The Beijing 2022 Winter Olympic Games is in full swing. Thousands of athletes and coaches from nearly 100 countries and regions will participate in such a grand games. In addition, with the huge and complicated data and information of spectators and staff, it is difficult to command and dispatch the Games combined with the COVID-19 epidemic.

In this case, how to maintain order, statistical information, which has to mention the winter Olympics data exchange and sharing platform. The platform collects daily data of relevant parties, event information data, and real-time meteorological data of competition and non-competition venues, providing comprehensive, complete and accurate information sources for conducting smart competitions.

As we all know, information resources can be fully developed and utilized only when they are exchanged and shared. Value can only be created by breaking information closure and eliminating information “desert islands” and “isolated islands”. Therefore, the exchange and sharing of data is a key link in the full life cycle of data.

Regardless of government departments or enterprises, they usually need to exchange and share data with one or more internal and external organizations in the daily management process due to business requirements. However, accelerating data sharing is not as simple as building a data platform. From data collection, to data processing and cleaning, and then the application of data to daily management, value, all need a lot of foundation work. Today, Xiaoyi will talk about data exchange and sharing from the following aspects:

1. Basic concept, value and significance of data exchange and sharing; 2.3 Common data exchange methods; 3. Principles and precautions of data exchange and sharing; 4.3 Sharing of efficient and secure data exchange practice cases.

01. What is data exchange and sharing?

Organizations choose to exchange and share data for a variety of reasons. For example, data exchange and sharing between internal and internal, data exchange and sharing between enterprises, and data exchange and sharing between government or enterprise and individuals or service providers. Data exchange and sharing is to enable users in different places using different computers and different software to read other people’s data and carry out various operations and analysis.

That is when the data from one system boundaries across access or transfer to another system, you need to use one or more of the agreement to specify the responsibility of each organization, to access and exchange the data types and influence constituency, how to use the exchange of data, as well as in the exchange system at both ends of the processing, storage, or how to ensure data security to transmit data.

Common data exchange/sharing scenarios include but are not limited to: data and information sharing among authorized users; Provide custom access to data; Collaborate on joint projects; Provide complete, transient, intermittent, permanent or temporary data exchange and sharing activities; Reducing data collection efforts and costs through exchange and sharing; Provide online training; Provides secure storage for critical data and backup files.

02. Value and significance of data exchange and sharing

The realization of data sharing can make more people make full use of existing data resources, reduce data collection, data collection and other repetitive labor and corresponding costs, and focus on the development of new applications and system integration. In general, it can bring benefits to the organization, such as reducing operating costs, enhancing business capabilities, improving efficiency, centralizing data access to reduce duplicate data sets, promoting communication and cooperation between organizations, and strengthening links between participating organizations.

In addition, the degree of data sharing also reflects the level of information development of a region or a country. The higher the degree of data sharing, the higher the level of information development. In order to realize data sharing, a set of unified and legal data exchange standards should be established first, and the data format should be standardized so that users can adopt the prescribed data standards as far as possible. Secondly, corresponding data use management measures should be established, corresponding data copyright protection and property rights protection regulations should be formulated, and data use agreements should be signed between various departments, so as to break the information protection between departments and regions and achieve real information sharing.

03. Three methods of data exchange and sharing

1. Data exchange and sharing mode

The conditions for data exchange require at least three basic components: two endpoints and a data flow channel, either dedicated or leased lines, or using a virtual private network (VPN) solution (for example: IPsec, SSLVPN, L2TP), using dedicated circuits is more expensive, but more secure, and using VPN is a cheaper alternative and common communication scheme. Here are two communication modes for establishing data exchange:

Interconnection between two endpoints/systems of data exchange can be implemented at the network level or application level

(1) Network interconnection: physical or virtual communication links between two or more networks that are operated by different organizations, or within the same organization, but within different authorization boundaries.

(2) Application interconnection: logical communication links between two or more applications operating within different organizations or within the same organization but within different authorization boundaries, for exchanging data or providing information services (e.g., authentication, logging). Application interconnection includes file sharing services or applications and data exchange sources occurring at the session layer, presentation layer, or application layer.

2. Data exchange and sharing methods

Common methods of data exchange include, but are not limited to: electronic or digital file transfer, data exchange via portable storage devices, data exchange via email, database sharing or database transaction information exchange, and web – or cloud-based services.

(1) Electronic or digital file transfer

Data can be exchanged via electronic or digital file transfer, a file transfer (communication) protocol that transfers files (data) between two systems. Organizations need to consider the security risks associated with using different file transfer protocols; File transfer protocols include FTPS, HTTPS, and SCP.

(2) Portable storage devices

In some cases, it may be necessary to exchange data using portable storage devices, such as removable disks (digital video discs (DVDS)) or universal serial buses (USB). Organizations need to consider the impact level of the data being transferred and the system to which the data will be transferred to determine whether adequate measures are being taken for the data being exchanged.

(3) E-mail

Organizations often share data via E-mail in the form of attachments. Organizations need to consider the impact level of the participating organization’s E-mail infrastructure and the security controls already in place to determine whether adequate controls are in place to protect the data being exchanged, for example, an E-mail infrastructure protected at a moderate impact level is not sufficient to protect data at a high impact level.

(4) Database

Database sharing or exchange of database transaction information, including access to data by users from another organization. Organizations need to consider the feasibility of providing data access rather than transmission to reduce the risk of duplicate data sets and loss of data confidentiality and integrity.

(5) File sharing service

File sharing services include, but are not limited to, shared data and access to data through Web-based file sharing or storage (such as Drop Box, Google Drive, MS Teams, or MS One Drive). With a Web-based file sharing or storage system, the data owner does not know where the server is located or physical and logical access to the facility, server, and data.

3. Data access or transmission

(1) Access the exchanged data through the system

The data itself is not transferred, but is accessed by the users of the participating organization. System access to exchanged data reduces duplicate data sets and the risk of loss of data confidentiality and integrity. As with any form of system access, the extent to which users can access data resources depends on the extent to which the organization’s business and the confidentiality, integrity, and availability of the data are compromised.

Therefore, organizations can restrict users to a single application, file, or file location through access control and adopt specific policies to manage access (for example, access is read-only). Other organizations may set up more flexible exchanges that allow users to access multiple applications, files, or databases.

(2) Exchange data through transmission

The data will be replicated at other physical locations. Data transfer may result in an increased risk of data set duplication, data obsolescence, or unauthorized disclosure or modification of data. However, the transferred data may be required to support the use of the same set of data in different business processes, in different software, or when the exchanged data is not accessible through the system.

It is recommended that organizations limit the data exchanged to only the specific data needed to support the business, rather than transferring the entire data set. Participating organizations need to consider the possible impact of losing the confidentiality and integrity of the data they transmit, as well as the need to protect data commensurate with the intended level of impact, regardless of its physical location.

04. Four principles of data exchange and sharing

Data sharing services take data as the core, and solve how to share data conveniently, efficiently and safely, reduce the difficulty of obtaining data, and improve data demand experience and efficiency. Through the construction of platform capabilities, different forms of data sharing services are provided to meet the needs of different types of data sharing services. In general, the construction of data sharing service mainly has the following principles:

1. Consistency principle: Before providing data sharing service, the source unit of each data shall be determined, and the source unit shall be responsible for the accuracy and consistency of the data. Reduce data “moving” and thus reduce data inconsistencies caused by secondary passes downstream.

2. Black-box principle: Data users need not pay attention to technical details and meet the needs of different types of data sharing services.

3. Principle of agile response: Once the data sharing service is completed, it does not need to repeatedly build integration channels according to data users, but quickly obtain data through “subscription” of the data sharing service.

4. Self-use principle: The provider of data sharing service does not need to care how the data user “consumes” the data, thus avoiding the problem that the continuous development of the supplier fails to meet the flexible demands of the data user.

5. Traceability principle: The use of all data sharing services can be managed, and the data provider can accurately and timely know who uses its data to ensure the reasonable use of data.

05. Three practical cases of efficient and secure data exchange

This paper mainly introduces the “data exchange management platform EsDataExchage” based on the independent research and development of Yixin Huachen. The platform based on the solution to the business systems are independent of each other between the business data can be Shared barrier-free transport problems, through the rich data processing and exchange of the design of the task, a business system for data integration of scattered, eliminate the “information island”, each other to realize all kinds of business system and data sharing, to form a unified data service layer, Provide reliable data base for government and enterprise business information service.

1. Government affairs service data management platform of a large foshan region

Establish unified technical and business standards for one database and three departments of the district Big data Bureau based on the data of population database, sanitary meter, industry and commerce, and flow management. Develop regional data exchange platform, complete data collection and transmission of three departments, exchange and share of one database and three departments, provide seamless data application and exchange services, and monitor and analyze exchange log data. It provides high-quality data support for various departments’ data applications such as self-filling system and paperless education.

(Figure: Architecture diagram of government service data Management platform of a large district in Foshan)

2. Ministry of Health Data Application Platform

The project is made up of a unified planning at the national institutes of health ministry data application platform, the platform on the basis of hundred million letter data exchange management platform, sharing and integration of public health services, health care, health resources, population information, grading treatment and drug administration, disease relief and other business data, to meet the personalized data acquisition of provinces and cities all over the country health statistics, Ensure the sustainability of statistics management and application.(Figure: Ministry of Health data Application Platform architecture)

3. Data exchange platform of Agricultural Development Bank

Data for integrated business system, credit, international settlement and other source business systems are uniformly extracted through yixin data exchange platform, data standardization is realized through data escape and code value conversion, and the processed data is sent to the consumer system in the form of files or library tables.

(Figure: Structure diagram of agricultural Development Bank data Exchange Platform)

06. Precautions

1. Clear ownership issues: it is necessary to ensure that sharing does not change the ownership of the data, so as to solve the worries of the data provider departments;

2. Solve the trust problem: on the one hand, users trust the data to ensure that the data is effective and complete; The other is the provider’s trust that the data will not be used by it;

3. Traceability guarantee: The process of sharing the supply and use should be traceable, disputes should be solved, and responsibilities should be clarified. If the data is being used in the wrong way or raises privacy concerns. It can be traced back to which link the problem lies and which department should be responsible for it, so that in the process of data use, rights and responsibilities can be confirmed and an accountability system of rights and responsibilities matching can be established.

4. Sustainability: After sharing is achieved, sharing can continue as long as the conditions remain unchanged, reducing the cost of communication and coordination between departments, and finally achieving the desired results.