          <source>Computers in Industry</source>
          <volume>136</volume>
          (
          <year>2022</year>
          )
          <fpage>103589</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Gaia-X Hub</surname>
          </string-name>
          ,
          <article-title>White paper: What is a data space?</article-title>
          ,
          <year>2022</year>
          . URL: https://gaia-x-hub.de/ wp-content/uploads/2022/10/White_Paper_Definition_Dataspace_EN.pdf, accessed:
          <fpage>2024</fpage>
          - 02-26.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>