<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="o-*+"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ramakrishna-satp-data-sharing-04" category="info" consensus="true" submissionType="IETF" tocDepth="4" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.1 -->
  <front>
    <title abbrev="SAT Data Sharing">Protocol for Requesting and Sharing Views across Networks</title>
    <seriesInfo name="Internet-Draft" value="draft-ramakrishna-satp-data-sharing-04"/>
    <author initials="V." surname="Ramakrishna" fullname="Venkatraman Ramakrishna">
      <organization>IBM Research</organization>
      <address>
        <email>vramakr2@in.ibm.com</email>
      </address>
    </author>
    <author initials="V." surname="Pandit" fullname="Vinayaka Pandit">
      <organization>IBM Research</organization>
      <address>
        <email>pvinayak@in.ibm.com</email>
      </address>
    </author>
    <author initials="E." surname="Abebe" fullname="Ermyas Abebe">
      <organization>Consensys</organization>
      <address>
        <email>ermyas.abebe@consensys.net</email>
      </address>
    </author>
    <author initials="S." surname="Nishad" fullname="Sandeep Nishad">
      <organization>IBM Research</organization>
      <address>
        <email>sandeep.nishad1@ibm.com</email>
      </address>
    </author>
    <author initials="D." surname="Vinayagamurthy" fullname="Dhinakaran Vinayagamurthy">
      <organization>IBM Research</organization>
      <address>
        <email>dvinaya1@in.ibm.com</email>
      </address>
    </author>
    <date year="2025" month="September" day="15"/>
    <area>Applications and Real-Time</area>
    <workgroup>Secure Asset Transfer Protocol</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 234?>

<t>With increasing use of DLT (distributed ledger technology) systems, including blockchain systems and networks, for virtual assets, there is a need for asset-related data and metadata to traverse system boundaries and link their respective business workflows. Systems and networks can define and project views, or asset states, outside of their boundaries, as well as guard them using access control policies, and external agents or other systems can address those views in a globally unique manner. Universal interoperability requires such systems and networks to request and supply views via gateway nodes using a request-response protocol. The endpoints of this protocol lie within the respective systems or in networks of peer nodes, but the cross-system protocol occurs through the systems’ respective gateways. The inter-gateway protocol that allows an external party to request a view by an address and a DLT system to return a view in response must be DLT-neutral and mask the internal particularities and complexities of the DLT systems. The view generation and verification modules at the endpoints must obey the native consensus logic of their respective networks.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-satp.github.io/draft-ramakrishna-satp-data-sharing/draft-ramakrishna-satp-data-sharing.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ramakrishna-satp-data-sharing/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secure Asset Transfer Protocol Working Group mailing list (<eref target="mailto:sat@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/sat/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/sat/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-satp/draft-ramakrishna-satp-data-sharing"/>.</t>
    </note>
  </front>
  <middle>
    <?line 238?>

<section anchor="introduction">
      <name>Introduction</name>
      <t anchor="introduction-doc">Blockchain systems, especially those of the permissioned variety, are a heterogeneous mix, fulfilling a diverse range of needs and built on several different DLT stacks that are not compatible with each other. Yet, in an interconnected world, the business processes running on each system cannot afford to remain isolated and the virtual assets they manage cannot afford to remain in siloes. These systems must be interoperable so that assets can move, and their properties can be reflected across network boundaries, and so that business processes can span multiple systems. Interoperability will, in effect, mimic a larger or scaled up, blockchain system composed of smaller blockchain systems without explicitly requiring those systems to coalesce.</t>
      <t>At the core of any cross-blockchain system transaction is the ability of a system to project a view of assets and associated data recorded on its ledger to external parties, be they individual agents or other blockchain systems. On the reverse, a blockchain system must also have the ability to identify and address views of assets or associated data in another system, and further, to validate that view before its business process consumes it. View projection, addressing, and consumption, must eliminate or minimize the role of third parties to avoid loss of data privacy, control over business process, or diminishment of autonomy.</t>
      <t>This document specifies an end-to-end protocol whereby a view request and the corresponding view response can be communicated using two or more gateway nodes connected to the end DLT systems. The gateways communicate with each other using a DLT-neutral protocol (like SATP <xref target="SATP"/>, or variations of it) and therefore the view requests and responses must be encapsulated in DLT-neutral data formats. Beyond the gateways, and into the DLT systems, view generation and consumption rely upon native mechanisms exposed by those systems. The gateways must therefore be augmented to exercise these mechanisms to convey view requests and responses to their respective back-end systems.</t>
      <t>The purpose of this document is to provide a technical framework to discuss the various aspects of a basic view request-response protocol via gateways acting on behalf of blockchain/DLT systems, including security and privacy considerations.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t anchor="terminology-doc">The following are some terminology used in the current document:</t>
      <ul spacing="normal">
        <li>
          <t>Blockchain system: Blockchains are distributed digital ledgers of cryptographically signed transactions that are grouped into blocks. Each block is cryptographically linked to the previous one (making it tamper evident) after validation and undergoing a consensus decision. As new blocks are added, older blocks become more difficult to modify (creating tamper resistance). New blocks are replicated across copies of the ledger within the network, and any conflicts are resolved automatically using established rules <xref target="NIST"/>.</t>
        </li>
        <li>
          <t>Blockchain network: This is a blockchain system that is built on a network of nodes that maintain a common shared copy of the blockchain using a consensus protocol.</t>
        </li>
        <li>
          <t>Distributed ledger technology (DLT) system: Technology that enables the operation and use of distributed ledgers, where the ledger is shared (replicated) across a set of DLT nodes and synchronized between the DLT nodes using a consensus mechanism <xref target="ISO"/>. Every blockchain system is also a DLT system, and so we will mostly use the latter term in this draft when discussing protocols for cross-system interactions.</t>
        </li>
        <li>
          <t>Distributed ledger network: This is a DLT system that is built on a network of nodes that maintain a shared copy of the ledger or portions of it on different subsets of nodes using a consensus protocol.</t>
        </li>
        <li>
          <t>Resource Domain: The collection of resources and entities participating within a blockchain or DLT system. The domain denotes a boundary for permissible or authorized actions on resources.</t>
        </li>
        <li>
          <t>Interior Resources: The various interior protocols, data structures and cryptographic constructs that are a core part of a blockchain or DLT system. Examples of interior resources include the ledger (blocks of confirmed transaction data), public keys on the ledger, consensus protocol, incentive mechanisms, transaction propagation networks, etc.</t>
        </li>
        <li>
          <t>Exterior Resources: The various resources that are outside a blockchain or DLT system, and are not part of the operations of the system. Examples include data located at third parties such as asset registries, ledgers of other blockchain/DLT systems, PKI infrastructures, etc.</t>
        </li>
        <li>
          <t>Nodes: The nodes of the blockchain or DLT system which form the peer-to-peer network, which collectively maintain the shared ledger in the system by following a consensus algorithm.</t>
        </li>
        <li>
          <t>Gateway nodes: The nodes of the blockchain or DLT system that are functionally capable of acting as a gateway in an asset transfer. A gateway node conforms to the Secure Asset Transfer Architecture <xref target="SATA"/> and implements the Secure Asset Transfer Protocol (SATP) <xref target="SATP"/>. Being a node on the blockchain/DLT system, a gateway has at least read access to the interior resources (e.g., ledger) of the blockchain. Optionally, it may have write access to the ledger and also the ability to participate in the consensus mechanism deployed for the system. Depending on the blockchain/DLT system implementation, some or all of the nodes may be gateway-capable.</t>
        </li>
        <li>
          <t>Gateway device identity: The identity of the device implementing the gateway functions. The term is used in the sense of IDevID (IEEE 802.1AR) or EK/AIK (in TPM1.2 and TPM2.0) <xref target="IDevID"/>.</t>
        </li>
        <li>
          <t>Gateway owner: The VASP who legally owns and operates a gateway node within a blockchain system.</t>
        </li>
        <li>
          <t>Clients: Entities are permitted to invoke smart contracts to read or update ledger state in a blockchain or DLT system. They possess unique identities in the form of public keys. In a permissioned system, identity certificates are issued by the system's internal providers (or certificate authorities).</t>
        </li>
        <li>
          <t>Wallets: Collection of client identities represented by public-private key pairs, and optionally certificate issued by a blockchain or DLT system's identity providers (or certificate authorities).</t>
        </li>
        <li>
          <t>Virtual Asset: A virtual asset is a digital representation of value that can be digitally traded, or transferred as defined by the FATF <xref target="FATF"/>.</t>
        </li>
        <li>
          <t>Virtual Asset Service Provider (VASP): Legal entity handling virtual assets as defined by the FATF <xref target="FATF"/>.</t>
        </li>
        <li>
          <t>Ledger state: A snapshot of the information held in a distributed shared ledger, typically (though not necessarily) as a set of blockchain or DLT system. Examples of interior resources include key-and-value pairs. This information includes records of virtual assets and the state of business processes that are meaningful to the DLT system's participants and clients. State elements and subsets may be scoped under the namespaces of given smart contracts, thereby being accessible only through invocations on those contracts.</t>
        </li>
        <li>
          <t>Smart contracts: Business workflows written in programming languages that manage the states of assets and business processes on a shared ledger in a DLT system. These contracts constrain the ability of system clients to modify ledger state and embed guards around state elements. Contracts can be invoked to read from, or write, to, a ledger. They can be deployed on several system nodes, who must agree on a given ledger state update via a consensus protocol.</t>
        </li>
        <li>
          <t>Consensus protocol/mechanism: Process by which nodes agree on a ledger state update, typically (though not mandatorily) through a smart contract invocation.</t>
        </li>
        <li>
          <t>Local transaction: A transaction triggered by a client to update the ledger state in a blockchain or DLT system, typically (though not mandatorily) through a smart contract invocation.</t>
        </li>
        <li>
          <t>View: A projection of a blockchain or DLT system's ledger state for external consumption, i.e., for parties outside that system. This can be a single element, a subset of the state, or a function over a subset.</t>
        </li>
        <li>
          <t>View Address: A unique identifier or locator for a view into a blockchain or DLT system's ledger. This is analogous to an HTTP URL.</t>
        </li>
        <li>
          <t>Source system: Blockchain or DLT system governing the ledger from which a view is produced.</t>
        </li>
        <li>
          <t>Destination system: System in which a view is consumed. This can be a blockchain or DLT system.</t>
        </li>
        <li>
          <t>Remote system: Counterparty system in a view request-response protocol instance. From the vantage point of the source system, this refers to the destination system, and vice versa.</t>
        </li>
        <li>
          <t>View requestor: Person or organization triggering a view request from a source network.</t>
        </li>
        <li>
          <t>Proof: A data structure containing evidence linking a view to its source system's blockchain, or more generally, ledger. The evidence may be probabilistic and in some cases cryptographically verifiable.</t>
        </li>
        <li>
          <t>Access/exposure policy: Set of rules governing the release of a view to an external party (i.e., outside the source system), held in consensus by nodes on the source system's ledger.</t>
        </li>
        <li>
          <t>Verification policy: Rules for validation of proofs associated with views maintained in a destination system. If the destination system is a blockchain or DLT system, these rules are held in consensus by nodes on that system's ledger.</t>
        </li>
        <li>
          <t>View Request: A request for a made by an external party to a source blockchain or DLT system. The external party may be a client in a destination blockchain or DLT system. The request consists of a view address and various metadata, including optionally a verification policy.</t>
        </li>
        <li>
          <t>Asset locking or escrow: The conditional mechanism used within a blockchain or DLT system to make an asset temporarily unavailable for use by its owner. The condition of the asset release can be based on a duration of time (e.g., hash time locks) or other parameters.</t>
        </li>
        <li>
          <t>Gateway crash recovery: The local process by which a crashed gateway (i.e., device or system fault) is returned to a consistent and operational state, ready to resume the asset transfer protocol with the peer gateway prior to the crash event.</t>
        </li>
      </ul>
      <t>Further terminology definitions can be found in <xref target="NIST"/> and <xref target="ISO"/>. The term 'blockchain' and 'distributed ledger technology' (DLT) are used interchangeably in this document.</t>
    </section>
    <section anchor="assumptions-and-principles">
      <name>Assumptions and Principles</name>
      <t anchor="assumptions-principles">The following assumptions and principles underlie the design of the current interoperability architecture and protocol enabling the requesting and sharing of data from across DLT systems using gateways, and correspond to the design principles of the Internet architecture.</t>
      <section anchor="design-principles">
        <name>Design Principles</name>
        <t anchor="assumptions-principles-design">The protocol must not involve any centralized intermediaries or trusted third parties, including settlement blockchains, other than gateways. The protocol must not decrease the security of endpoint blockchain systems nor impose a higher bar on their internal consensus. Further, the protocol must not reveal any private information from a system beyond what the nodes of that network have agreed to through consensus. The protocol must enable view requests and response from systems built on any arbitrary (present or future) blockchain or distributed ledger technology. Finally, the endpoint systems must retain full autonomy over internal governance and framing of policies governing how views can be exposed and how proofs can be validated.</t>
      </section>
      <section anchor="operational-assumptions">
        <name>Operational Assumptions</name>
        <t anchor="assumptions-principles-operational">The following conditions are assumed to have occurred prior to the construction of a view request:</t>
        <ul spacing="normal">
          <li>
            <t>Syncing remote system structure, memberships, and identities: see Section 5 for details.</t>
          </li>
          <li>
            <t>Recording view access control policies in the source ledger: see Section 5 for details.</t>
          </li>
          <li>
            <t>Recording view verification policies in the destination ledger: see Section 5 for details.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="interoperability-and-data-sharing-among-distributed-ledger-systems">
      <name>Interoperability and Data Sharing Among Distributed Ledger Systems</name>
      <t anchor="interop-data-sharing">Distributed ledger systems, typically maintained through consensus on a network of peer nodes, run business workflows (often as “smart contracts” <xref target="Ethe22"/>) and maintain transaction logs. The ledgers and their transaction histories are distinct, but the business workflows they run are often interlinked in the real world. This necessitates interoperability among the systems/networks as well as the ledgers maintained by them. Certain modes, or patterns, of interoperability have been identified as typical and useful for the enterprises and consortia that run these systems. These are listed in the Secure Asset Transfer architecture draft <xref target="SATA"/>, namely as asset transfer, asset exchange, and data sharing, respective. Motivating use cases for these different modes have been presented in the Secure Asset Transfer use cases draft <xref target="SATU"/>.</t>
      <t>In this document, we will address the data sharing mode of interoperability, whereby DLT systems can export views of their ledger state with associated proofs of authenticity, control access to these views, and also address views exported by a remote DLT system. The formats of the views, addresses, requests, and access control policies are beyond the scope of this draft, and are specified in the Views and View Addresses draft <xref target="SATV"/>. This draft specified a request-response protocol whereby a view can be requested from one DLT system to another via those systems’ respective gateways, and obtained and consumed via the same gateways. In effect, data maintained on the ledger in one system is shared with another in a way that requires no third-party system or agent acting as a mediator.</t>
      <t>This draft will only specify a bilateral protocol, i.e., whereby a view is requested by a DLT system to exactly one other DLT system and whereby a view is supplied by a DLT system with exactly one other DLT system. Extrapolating or augmenting this protocol to involve more than two DLT systems is beyond the scope of the present draft.</t>
    </section>
    <section anchor="data-sharing-protocol">
      <name>Data Sharing Protocol</name>
      <t anchor="data-sharing">This section describes a protocol using which an external entity can request and process a view from a distributed ledger.</t>
      <section anchor="goal-and-overview-of-protocol">
        <name>Goal and Overview of Protocol</name>
        <t anchor="data-sharing-overview">Using this protocol, any entity, be it a single application or agent or a distributed ledger system itself, can supply a view address and a verification policy to a distributed ledger system and obtain a view in response, which it can then validate before processing as per need. This protocol makes no assumption about the nature of such processing, which can be executed by some module (like a smart contract) but rather prescribes the steps to be followed until the point where the view is dispatched to the module.</t>
        <t>The diagram below illustrates the protocol whereby a distributed ledger system requests and consumes a view from another distributed ledger system. The protocol units are indicated, with sequence numbers associated with procedures or messages.</t>
        <figure anchor="protocol-long-figure">
          <artwork><![CDATA[
    +----------------------------+
    |           Client           |
    |       (Application)        |
    +----------------------------+
          |               ^     |
          |       7 View  |     |
   8 View |      Response |     | 1 View
          |               |     | Request
          V               |     V
   +----------------+   +---------+         +---------+   +----------------+
   |                |   |         | 2 View  |         |   |                |
   |     DLT L1     |   |         | Request |         |   |     DLT L2     |
   |                |   |         |-------->|         | 3 |                |
   | +------------+ |   | Gateway |         | Gateway |-->| +------------+ |
   | |  9  View   | |---|    G1   |         |    G2   |   | |  4 Access  | |
   | | Validation | |   |         |         |         |<--| |  Control & | |
   | |      &     | |   |         |<--------|         | 5 | |    View    | |
   | | Commitment | |   |         | 6 View  |         |   | | Generation | |
   | +------------+ |   |         | Response|         |   | +------------+ |
   +----------------+   +---------+         +---------+   +----------------+
]]></artwork>
        </figure>
        <t>In a shorter form of the protocol, the requesting system is a unitary entity rather than a network of peers maintaining a distributed ledger and a client application above it. The diagram below illustrates this protocol and its units, with sequence numbers associated with procedures or messages.</t>
        <figure anchor="protocol-short-figure">
          <artwork><![CDATA[
   +-----------------------+            +---------+   +----------------+
   |                       |   1 View   |         |   |                |
   |         Client        |   Request  |         |   |      DLT L     |
   |     (Application)     |----------->|         | 2 |                |
   |                       |            | Gateway |-->| +------------+ |
   | +-------------------+ |            |    G    |   | |  3 Access  | |
   | | 6 View Validation | |            |         |<--| |  Control & | |
   | |    & Commitment   | |<-----------|         | 4 | |    View    | |
   | +-------------------+ |   5 View   |         |   | | Generation | |
   |                       |  Response  |         |   | +------------+ |
   +-----------------------+            +---------+   +----------------+
]]></artwork>
        </figure>
        <t>The distributed ledger system on the right is referred to as the source system, as it is the source of the information being requested for through a view. The system on the left is referred to as the destination system, as the desired information ends up there either in raw or in processed form. The destination system can be a traditional centrally governed system or a distributed ledger system maintained by a decentralized network.</t>
      </section>
      <section anchor="protocol-phases">
        <name>Protocol Phases</name>
        <t anchor="data-sharing-phases">The protocol can be divided into the following phases:</t>
        <ul spacing="normal">
          <li>
            <t>Phase 1: View request creation in destination network.</t>
          </li>
          <li>
            <t>Phase 2: Cross-gateway discovery and request.</t>
          </li>
          <li>
            <t>Phase 3: View creation in source network.</t>
          </li>
          <li>
            <t>Phase 4: Cross-gateway response.</t>
          </li>
          <li>
            <t>Phase 5: View validation and commitment in destination system.</t>
          </li>
        </ul>
      </section>
      <section anchor="phase-1-view-request-creation-in-destination-network">
        <name>Phase 1: View request creation in destination network</name>
        <t anchor="data-sharing-phase-1">All operations in this phase are conducted by a client, typically acting through an application, in the destination system.</t>
        <ul spacing="normal">
          <li>
            <t>The client constructs a view address corresponding to the desired view.</t>
          </li>
          <li>
            <t>The client looks up the verification policy corresponding to this view address from the destination system’s database. If the destination system is a distributed ledger system, this lookup should involve a query to one or more shared ledgers within the system.</t>
          </li>
          <li>
            <t>The client sends a view request comprising of the view address and the verification policy to the destination system’s gateway.</t>
          </li>
        </ul>
      </section>
      <section anchor="phase-2-cross-gateway-discovery-and-request">
        <name>Phase 2: Cross-gateway discovery and request</name>
        <t anchor="data-sharing-phase-2">All operations in this phase are conducted by a gateway belonging to, or acting on behalf of, the destination system.</t>
        <ul spacing="normal">
          <li>
            <t>The destination system’s gateway looks up or tried to discover the address of one or more gateways belong to, or working on behalf of, the source system. If no address can be found, the protocol terminates.</t>
          </li>
          <li>
            <t>The destination system’s gateway selects an address and sends the view request to the source system’s gateway at that address.</t>
          </li>
        </ul>
      </section>
      <section anchor="phase-3-view-creation-in-source-network">
        <name>Phase 3: View creation in source network</name>
        <t anchor="data-sharing-phase-3">Operations in this phase are orchestrated by a source system gateway via the system’s smart contract transaction and network consensus mechanisms.</t>
        <ul spacing="normal">
          <li>
            <t>The source system’s gateway converts the view request into a distributed ledger query or a smart contract invocation (if the source system supports smart contracts). The following steps show how this happens in a permissioned distributed ledger system with smart contracts.
            </t>
            <ul spacing="normal">
              <li>
                <t>The source system’s gateway parses the view address within the view request to formulate a view data query and determine the ledger from which a view is desired.</t>
              </li>
              <li>
                <t>The source system’s gateway parses the verification policy in the view request to determine a subset of peers within its network that maintain this ledger and to which this query can be sent.</t>
              </li>
              <li>
                <t>The source system’s gateway invokes a smart contract to process the view data query, in effect by sending the query to the selected network peers.</t>
              </li>
              <li>
                <t>Each peer that receives the query:
                </t>
                <ul spacing="normal">
                  <li>
                    <t>Validates the query against the source system’s access control policy.</t>
                  </li>
                  <li>
                    <t>Processes the query and produces an output if the validation is successful.</t>
                  </li>
                  <li>
                    <t>Packages and signs the output, which can be a query response or a failure report, as it would do with any regular smart contract transaction result. The signature constitutes part of the proof for satisfaction of the verification policy.</t>
                  </li>
                  <li>
                    <t>Sends the signed package to the source system’s gateway.</t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
          <li>
            <t>The source system’s gateway creates a view from the smart contract invocation result. If this invocation follows the process described in the preceding steps, this is done by collecting and enveloping the received packages into a view structure.</t>
          </li>
        </ul>
      </section>
      <section anchor="phase-4-cross-system-response">
        <name>Phase 4: Cross-system response</name>
        <ul spacing="normal" anchor="data-sharing-phase-4">
          <li>
            <t>The source system’s gateway sends the view to the destination system’s gateway. It may do this as a response in a long-running session that began with the latter sending a view request to the former. Alternatively, this could be done by the former posting an event to the latter. Sending of the view could be a best effort process or guaranteed through suitable fault tolerance mechanisms built into gateways. Such mechanisms are beyond the scope of this draft.</t>
          </li>
          <li>
            <t>The destination system’s gateway sends the view to the client that created the original view request. The same mechanisms and considerations apply as in the cross-gateway response in the preceding step.</t>
          </li>
        </ul>
      </section>
      <section anchor="phase-5-view-validation-and-commitment-in-destination-system">
        <name>Phase 5: View validation and commitment in destination system</name>
        <t anchor="data-sharing-phase-5">All operations in this phase are conducted by the client in the destination system that created the original view request.</t>
        <ul spacing="normal">
          <li>
            <t>The client parses the view to determine if the request was successful. If not, the protocol terminates.</t>
          </li>
          <li>
            <t>If the destination system is a centrally governed system with a database, the client submits a transaction, using an available API, with the view in the arguments. If the destination system is a distributed ledger system, the client submits a smart contract transaction, with the view in the arguments, to the destination system’s network peers.</t>
          </li>
          <li>
            <t>The backend system (if the destination system is centrally governed) or every peer in the network (if the destination system is a distributed ledger system) that receives the transaction validates the proof within the view against the verification policy recorded in the database or the shared ledger.</t>
          </li>
          <li>
            <t>If the proof is determined to be invalid, the protocol terminates. Otherwise, the transaction is executed and then committed to storage, either through a unitary procedure (centrally governed system) or through distributed consensus (distributed ledger system).</t>
          </li>
        </ul>
      </section>
      <section anchor="desirable-properties-of-data-sharing-protocols">
        <name>Desirable Properties of Data Sharing Protocols</name>
        <t anchor="data-sharing-properties">The desirable properties of a data sharing protocol include, but are not limited to, the following:</t>
        <ul spacing="normal">
          <li>
            <t>Decoupling gateways from systems: the protocol should not rely on a specific implementation of a gateway or a cross-gateway communication protocol, nor should the protocol be restricted to a particular pair of view generation-validation processes in the respective systems. Different components and even systems can be replaced without requiring modifications to the high-level protocol semantics.</t>
          </li>
          <li>
            <t>Technology-neutral cross-gateway communication: the cross-gateway communication protocol, e.g., SATP <xref target="SATP"/>, should be oblivious to the nature and implementation of the endpoint systems. As a corollary, the protocol units internal to the system should also be oblivious to the cross-gateway discovery and communication mechanisms.</t>
          </li>
          <li>
            <t>Trust through native consensus: end-to-end trust should be realized by implementing the view generation and validation procedures the same way as any distributed consensus-driven operation in the respective systems. This respects the native decision-making processes in those systems and enables multi-party groups backing those systems to interact with each other as units.</t>
          </li>
          <li>
            <t>Minimize trust in gateways: the integrity of the protocol should not be dependent on the reliability of either gateway. The next subsection elaborates on the desired security properties.</t>
          </li>
          <li>
            <t>Preserving system autonomy and self-sovereignty: the endpoint systems should have complete freedom in determining their respective access controls and verification policies, and in choosing when to initiate a view request or whether to respond to a view request. The internal activities of each system should be oblivious to the other and should not affect data sharing protocol instance.</t>
          </li>
          <li>
            <t>Accommodating heterogeneity: the end-to-end protocol should work the same regardless of the distributed ledger technology implementation backing either endpoint system.</t>
          </li>
          <li>
            <t>Avoid synchronization: the protocol should not rely on any externally guided synchronization mechanism, such as a global clock, and instead rely purely on asynchronous message transfers.</t>
          </li>
        </ul>
      </section>
      <section anchor="security-considerations">
        <name>Security Considerations</name>
        <t anchor="data-sharing-security">The security considerations of the protocol include, but are not limited to, the following:
- Distributed consensus: rely on the consensus mechanism of the counterparty system both to authenticate view requests and to validate views. This can mitigate (or avoid) Byzantine failure of malicious nodes within the endpoint systems. It can also prevent a malicious client from supplying a fake view in the destination system.
- Integrity: rely on digital signatures over the view requests and responses (made by the client in the destination system and peers in the source system) so that the gateways cannot tamper with the messages undetected.
- Confidentiality: rely on end-to-end encryption of the view response so that the gateways cannot exfiltrate the view contents and/or the associated proofs. Exfiltration will violate the access control policies of the source system.
- Availability: rely on redundancy and failover to mitigate against denial-of-service attacks mounted by either gateway. Multiple gateways should be configured and kept on standby in practice.</t>
      </section>
      <section anchor="privacy-considerations">
        <name>Privacy Considerations</name>
        <t anchor="data-sharing-privacy">Access control policies allow source systems to have privacy by default, and only reveal the minimum ledger information necessary to external entities. Any data shared across two systems is private between them only if the gateways are maintained by stakeholders within the respective systems. This should be kept in mind when selecting or discovering gateways for data sharing instances.</t>
      </section>
      <section anchor="fault-tolerance-and-crash-recovery">
        <name>Fault Tolerance and Crash Recovery</name>
        <t anchor="data-sharing-fault-tolerance">The usual considerations of fault tolerance, crashes, and session maintenance, apply to gateways involved in data sharing. Various techniques for failover and session state and log backups can be used to guard against, or recover from, the possibility of either gateway failing during a data sharing instance. Details are beyond the scope of this draft, which makes no recommendations on this topic either.</t>
      </section>
    </section>
    <section anchor="pre-request-setup-and-configuration">
      <name>Pre-request setup and configuration</name>
      <t anchor="data-sharing-setup">Either endpoint system in a data sharing protocol instance must have the following configured in their respective data stores, which, if the system is a distributed ledger system, should be a shared ledger.</t>
      <ul spacing="normal">
        <li>
          <t>View request access control policies: as described in Section 8 in the Views and View Addresses draft <xref target="SATV"/>, one or more access control policy rules according to the given specification should be recorded before a data sharing protocol instance. If a view request is received by a system and there is no appropriate policy rule in the system’s record, the principle of least privilege should be applied, and the view request rejected.</t>
        </li>
        <li>
          <t>View verification policies: as described in Section 6 in the Views and View Addresses draft <xref target="SATV"/>, one or more verification policies according to the given specification should be recorded before a data sharing protocol instance. If a view is received by a system and there is no appropriate policy rule in the system’s record, the view should be deemed invalid. The client itself ought to avoid sending a view request if an appropriate verification policy cannot be retrieved, but even if a malicious client proceeds with a spurious view request, the destination system’s back end should declare the proof accompanying the view response to be invalid.</t>
        </li>
        <li>
          <t>External identities and certifications: participating systems can be abstracted into one or more security domains that represent the stakeholders of that system. For effective policy enforcement, i.e., to authenticate a view request or validate a view, knowledge of a remote system’s security domains—identity providers, certification authorities, and group structure if the system is a distributed ledger—is necessary. This information is typically, though not limited to, a set of certificate hierarchies, which should be determined and recorded to the system’s data store before a data sharing protocol instance. In the absence of such recorded information about the counterparty system, the protocol should terminate in the view request access control check step or in the view validation step.</t>
        </li>
      </ul>
    </section>
    <section anchor="related-open-issues">
      <name>Related Open Issues</name>
      <t anchor="open-issues">This draft provides a specification for views and how to addresses them. It further describes a protocol whereby one system can request a view from another through gateways. But there are several aspects of the end to-end process, which are extraneous to the data sharing protocol yet crucial to its successful completion. Though detailed specifications of these are beyond the scope of this draft, we list them in this section for readers’ considerations.</t>
      <section anchor="global-identification-of-blockchain-systems-and-public-keys">
        <name>Global identification of blockchain systems and public keys</name>
        <t anchor="open-issues-identification">To construct a view address as well as determine a suitable gateway to send a view request to, we need identifiers and naming systems for distributed ledgers and the networks that maintain them. In addition, we need ways to associate public keys with these names for authentication purposes. Further, we need mechanisms to store and retrieve these identifiers and keys in a distributed, and ideally decentralized, manner. The concepts of Decentralized Identifiers <xref target="DID"/> and Self-Sovereign Identity <xref target="SSI"/> are promising technologies to begin devising such specifications.</t>
      </section>
      <section anchor="discovery-of-gateways-nodes-within-a-blockchain-system">
        <name>Discovery of gateways nodes within a blockchain system</name>
        <t anchor="open-issues-discovery-local">To initiate a data sharing protocol, a client in a distributed ledger system needs to identify a suitable gateway node. This can be done in several different ways, one of which involves registering the set of gateways on a shared ledger within the system. Because, ideally, the gateway does not need to be highly trusted, there are few security implications but potentially larger efficiency implications in the choice of mechanism for registration and discovery of local gateway nodes.</t>
      </section>
      <section anchor="remote-gateway-discovery">
        <name>Remote gateway discovery</name>
        <t anchor="open-issues-discovery-remote">How gateways can discover other gateways acting on behalf of remote distributed ledger systems is an open question. The problem can be related to the routing problem (i.e., discovery of routing paths) in packet networking <xref target="RFC791"/>.</t>
      </section>
      <section anchor="decentralized-identity-management-across-distributed-ledger-systems">
        <name>Decentralized identity management across distributed ledger systems</name>
        <t anchor="open-issues-id-mgmt">Mechanisms are required to continuously sync external identities and certifications as described in Section 5 as a basis for data sharing. To keep these mechanisms are decentralized as possible and leverage existing identity registries, we can leverage the concepts of decentralized identifiers <xref target="DID"/> and verifiable credentials <xref target="VC22"/>. Protocols for this purpose, which use DID registries and trust anchors, have been proposed <xref target="WRFCDID"/>, and we can use them as starting points for this specification.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="DID" target="https://w3c.github.io/did/">
          <front>
            <title>Decentralized Identifiers (DIDs) v1.1, Core architecture, data model, and representations (W3C Candidate Recommendation Snapshot)</title>
            <author initials="M." surname="Sporny">
              <organization/>
            </author>
            <author initials="D." surname="Longley">
              <organization/>
            </author>
            <author initials="M." surname="Sabadello">
              <organization/>
            </author>
            <author initials="D." surname="Reed">
              <organization/>
            </author>
            <author initials="O." surname="Steele">
              <organization/>
            </author>
            <author initials="C." surname="Allen">
              <organization/>
            </author>
            <date year="2025" month="September"/>
          </front>
        </reference>
        <reference anchor="FATF" target="http://www.fatf-gafi.org/publications/fatfrecommendations/documents/fatf-recommendations.html">
          <front>
            <title>International Standards on Combating Money Laundering and the Financing of Terrorism &amp; Proliferation - The FATF Recommendations</title>
            <author initials="" surname="FATF">
              <organization/>
            </author>
            <date year="2018" month="October"/>
          </front>
        </reference>
        <reference anchor="ISO" target="https://www.iso.org/standard/82208.html">
          <front>
            <title>Blockchain and distributed ledger technologies-Vocabulary (ISO:22739:2024)</title>
            <author initials="" surname="ISO">
              <organization/>
            </author>
            <date year="2024" month="January"/>
          </front>
        </reference>
        <reference anchor="NIST" target="https://doi.org/10.6028/NIST.IR.8202">
          <front>
            <title>NIST Blockchain Technology Overview (NISTR-8202)</title>
            <author initials="D." surname="Yaga">
              <organization/>
            </author>
            <author initials="P." surname="Mell">
              <organization/>
            </author>
            <author initials="N." surname="Roby">
              <organization/>
            </author>
            <author initials="K." surname="Scarfone">
              <organization/>
            </author>
            <date year="2018" month="October"/>
          </front>
        </reference>
        <reference anchor="RFC791">
          <front>
            <title>Internet Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="STD" value="5"/>
          <seriesInfo name="RFC" value="791"/>
          <seriesInfo name="DOI" value="10.17487/RFC0791"/>
        </reference>
        <reference anchor="SATA" target="https://datatracker.ietf.org/doc/draft-ietf-satp-architecture/">
          <front>
            <title>Secure Asset Transfer (SAT) Interoperability Architecture, IETF, draft-ietf-satp-architecture-08</title>
            <author initials="T." surname="Hardjono">
              <organization/>
            </author>
            <author initials="M." surname="Hargreaves">
              <organization/>
            </author>
            <author initials="N." surname="Smith">
              <organization/>
            </author>
            <author initials="V." surname="Ramakrishna">
              <organization/>
            </author>
            <date year="2025" month="July"/>
          </front>
        </reference>
        <reference anchor="SATP" target="https://datatracker.ietf.org/doc/draft-ietf-satp-core/">
          <front>
            <title>Secure Asset Transfer Protocol (SATP) Core, IETF, draft-ietf-satp-core-11</title>
            <author initials="M." surname="Hargreaves">
              <organization/>
            </author>
            <author initials="T." surname="Hardjono">
              <organization/>
            </author>
            <author initials="R." surname="Belchior">
              <organization/>
            </author>
            <author initials="V." surname="Ramakrishna">
              <organization/>
            </author>
            <author initials="A." surname="Chiriac">
              <organization/>
            </author>
            <date year="2025" month="August"/>
          </front>
        </reference>
        <reference anchor="SATU" target="https://datatracker.ietf.org/doc/draft-ietf-satp-usecases/">
          <front>
            <title>Secure Asset Transfer (SAT) Use Cases, IETF, draft-ietf-satp-usecases-06</title>
            <author initials="V." surname="Ramakrishna">
              <organization/>
            </author>
            <author initials="T." surname="Hardjono">
              <organization/>
            </author>
            <author initials="C." surname="Liu">
              <organization/>
            </author>
            <date year="2025" month="July"/>
          </front>
        </reference>
        <reference anchor="SATV" target="https://datatracker.ietf.org/doc/draft-ramakrishna-satp-views-addresses/">
          <front>
            <title>Views and View Addresses for Secure Asset Transfer, IETF, draft-ramakrishna-satp-views-addresses-06</title>
            <author initials="V." surname="Ramakrishna">
              <organization/>
            </author>
            <author initials="V." surname="Pandit">
              <organization/>
            </author>
            <author initials="E." surname="Abebe">
              <organization/>
            </author>
            <author initials="S." surname="Nishad">
              <organization/>
            </author>
            <author initials="K." surname="Narayanam">
              <organization/>
            </author>
            <date year="2025" month="September"/>
          </front>
        </reference>
        <reference anchor="SSI" target="https://sovrin.org/wp-content/uploads/2018/03/The-Inevitable-Rise-of-Self-Sovereign-Identity.pdf">
          <front>
            <title>The Inevitable Rise of Self-Sovereign Identity, A white paper from the Sovrin Foundation</title>
            <author initials="A." surname="Tobin">
              <organization/>
            </author>
            <author initials="D." surname="Reed">
              <organization/>
            </author>
            <date year="2017" month="March"/>
          </front>
        </reference>
        <reference anchor="VC22" target="https://w3c.github.io/vc-data-model/">
          <front>
            <title>Verifiable Credentials Data Model v2.1 (W3C Editor’s Draft)</title>
            <author initials="M." surname="Sporny">
              <organization/>
            </author>
            <author initials="D." surname="Longley">
              <organization/>
            </author>
            <author initials="D." surname="Chadwick">
              <organization/>
            </author>
            <author initials="I." surname="Herman">
              <organization/>
            </author>
            <date year="2025" month="May"/>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="ABCH20" target="https://arxiv.org/abs/2007.11877">
          <front>
            <title>Proposal for a Comprehensive Crypto Asset Taxonomy</title>
            <author initials="T." surname="Ankenbrand">
              <organization/>
            </author>
            <author initials="D." surname="Bieri">
              <organization/>
            </author>
            <author initials="R." surname="Cortivo">
              <organization/>
            </author>
            <author initials="J." surname="Hoehener">
              <organization/>
            </author>
            <author initials="T." surname="Hardjono">
              <organization/>
            </author>
            <date year="2020" month="May"/>
          </front>
        </reference>
        <reference anchor="BVGC20" target="https://arxiv.org/abs/2005.14282v2">
          <front>
            <title>A Survey on Blockchain Interoperability: Past, Present, and Future Trends</title>
            <author initials="R." surname="Belchior">
              <organization/>
            </author>
            <author initials="A." surname="Vasconcelos">
              <organization/>
            </author>
            <author initials="S." surname="Guerreiro">
              <organization/>
            </author>
            <author initials="M." surname="Correia">
              <organization/>
            </author>
            <date year="2020" month="May"/>
          </front>
        </reference>
        <reference anchor="Clar88">
          <front>
            <title>The Design Philosophy of the DARPA Internet Protocols, ACM Computer Communication Review, Proc SIGCOMM 88, vol. 18, no. 4, pp. 106-114</title>
            <author initials="D." surname="Clark">
              <organization/>
            </author>
            <date year="1988" month="August"/>
          </front>
        </reference>
        <reference anchor="Ethe22" target="https://ethereum.org/en/whitepaper/">
          <front>
            <title>Ethereum Whitepaper</title>
            <author>
              <organization/>
            </author>
            <date year="2022" month="September"/>
          </front>
        </reference>
        <reference anchor="Gray81">
          <front>
            <title>The Transaction Concept: Virtues and Limitations, in VLDB Proceedings of the 7th International Conference, Cannes, France, September 1981, pp. 144-154</title>
            <author initials="J." surname="Gray">
              <organization/>
            </author>
            <date year="1981" month="September"/>
          </front>
        </reference>
        <reference anchor="Herl19" target="https://doi.org/10.1145/3209623">
          <front>
            <title>Blockchains from a Distributed Computing Perspective, Communications of the ACM, vol. 62, no. 2, pp. 78-85</title>
            <author initials="M." surname="Herlihy">
              <organization/>
            </author>
            <date year="2019" month="February"/>
          </front>
        </reference>
        <reference anchor="HLP19" target="https://ieeexplore.ieee.org/document/8743548">
          <front>
            <title>Towards an Interoperability Architecture for Blockchain Autonomous Systems, IEEE Transactions on Engineering Management</title>
            <author initials="T." surname="Hardjono">
              <organization/>
            </author>
            <author initials="A." surname="Lipton">
              <organization/>
            </author>
            <author initials="A." surname="Pentland">
              <organization/>
            </author>
            <date year="2019" month="June"/>
          </front>
        </reference>
        <reference anchor="HS2019" target="https://doi.org/10.3389/fbloc.2019.00024">
          <front>
            <title>Decentralized Trusted Computing Base for Blockchain Infrastructure Security, Frontiers Journal, Special Issue on Blockchain Technology, Vol. 2, No. 24</title>
            <author initials="T." surname="Hardjono">
              <organization/>
            </author>
            <author initials="N." surname="Smith">
              <organization/>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
        <reference anchor="IDevID" target="https://datatracker.ietf.org/doc/draft-irtf-t2trg-taxonomy-manufacturer-anchors/">
          <front>
            <title>A Taxonomy of operational security considerations for manufacturer installed keys and Trust Anchors. IETF draft-irtf-t2trg-taxonomy-manufacturer-anchors-11</title>
            <author initials="M." surname="Richardson">
              <organization/>
            </author>
            <date year="2025" month="August"/>
          </front>
        </reference>
        <reference anchor="SRC84">
          <front>
            <title>End-to-End Arguments in System Design, ACM Transactions on Computer Systems, vol. 2, no. 4, pp. 277-288</title>
            <author initials="J." surname="Saltzer">
              <organization/>
            </author>
            <author initials="D." surname="Reed">
              <organization/>
            </author>
            <author initials="D." surname="Clark">
              <organization/>
            </author>
            <date year="1984" month="November"/>
          </front>
        </reference>
        <reference anchor="WRFCDID" target="https://github.com/hyperledger-cacti/cacti/blob/main/weaver/rfcs/models/identity/network-identity-management.md">
          <front>
            <title>Decentralized Network-Identity Discovery and Management for Interoperation, Hyperledger Cacti - Weaver, RFC 01-011, LFDT</title>
            <author initials="V." surname="Ramakrishna">
              <organization/>
            </author>
            <author initials="K." surname="Narayanam">
              <organization/>
            </author>
            <author initials="B." surname="Chandra Ghosh">
              <organization/>
            </author>
            <author initials="E." surname="Abebe">
              <organization/>
            </author>
            <date year="2022" month="August"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
