Towards data sovereignty in cyberspace