
A European initiative to develop a federated data infrastructure ensuring data sovereignty and compliance with EU values.
Promotes a standard for data sovereignty and data exchange, defining the reference architecture for International Data Spaces (IDS).
Information System Authority (RIA) - X-Road
Estonia · Government Agency
The Estonian government agency managing X-Road, a centrally managed distributed data exchange layer between information systems.
Works with companies and governments to build an open, trustworthy data ecosystem, pioneering concepts like Data Trusts.
An open data ecosystem for the automotive industry to create a uniform standard for information and data sharing.
Provides a platform for secure data collaboration using Homomorphic Encryption.
Pioneered the use of Homomorphic Encryption for 'Data in Use' security, allowing secure search over encrypted data.
Open-source cryptography company building state-of-the-art Fully Homomorphic Encryption (FHE) tools and libraries.
Secret Computing company using Multi-Party Computation and FHE for privacy-preserving analytics.
Research institution focusing on the intersection of technology and society, specifically advocating for data stewardship and community data rights.
Provides data clean rooms powered by confidential computing to enable secure data collaboration and model training.
In an era where geopolitical tensions and systemic risks increasingly depend on information asymmetries, the ability to share sensitive strategic data across borders and institutions has become a critical capability. Trusted Data-Trust Infrastructures address the fundamental challenge of enabling collaborative intelligence and risk assessment while maintaining sovereignty, security, and regulatory compliance. These frameworks combine cryptographic secure enclaves—isolated computing environments that protect data even from system administrators—with federated identity management and programmable governance protocols. At the technical layer, they employ techniques such as confidential computing, homomorphic encryption, and secure multi-party computation to ensure that sensitive datasets can be analysed collectively without exposing raw information to any single party. Access control mechanisms are embedded directly into the infrastructure, allowing data contributors to define granular permissions, audit trails, and automatic revocation triggers. This architecture enables scenarios where intelligence agencies, critical infrastructure operators, or financial regulators can pool threat indicators, supply chain vulnerabilities, or market manipulation signals while maintaining strict compartmentalization and attribution controls.
The strategic value of these infrastructures lies in their ability to overcome the trust deficit that has historically prevented meaningful data collaboration on systemic risks. Traditional information-sharing arrangements often fail because participants fear losing control over sensitive assets, exposing operational capabilities, or violating domestic regulations. Trusted Data-Trust Infrastructures solve this by making governance transparent and enforceable through technical means rather than relying solely on legal agreements. For allied nations coordinating on cyber defence, this means being able to correlate attack patterns and adversary tactics without revealing specific intelligence sources or methods. For regulated industries facing cross-border threats—such as financial crime networks or critical supply chain disruptions—these frameworks enable collective defence mechanisms that would be impossible under conventional data-sharing models. The infrastructure also addresses the challenge of asymmetric contributions, where smaller participants may hesitate to share data with larger partners who could exploit the relationship; programmable rules ensure reciprocity and prevent data hoarding.
Early implementations are emerging within defence and intelligence communities, where NATO allies and Five Eyes partners are piloting secure enclaves for sharing cyber threat intelligence and adversary infrastructure mapping. Financial regulators in multiple jurisdictions are exploring similar frameworks to detect cross-border money laundering and sanctions evasion without compromising individual institutions' proprietary risk models. As geopolitical fragmentation accelerates and systemic risks become more interconnected, these infrastructures represent a critical evolution in how states and strategic actors manage collective security challenges. The technology aligns with broader trends toward data sovereignty and zero-trust architectures, offering a pathway for maintaining collaborative capabilities even as traditional alliance structures face strain. Future development will likely focus on standardizing governance protocols, expanding participation beyond traditional security communities, and integrating real-time analytics capabilities that can detect emerging threats across federated datasets while preserving the fundamental principle of controlled, revocable access.