Implementing Digital Sovereignty to Accelerate Smarter Mobility Solutions in Local Communities
Abstract
Highlights
- Develop an approach that enables digital sovereignty while providing innovative mobility services and applications to citizens.
- Explore how to maintain digital sovereignty to improve urban mobility services in local communities.
- Propose a policy framework to improve sovereign data usage control for citizens.
- Support business operations for mobility service providers and also increase data autonomy, trust, and transparency for citizens.
- Based on grounded theory and a literature review, this study explores the factors that influence digital sovereignty from local communities’ point of view.
Abstract
1. Introduction
- How can we empower citizens’ sovereign control over their data, enabling granular access control and thereby facilitating the sharing of data only with explicit consent?
- What factors influence self-sovereign sharing of citizens’ data to improve urban mobility solutions in local communities?
2. Theoretical Background
2.1. Overview of Digital Sovereignty in Europe
2.2. Digital Sovereignty in Local Communities
3. Methodology
3.1. Research Method and Procedures
3.2. Grounded Theory Approach
4. Findings
4.1. Digital Sovereignty from Political Levels to Societal Context
4.2. Relevant Institutional Data Polices Related to Digital Sovereignty in Europe
4.2.1. The EU Data Strategy
4.2.2. Data Governance Act
4.3. Digital Sovereignty for Self-Sovereignty in Local Communities
Taxonomies of Digital Sovereignty
- Software sovereignty involves the ability of individuals to be able to manage unexpected events that necessitate them to momentarily change where their capabilities are deployed, and it also involves to what extent external connections are allowed to have access to workloads via open Application Programming Interfaces (APIs) and services. In summary, software sovereignty enables control, such as in platforms that enable individuals to manage services across different providers and orchestration tooling environments that support individuals to deploy APIs that can be connected to platforms running on different software providers, comprising open-source alternatives and proprietary cloud-based [40]. The need to control the accessibility of workloads (applications running) and to execute software modules with autonomy wherever an individual wants without being reliant on or locked into particular software as a service (cloud provider) has progressively increased. In the context of this study, a workload is usually any application or program that runs on a computer. It can be seen as any capability or service that utilizes cloud-based resources.
- Operational Sovereignty is based on the sector that a citizen functions in, as there might be a requirement for further control of the technologies deployed to provide services. With these possibilities, the citizens can benefit from different degrees of functionality across the digital sphere while maintaining control similar to that enjoyed in a traditional physical environment. Examples of these control mechanisms include constraining the implementation of new resources to detailed service providers in some regions and restraining user access based on predefined features, such as limiting operations based on a geographic location [40].
- Data sovereignty is concerned with the legal assertion that digital information is in line with the rules, regulations, and governance structures of the territory where it is collected, analyzed, processed, and stored. Data sovereignty requires that individuals and organizations exercise total control, supervision, and protection of their data in accordance with the relevant regulatory and legal framework. Researchers, such as Falcão et al. [41], define data sovereignty based on three viewpoints: data usage only with consent, data portability, which involves the prospect of moving data across systems, and transparency regarding the lifecycle of data. Data sovereignty has become a crucial factor that highlights the need to adhere to local privacy, compliance, and security requirements when transferring and handling data across international borders.
- Data sovereignty goes beyond formal institutional structures and involves different modes of governance, involving informal mechanisms that prioritize digital rights and specific cultural contexts [42]. In the context of this study, data sovereignty enables citizens with a mechanism that limits mobility service providers from retrieving their personal data unless citizens plainly approve access for limited providers. Examples of such controls that citizens can initiate include generating, managing, and storing encryption keys in an external location and giving citizens the autonomy to only grant access to their data via these keys to protect data-in-use. These controls allow citizens to be the main arbiters of access to their personal data [40].
4.4. Data Spaces as Enablers of Digital Sovereignty
4.5. Data Usage Control and Access for Digital Sovereignty
Data Usage Control and Access Schemes in Data Spaces
4.6. Developed Policy Framework
4.6.1. Technological Factors
4.6.2. Social Factors
4.6.3. Organizational Factors
5. Discussion and Implications of the Study
5.1. Discussion
5.2. Theoretical Implications
5.3. Practical Implications
6. Conclusions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Jansen, B.; Kadenko, N.; Broeders, D.; van Eeten, M.; Borgolte, K.; Fiebig, T. Pushing boundaries: An empirical view on the digital sovereignty of six governments in the midst of geopolitical tensions. Gov. Inf. Q. 2023, 40, 101862. [Google Scholar] [CrossRef]
- Bria, F. Building Digital Cities from the Ground Up Based Around Data Sovereignty and Participatory Democracy: The Case of Barcelona; Barcelona Centre for International Affairs: Barcelona, Spain, 2019. [Google Scholar]
- Chander, A.; Sun, H. Sovereignty 2.0. Vand. J. Transnat’l L. 2022, 55, 283. [Google Scholar] [CrossRef]
- Yaodong, T.; Shuai, Y.; Ge, H. Comparative Study on Data Sovereignty Guarantee Technology. In Proceedings of the 2022 IEEE 13th International Symposium on Parallel Architectures, Algorithms and Programming (PAAP), Beijing, China, 25–27 November 2022. [Google Scholar]
- Niestadt, M.; Reichert, J. The Global Reach of the EU’s Approach to Digital Transformation. EPRS|European Parliamentary Research Service. 2024. Available online: https://www.europarl.europa.eu/RegData/etudes/BRIE/2024/757632/EPRS_BRI(2024)757632_EN.pdf (accessed on 19 June 2025).
- Scheider, S.; Lauf, F.; Möller, F.; Otto, B. A Reference System Architecture with Data Sovereignty for Human-Centric Data Ecosystems. Bus. Inf. Syst. Eng. 2023, 65, 577–595. [Google Scholar] [CrossRef]
- Montero-Pascual, J.J.; Finger, M.; De Abreu Duarte, F.M. Creating a Common European Mobility Data Space; European University Institute: Florence, Italy, 2023. [Google Scholar]
- Firdausy, D.R.; Silva, P.D.A.; Van Sinderen, M.; Iacob, M.E. Towards a reference enterprise architecture to enforce digital sovereignty in international data spaces. In Proceedings of the 2022 IEEE 24th Conference on Business Informatics (CBI), Amsterdam, Netherlands, 15–17 June 2022; IEEE: Piscataway, NJ, USA, 2022; Volume 1, pp. 117–125. [Google Scholar]
- Balan, A.; Tan, A.G.; Kourtit, K.; Nijkamp, P. Data-Driven Intelligent Platforms—Design of Self-Sovereign Data Trust Systems. Land 2023, 12, 1224. [Google Scholar] [CrossRef]
- European Commission A Digital Single Market Strategy for Europe. Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions. 2015. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52015DC0192 (accessed on 19 June 2025).
- European Commission. Towards a Common European Data Space. Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions, COM (2018) 232 Final, S.1. 2018. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52018DC0232 (accessed on 19 June 2025).
- Lohmöller, J.; Pennekamp, J.; Matzutt, R.; Wehrle, K. On the need for strong sovereignty in data ecosystems. In Proceedings of the First International Workshop on Data Ecosystems (DEco’22), Sydney, Australia, 5 September 2022. [Google Scholar]
- Jnr, B.A. Leveraging Distributed Ledger Technologies for Shared Seamless Electric Mobility-as-a-Service to Im-prove Sustainable Public Transportation in Smart Cities. Sustain. Futures 2025, 9, 100757. [Google Scholar] [CrossRef]
- Stockburger, L.; Kokosioulis, G.; Mukkamala, A.; Mukkamala, R.R.; Avital, M. Blockchain-enabled decentralized identity management: The case of self-sovereign identity in public transportation. Blockchain Res. Appl. 2021, 2, 100014. [Google Scholar] [CrossRef]
- Hellmeier, M.; von Scherenberg, F. A Delimitation of Data Sovereignty from Digital and Technological Sovereignty. In Proceedings of the Thirty-First European Conference on Information Systems (ECIS 2023), Kristiansand, Norway, 11–16 June 2023. [Google Scholar]
- Jnr, B.A.; Sarshar, S. Enhancing Data Sovereignty to Improve Intelligent Mobility Services in Smart Cities. Urban Gov. 2025, 5, 20–31. [Google Scholar] [CrossRef]
- Tan, K.L.; Chi, C.H.; Lam, K.Y. Analysis of digital sovereignty and identity: From digitization to digitalization. arXiv 2022, arXiv:2202.10069. [Google Scholar]
- Calzada, I. Postpandemic technopolitical democracy: Algorithmic nations, data sovereignty, digital rights, and data cooperatives. In Made-to-Measure Future(s) for Democracy? Views from the Basque Atalaia; Springer International Publishing: Cham, Switzerland, 2022; pp. 97–117. [Google Scholar]
- Johnson, P.A.; Scassa, T. Who owns the map? Data sovereignty and government spatial data collection, use, and dissemination. Trans. GIS 2023, 27, 275–289. [Google Scholar] [CrossRef]
- van de Ree, B. Data Producers’ Sovereignty an Exploration of Data Rights in Precision Agriculture Initiatives. Master’s Thesis, Eindhoven University of Technology, Eindhoven, The Netherlands, 2018. [Google Scholar]
- Esposito, C.; Castiglione, A.; Frattini, F.; Cinque, M.; Yang, Y.; Choo, K.-K.R. On data sovereignty in cloud-based computation offloading for smart cities applications. IEEE Internet Things J. 2018, 6, 4521–4535. [Google Scholar] [CrossRef]
- Altendeitering, M.; Pampus, J.; Larrinaga, F.; Legaristi, J.; Howar, F. Data sovereignty for AI pipelines: Lessons learned from an industrial project at Mondragon corporation. In Proceedings of the 1st International Conference on AI Engineering: Software Engineering for AI, Pittsburgh, PA, USA, 16–17 May 2022; pp. 193–204. [Google Scholar]
- Anthony, B., Jr. Decentralized brokered enabled ecosystem for data marketplace in smart cities towards a data sharing economy. Environ. Syst. Decis. 2023, 43, 453–471. [Google Scholar] [CrossRef]
- Bowen, J.; Hinze, A. Participatory data design: Managing data sovereignty in IoT solutions. Interact. Comput. 2022, 34, 60–71. [Google Scholar] [CrossRef]
- Larrinaga, F. Data Sovereignty-Requirements Analysis of Manufacturing Use Cases. 2022. Available online: https://internationaldataspaces.org/wp-content/uploads/IDSA-Position-Paper-Data-Sovereignty-Requirements-Analysis-of-Manufacturing-Use-Cases.pdf (accessed on 19 June 2025).
- Kitchenham, B. Procedures for Performing Systematic Reviews; Keele University: Keele, UK, 2004; Volume 33, pp. 1–26. [Google Scholar]
- Webster, J.; Watson, R.T. Analyzing the past to prepare for the future: Writing a literature review. MIS Q. 2002, 26, xiii–xxiii. [Google Scholar]
- Glaser, B.; Strauss, A. Discovery of Grounded Theory: Strategies for Qualitative Research; Routledge: Abingdon, UK, 2017. [Google Scholar]
- Charmaz, K. Constructing Grounded Theory: A Practical Guide through Qualitative Analysis; Sage: London, UK, 2006. [Google Scholar]
- Corbin, J.; Strauss, A. Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory; Sage Publications: Thousand Oaks, CA, USA, 2014. [Google Scholar]
- Cheung, A.S. From Data Subjects to Data Sovereigns: Addressing the Limits of Data Privacy in the Digital Era. In Digital Sovereignty; Chander, A., Sun, H., Eds.; Oxford University Press: Oxford, UK, 2022. [Google Scholar]
- Sharma, P.; Martin, M.; Swanlund, D. MapSafe: A complete tool for achieving geospatial data sovereignty. Trans. GIS 2023, 27, 1680–1698. [Google Scholar] [CrossRef]
- Jnr, B.A. Developing a decentralized community of practice-based model for on-demand electric car-pooling towards sustainable shared mobility. Case Stud. Transp. Policy 2024, 15, 101136. [Google Scholar]
- Ducuing, C.; Benmayor, A.; Dheu, O. RNE Data Study. 2022. Available online: https://rne.eu/wp-content/uploads/2022/12/KU-Leuven-RNE-data-study-March-2022-1.pdf (accessed on 19 June 2025).
- European Commission. Building a European Data Economy. Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions, COM (2017) 9 Final. 2017. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52017DC0009 (accessed on 19 June 2025).
- Duisberg, A. Legal Aspects of IDS: Data Sovereignty-What Does It Imply? In Designing Data Spaces; Springer: Cham, Switzerland, 2022; pp. 61–90. [Google Scholar]
- Foth, M.; Anastasiu, I.; Mann, M.; Mitchell, P. From automation to autonomy: Technological sovereignty for better data care in smart cities. In Automating Cities: Design, Construction, Operation and Future Impact; Springer: Singapore, 2021; pp. 319–343. [Google Scholar]
- Pretzsch, S.; Drees, H.; Rittershaus, L.; Langdon, C.S.; Lange, C.; Weiers, C. Mobility Data Space-Fraunhofer IVI. Secure Data Space For The Sovereign And Cross-Platform Utilization Of Mobility Data. 2021. Available online: https://www.ivi.fraunhofer.de/content/dam/ivi/en/documents/brochure/Mobility_Data_Space_2021_EN_web.pdf (accessed on 19 June 2025).
- Lauf, F.; Scheider, S.; Bartsch, J.; Herrmann, P.; Radic, M.; Rebbert, M.; Nemat, A.T.; Schlueter Langdon, C.; Konrad, R.; Sunyaev, A.; et al. Linking data sovereignty and data economy: Arising areas of tension. In Proceedings of the 17th International Conference on Wirtschaftsinformatik, Nuremberg, Germany, 21–23 February 2022. [Google Scholar]
- Holfelder, W.; Mayer, A.; Baumgart, T. Sovereign Cloud Technologies for Scalable Data Spaces. In Designing Data Spaces; Springer: Cham, Switzerland, 2022; pp. 419–436. [Google Scholar]
- Falcão, R.; Matar, R.; Rauch, B.; Elberzhager, F.; Koch, M. A Reference Architecture for Enabling Interoperability and Data Sovereignty in the Agricultural Data Space. Information 2023, 14, 197. [Google Scholar] [CrossRef]
- Bühler, M.M.; Calzada, I.; Cane, I.; Jelinek, T.; Kapoor, A.; Mannan, M.; Mehta, S.; Mookerje, V.; Nübel, K.; Pentland, A.; et al. Unlocking the power of digital commons: Data cooperatives as a pathway for data sovereign. Digital 2023, 3, 146–171. [Google Scholar] [CrossRef]
- Hummel, P.; Braun, M.; Dabrock, P. Own data? Ethical reflections on data ownership. Philos. Technol. 2020, 34, 545–572. [Google Scholar] [CrossRef]
- Hummel, P.; Braun, M.; Tretter, M.; Dabrock, P. Data sovereignty: A review. Big Data Soc. 2021, 8. [Google Scholar] [CrossRef]
- Anthony, B. Enabling Seamless Interoperability of Digital Systems in Smart Cities Using API: A Systematic Literature Review. J. Urban Technol. 2024, 31, 123–156. [Google Scholar] [CrossRef]
- Anthony, B., Jr. Data enabling digital ecosystem for sustainable shared electric mobility-as-a-service in smart cities-an innovative business model perspective. Res. Transp. Bus. Manag. 2023, 51, 101043. [Google Scholar] [CrossRef]
- Dalmolen, S.; Bastiaansen, H.J.M.; Somers, E.J.J.; Djafari, S.; Kollenstart, M.; Punter, M. Maintaining control over sensitive data in the Physical Internet: Towards an open, service oriented, network-model for infrastructural data sovereignty. In Proceedings of the International Physical Internet Conference (IPIC), London, UK, 9 July 2019. [Google Scholar]
- Hellmeier, M.; Pampus, J.; Qarawlus, H.; Howar, F. Implementing Data Sovereignty: Requirements & Challenges from Practice. In Proceedings of the 18th International Conference on Availability, Reliability and Security, Benevento, Italy, 29 August–1 September 2023; pp. 1–9. [Google Scholar]
- Schmidt, K.; Munilla Garrido, G.; Mühle, A.; Meinel, C. Mitigating sovereign data exchange challenges: A mapping to apply privacy-and authenticity-enhancing technologies. In Proceedings of the International Conference on Trust and Privacy in Digital Business, Vienna, Austria, 24 August 2022; Springer International Publishing: Cham, Switzerland, 2022; pp. 50–65. [Google Scholar]
- Rollandi, A.; Papandrea, M.; Bignami, F.; Di Maggio, L.; Günther, F.; Quattrini, A.; Minardi, L.; Cocca, M.; Bettini, A. Inclusive MicroMob: Enhancing Urban Mobility Through Micromobility Solutions. Smart Cities 2025, 8, 69. [Google Scholar] [CrossRef]
- Bokolo, A.J. Examining the adoption of sustainable eMobility-sharing in smart communities: Diffusion of innovation theory perspective. Smart Cities 2023, 6, 2057–2080. [Google Scholar] [CrossRef]
- Bastiaansen, H.; Bratzel, S.; Drees, H.; Groot, D.; Mollema, R.; Pretzsch, S.; Rittershaus, L.; Thoemmes, J.; Vikram, A. Data Move People—Mobility Data Spaces International Data Spaces Association. Anthology|Version 1.0|October 2021. 2021. Available online: https://internationaldataspaces.org/wp-content/uploads/IDSA-Anthology-Data-Move-People-Mobility-Data-Spaces-Version-1.0.pdf (accessed on 19 June 2025).
- Sheikh, H. European digital sovereignty: A layered approach. Digit. Soc. 2022, 1, 25. [Google Scholar] [CrossRef]
- Roberts, H.; Cowls, J.; Casolari, F.; Morley, J.; Taddeo, M.; Floridi, L. Safeguarding European values with digital sovereignty: An analysis of statements and policies. Internet Policy Rev. 2021, 10. [Google Scholar] [CrossRef]
- Del Re, E. Technologies of Data Protection and Institutional Decisions for Data Sovereignty. Information 2024, 15, 444. [Google Scholar] [CrossRef]
Data Sharing Process and Description | Actors Involved in Each Phase | |||||
---|---|---|---|---|---|---|
Process | Description | Data Owners | Data Providers | Data Consumers | Data Users | Certification Authority |
Prepare dataset | Citizens as a data owner or data provider generate data from physical devices stored as datasets. The metadata are displayed for the public via the discovery service (by the metadata broker), and the data owners can share the dataset via a connector in the data space, which uses a dedicated API that points to the dataset. | |||||
Data quality check | The certification authority as part of the operator association carries out data quality assessment on the latest dataset provided by the data owners. The citizen offers access for the dataset to be checked through an API. | |||||
Initiate contract | Citizens create a digital contract, and the system generates certificates that confirm the identities of all parties (e.g., mobility service providers, public transport providers, etc.) by the identity provider. | |||||
Resource subscription | Mobility service providers as data consumers or data users subscribe to the resources (dataset) being offered via the data space through its own connector. | |||||
Sign contract | Mobility service providers agree to comply with the terms and conditions for use of the datasets by signing the contractual agreement. | |||||
Resource provision | Based on the metadata, citizens use their connector to offer the dataset via an API that points to the location of the dataset in the data sink (an external cloud environment). | |||||
Resource request | A dataset is requested by a mobility service provider, and notification is received by the citizen. | |||||
Resource sharing | In sharing the requested resource, usage control and access policies are checked to ensure that the connector requesting the dataset complies with the signed contract. After this, access to the resources is granted. | |||||
Resource trading | In situations where the dataset being shared requires payment from the mobility service providers, the certification authority (such as a clearing house, e.g., GAIA-X) is involved in the process. | |||||
Resource monitoring | The citizen is notified via their connector of updates on access and usage of the dataset in the data sink. Also, mobility service providers are notified about new resources when available. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Bokolo, A.J. Implementing Digital Sovereignty to Accelerate Smarter Mobility Solutions in Local Communities. Smart Cities 2025, 8, 106. https://doi.org/10.3390/smartcities8040106
Bokolo AJ. Implementing Digital Sovereignty to Accelerate Smarter Mobility Solutions in Local Communities. Smart Cities. 2025; 8(4):106. https://doi.org/10.3390/smartcities8040106
Chicago/Turabian StyleBokolo, Anthony Jnr. 2025. "Implementing Digital Sovereignty to Accelerate Smarter Mobility Solutions in Local Communities" Smart Cities 8, no. 4: 106. https://doi.org/10.3390/smartcities8040106
APA StyleBokolo, A. J. (2025). Implementing Digital Sovereignty to Accelerate Smarter Mobility Solutions in Local Communities. Smart Cities, 8(4), 106. https://doi.org/10.3390/smartcities8040106