<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Data-Sovereign Enterprise Collaboration using the Solid Protocol</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Thorsten Kastner</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Christoph H.-J. Braun</string-name>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andreas Both</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dustin Yeboah</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sebastian J. Schmid</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Daniel Schraudner</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tobias Käfer</string-name>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andreas Harth</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>DATEV eG</institution>
          ,
          <addr-line>Nuremberg</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Fraunhofer Institute for Integrated Circuits IIS, Division Data Spaces and IoT Solutions</institution>
          ,
          <addr-line>Nuremberg</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Friedrich-Alexander University (FAU)</institution>
          ,
          <addr-line>Nuremberg</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Karlsruhe Institute of Technology (KIT)</institution>
          ,
          <addr-line>Karlsruhe</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>Leipzig University of Applied Sciences</institution>
          ,
          <addr-line>Leipzig</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>We demonstrate a system architecture for seamless and sovereign business-to-business (B2B) data sharing using the Solid Protocol. We highlight two core system components: The Rights Delegation Proxy allows organizations to internally manage and enforce access policies on requests from their employees to external data providers. The Data Provision Proxy allows organizations to share data from an external data provider in a privacy-preserving manner. Organizations define and enforce the policies for internal and external data sharing themselves, thereby maintaining sovereignty in enterprise collaboration.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Solid Protocol</kwd>
        <kwd>Dataspaces</kwd>
        <kwd>Data Value Chains</kwd>
        <kwd>Zero Trust</kwd>
        <kwd>Data Sovereignty</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        In today’s connected world, data sharing between enterprises and among organizations is
commonplace. Both providing and consuming businesses benefit from sharing data in
collaboration. In their data-sharing processes, today’s businesses often rely on centralized platforms or
ad-hoc solutions like email attachments. As the requirements of data sovereignty, security, and
separation of data and application [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] become more pressing, endeavors like the International
Dataspaces (IDS)1 or Solid Dataspaces (SDS) [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] are gaining momentum.
      </p>
      <p>
        Building on the SDS approach, we present a system for sovereign data sharing along a chain
of enterprises. We implement a use case for credit requests, where an enterprise requests a
credit from a bank and is required to provide data made available by the enterprise’s tax advisor.
Only the directly communicating actors know each other, so the origin of data passed on must
remain hidden while data is still processed along the business chain. In our solution, the data is
not stored as a hard copy for each participant. Instead, data from the original source is passed
along to involved parties on-demand if access is granted. The party owning the data source is
in control of data access and – we assume here – has permitted re-distribution according to
contractually defined purposes. We thus present an implementation of a data value chain [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>Lisa (Bank Clerk)
Acts on behalf of the bank</p>
      <p>Processes credit
requests</p>
      <p>SME requests credit offer</p>
      <p>Bank requests business
BigBank prreopvoidrtefsoorffcerrebdaitsoefdfeor,n SME
report</p>
      <p>Tom (Employee)
Acts on behalf of SME</p>
      <p>Applies for a credit
for the compamy</p>
      <p>SME mandates TAO
TAO prepares business
reports</p>
      <p>TAO</p>
      <p>Max (Tax advisor)
Acts on behalf of TAO
prepares tax returns,
bookkeeping,
business reports</p>
      <p>
        In this paper, we highlight the core components of our demonstrator: a Rights Delegation
Proxy (RDP) [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] to handle the actions of natural persons on behalf of legal entities, and a Data
Provision Proxy (DPP) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] to requests to concealed locations along the chain. Our contribution is
the demonstration of a Solid-based system for sovereign B2B data sharing.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Use Case</title>
    </sec>
    <sec id="sec-3">
      <title>3. Related Work</title>
      <p>The Solid Protocol is a bundle of specifications for read/write Linked Data under access control.
The protocol builds on the RESTful HTTP specification of a Linked Data Platform (LDP) 2 for
interacting with Web resources, and extends it with authentication and authorization using an
extended version of OpenID Connect3 and Web Access Control4.</p>
      <p>
        For handling the delegation of rights by real-world businesses, government-managed registers
of commerce are used. Companies publicly and lawfully declare which individuals may act and
negotiate on their behalf; see the German Commercial Register5 for example. In cyberspace,
the long-standing vision of dataspaces aims to integrate diferent data sources [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]: Top-down
approaches like the International Data Space (IDS)6 or GAIA-X7 aim for sovereign data exchange
using governance models and standardized data exchange components. From a bottom-up
      </p>
      <sec id="sec-3-1">
        <title>2https://www.w3.org/TR/ldp/</title>
        <p>3https://solidproject.org/TR/oidc
4https://solid.github.io/web-access-control-spec/
5https://www.handelsregister.de/
6https://github.com/International-Data-Spaces-Association/IDS-RAM_4_0
7https://docs.gaia-x.eu/technical-committee/architecture-document/22.04/
forward
RDP
forward
DPP</p>
        <p>
          Frontend
Backend
perspective, Meckler et al. [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] identifies the Solid Protocol 8 as one technological foundation for
decentralized yet interoperable dataspaces, named Solid Dataspaces (SDS).
        </p>
        <p>
          For data exchange between collaborating enterprises, Henselmann et al. [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] present a
Solidbased solution in a credit request scenario similar to ours. While their solution passes data along
a chain of participants, their system relies on hard copies of data to be stored at each participant
and does not include natural persons as actors for legal entities. In a machine-to-machine
interaction use case, Wang et al. [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] present rule-based agents that negotiate a trade contract
under German law using the Solid Protocol. In contrast to our approach, decision-making is
automated and all participants, their needs, and data are known.
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Demonstrator</title>
      <p>Our demonstrator910 is composed of the following components for each company (see Fig. 2):</p>
      <p>
        Solid Business Web Apps enable the employees to carry out their business activities. For the
example of SME, the initiation of a credit inquiry, the provision of the business reports requested
by the bank to prepare a credit ofer, and the approval of the Bank’s credit ofer. In addition, an
authorization application, as described in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], is used to manage incoming, existing, rejected,
and revoked requests for data sharing. A Company’s Solid Pod stores the company’s business
data and makes it available under access control. Notably, it also contains rights delegation
policies, i.e., rules that define which specific employees are allowed to interact internally and
externally on behalf of the company. Further, it contains definitions for resources that are made
available via proxied data provision. A Rights Delegation Proxy (RDP), as described in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ],
receives and logs requests made by the company’s employee (e.g., Tom). It authenticates the
employee using their WebId and checks if they were delegated the required rights to proceed
      </p>
      <sec id="sec-4-1">
        <title>8https://solidproject.org/TR/protocol</title>
        <p>
          9https://github.com/mandat-project/hackathon-demo
10https://github.com/mandat-project/delegation-proxy
with their request. To this end, the RDP retrieves and validates corresponding policies defined
by the delegator (SME) from their Pod. If all requirements are fulfilled, the RDP proceeds with
the delegatee’s request but updates the authentication headers with the delegator’s credentials.
Any received response is logged and forwarded to the delegatee. A Data Provision Proxy
(DPP), as envisioned in [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ], receives all data requests (e.g., from Lisa on behalf of BigBank) and
checks on the Pod whether the requested resource is an actual Pod-stored resource or to be
retrieved and passed along from an external data source. That is, it validates if the company’s
own data (SME) or data from a third party (TAO shared with SME) is requested. If the requested
data originate from a third party, the DPP checks the sharing policy of the third party. If allowed,
the DPP retrieves the resource (authenticated as SME) and provides it as if originating from the
company (SME), masking the original data source (TAO).
        </p>
        <p>A walk-through of our demonstrator:
1. Lisa logs in to the business Web App using her own WebID. To retrieve the accounting
data on the SME’s Pod, she sends an authenticated request to the RDP of BigBank.
2. The BigBank RDP authenticates Lisa and checks if she is authorized by the bank’s policies
to interact with SME. Then it requests the resource from SME, authenticated as BigBank.
3. The SME DPP receives the authenticated request coming from BigBank to access the
accounting data. It checks whether the requested resource is an actual Pod-stored resource
or an external one to be forwarded. Additionally, it checks if re-distribution is allowed.
4. On pass, the SME DPP performs an authenticated request as SME for the TAO’s data.
5. The TAO DPP receives an authenticated request from SME to the resource containing
the accounting data. As this resource is an actual Pod-stored resource, the request is
forwarded. The Pod checks access control rules and returns the data via the proxy.
6. The SME DPP receives the response, logs it, and responds to the request of BigBank.
7. The BigBank RDP receives the response from SME and forwards it to Lisa’s app.
A screencast of our demonstrator is available online11.</p>
        <p>Fulfillment of requirements:
Our system demonstrates how the requirements defined in Sec. 2 can be met:
A: BigBank and TAO are not disclosed to each other while Lisa (i.e., BigBank) still receives
the desired data. SME and its RDP are acting as a broker facilitating the data sharing.
B: The accounting data remains stored on TAO’s Pod and in its control, without hard copies
being necessary at the SME’s Pod.</p>
        <p>Additionally, we highlight the following features of our approach:
• The data value chain could also continue further by the TAO without the SME knowing
the additional upstream participants.
• The existence of participants is secret and only revealed on a “need to know”-basis.</p>
        <p>The existence of upstream or downstream business participants is obfuscated. Acting
employees also remain private as their actions are attributed to the respective company.
11https://purl.archive.org/mandatb2b/Semantics2024
• Policies for data access and re-use specify relations between two agents, e.g., the internal
relation of Lisa and BigBank or the external relation of SME and TAO. The policies and
thus the existence of these bilateral relations remain only known to the involved agents.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusions and Future Work</title>
      <p>In this paper, we presented a Solid-based system for sovereign data sharing between enterprises.
Our main contribution is the demonstration of a data value chain that respects the privacy
and data sovereignty of its participants. We emphasize that our demonstrator is comprised of
reusable components based on Web standards and the Solid Protocol to build a Solid Dataspace.
We highlighted the Rights Delegation Proxy (RDP), to let natural persons acting on behalf
of their companies, and the Data Provision Proxy (DPP), to retrieve data from upstream data
sources. We re-iterate that both of these components are built using the same Semantic Web
standards and specifications as the rest our demonstrator.</p>
      <p>In future work, we plan to address the process of interactively initiating a B2B collaboration
while also protecting the currently often publicly accessible metadata of the involved enterprises.
Acknowledgments This work has been supported in part by the German ministry BMBF
under grant 16DTM107B (MANDAT ).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.</given-names>
            <surname>Franklin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Halevy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Maier</surname>
          </string-name>
          ,
          <article-title>From databases to dataspaces: a new abstraction for information management</article-title>
          ,
          <source>SIGMOD Rec</source>
          .
          <volume>34</volume>
          (
          <year>2005</year>
          )
          <fpage>27</fpage>
          -
          <lpage>33</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S.</given-names>
            <surname>Meckler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Dorsch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Henselmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Harth</surname>
          </string-name>
          ,
          <article-title>The Web and Linked Data as a Solid Foundation for Dataspaces</article-title>
          ,
          <source>in: Companion Proceedings of the ACM Web Conference</source>
          <year>2023</year>
          , WWW '23 Companion, Association for Computing Machinery,
          <year>2023</year>
          , p.
          <fpage>1440</fpage>
          -
          <lpage>1446</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A.</given-names>
            <surname>Both</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Yeboah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Kastner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Schraudner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Schmid</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Braun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Harth</surname>
          </string-name>
          , T. Käfer,
          <article-title>Towards Solid-based B2B Data Value Chains</article-title>
          ,
          <source>in: 21st Extended Semantic Web Conference (ESWC</source>
          <year>2024</year>
          ),
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>Schmid</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Schraudner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Harth</surname>
          </string-name>
          ,
          <article-title>The Rights Delegation Proxy: An Approach for Delegations in the Solid Dataspace</article-title>
          , in: Proceedings of the Second International Workshop on Semantics in
          <source>Dataspaces (SDS</source>
          <year>2024</year>
          )
          <article-title>co-located with the 21st Extended Semantic Web Conference (ESWC</article-title>
          <year>2024</year>
          ),
          <year>2024</year>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3705</volume>
          /paper02.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>D.</given-names>
            <surname>Henselmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Kolinsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. J.</given-names>
            <surname>Schmid</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Schraudner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Both</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Harth</surname>
          </string-name>
          ,
          <article-title>Solid Proof of Concept in an Enterprise Loan Request Use Case</article-title>
          ,
          <source>in: Proceedings of Poster and Demo Track and Workshop Track of the 18th International Conference on Semantic Systems (SEMANTiCS</source>
          <year>2022</year>
          ), volume
          <volume>3235</volume>
          ,
          <string-name>
            <surname>CEUR-WS</surname>
          </string-name>
          ,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>X.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <surname>C. H.-J. Braun</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Both</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Käfer</surname>
          </string-name>
          ,
          <article-title>Using schema.org and solid for linked data-based machine-to-machine sales contract conclusion</article-title>
          ,
          <source>in: Companion Proceedings of the Web Conference</source>
          <year>2022</year>
          , WWW '22,
          <string-name>
            <surname>Association</surname>
          </string-name>
          for Computing Machinery,
          <year>2022</year>
          , p.
          <fpage>269</fpage>
          -
          <lpage>272</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A.</given-names>
            <surname>Both</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Kastner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Yeboah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Braun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Schraudner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Schmid</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Käfer</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Harth, AuthApp - Portable,
          <article-title>Reusable Solid App for GDPR-compliant Access Granting</article-title>
          , in: International Conference on Web Engineering (ICWE
          <year>2024</year>
          ),
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>