Components and Architecture of the Cesonia Technology Platform
The Cesonia Data Virtualization Application acts as a middle layer allowing the virtual integration of data. Coming from various types of data sources it enables authorized data consumers to access the entirety of an organization’s data from a single point of access. The Data Virtualization Application also enables access management since it allows the data owner to define who is able to access which data and who is not. By using the technology of data virtualization
we manage to establish a Single Point of Truth for all the stakeholders and provide up-to-date data in the most cost-efficient manner possible.
The communication between the Cesonia Data Virtualization Application, individually operated by each company is based on the MQTT protocol, that is previously mainly used for machine to machine communication for IoT applications. However, this protocol allows secure, bidirectional communication. The protocol allows clients to subscribe to channels that can be used to propagate information to a specific topic. All clients that have subscribed to a channel are then guaranteed to receive a message that was sent to this channel, even if they are currently not available.
The revision proves audit-trail is based on Hyperledger Fabric, an open-source enterprise-grade permissioned distributed ledger technology (DLT) platform, designed for use in enterprise contexts. The audit trail stores the user activities on a private blockchain to keep them immutable, traceable, and more secure for the participating organizations of our platform. A governance model (such as a legal agreement or framework) is used to operate the network to build trust between the participants.
In the following, the elements of the perfect workflow to support an efficient and secure collaboration through the entire supply chain are described. They can be differentiated in the areas of data sharing and collaboration.
Real-time data access: Real-time access to current and reliable data across company boundaries.
Rights and role management: Decentralized roles and rights management for the administration of data access rights.
Blockchain-based audit trail: Audit-proof and non-manipulable audit trail traceability of actions and transactions.
Data lineage: Data lifecycle and traceability of the origin of the data across company boundaries.
Onboarding of partners & authentication: Fast onboarding and integration of external partners to projects and workflows.
Workflow engine: Digitize, automate, and synchronize business processes and workflows for greater efficiency.
Workspaces: Define the project scope and organize collaboration on a single point of truth and a web interface.
Applications & Services: Applications are part of a workspace and allow to view, collaborate, coordinate, edit and comment on data and information.
Even though the actual benefits depend on the use case and the respective application, some basic similarities and advantages can be identified.
Consistent workflows for direct and fast feedback
Due to the length of time, it takes and the susceptibility for errors, manual processes are one of the greatest challenges and risks in cross-company collaboration. A common web interface and seamless information flow – between IT systems and across company boundaries – allows direct and fast feedback based on a common data view.
High data quality and low costs
The direct access to the source systems, the abstraction of the data from the back-end systems and the associated system- and format-independent exchange of data between companies and systems increase the data quality and lowers the costs for all participants.
Up-to-date and flexible
The open architecture supports a wide range of applications. It allows any further use of the connected data by third-party applications as well as the synchronization of individual business processes. The networking of companies and their systems through our virtual data room in conjunction with flexible data management enables access to high-quality, up-to-date and reliable data in real-time as well as a consistent database and ultimately more transparency in collaboration.
Save and traceable
In combination with a non-manipulable audit trail, decentralized data storage ensures maximum security, sovereignty, and traceability for end-to-end data governance. This makes it possible to monitor which data has been exchanged with whom, over what period, and for what purpose
Get to know more about the innovative work being done at Cesonia
and don’t miss out on our Blog page, Reshaping Business trough data virtualization in a globalized and connected business world.
Thank you for reading.