当前位置:网站首页>Ten thousand words! In depth analysis of the development trend of multi-party data collaborative application and privacy computing under the data security law
Ten thousand words! In depth analysis of the development trend of multi-party data collaborative application and privacy computing under the data security law
2022-06-26 15:59:00 【Tencent big data official】
The author of this article : Cheng Yong
《 Data security law 》 The adoption of the vote marks that the State encourages the use of data in accordance with the law 、 Ensure the orderly circulation of data according to law , Clarify the national implementation of big data strategy , Promote the development of digital economy with data as the key factor of production .《 Data security law 》 Emphasize the balance between data security and development and utilization , Pay equal attention to ensuring data security and promoting data development and utilization , While standardizing data security supervision and Governance , It also brings new development opportunities to multi-party data collaborative application .
In this situation , There is an urgent need for effective technology and business model innovation to realize compliant multi-party data collaborative application , Achieve the balance between data security and data development and utilization . Privacy computing will become the key technical fulcrum to balance data security and application development . This paper mainly discusses 《 Data security law 》 The development trend of multi-party data cooperative application and privacy computing under the framework .
1.《 Data security law 》 Advocate the balance between data security and development and utilization
2021 year 6 month 10 The 29th meeting of the Standing Committee of the 13th National People's Congress voted and adopted 《 Data security law of the people's Republic of China 》( abbreviation 《 Data security law 》), Will be in 2021 year 9 month 1 The effective date .《 Data security law 》 The full text consists of seven chapters and 55 articles , Respectively from the Data security and development 、 Data security system 、 Data security obligations 、 Government data security and openness The obligations and corresponding legal responsibilities of data security protection are stipulated from the perspective of [1-15], Its key provisions mainly involve the data security system at the national and local government levels 、 Encourage the rational and effective use of data according to law 、 Data security obligations at the data processor level 、 And penalties for violations . It is important to promote the balance between data security and development 《 Data security law 》 One of the most important features . In a separate chapter ( Chapter five ) Make provisions for the security and open utilization of government data , It's also 《 Data security law 》 A distinguishing feature of .
《 Data security law 》 Is the 2017 year 6 month 1 Day implementation 《 Network security law of the people's Republic of China 》( abbreviation 《 Network security law 》) After putting forward the concept of data and data security , A major milestone in national data security legislation [16, 17].《 Data security law 》 And 《 Network security law 》 And in the process of legislation 《 Personal information protection law of the people's Republic of China 》( abbreviation 《 Personal information protection law ( The draft )》) It forms the legal framework in the field of information and data security in China .《 Data security law 》 It is not a law specifically for the protection of users' personal privacy information , The law most relevant to the protection of personal privacy is under development 《 Personal information protection law 》.2021 year 4 month 29 China's National People's Congress announced on its website 《 Personal information protection law ( Draft for second deliberation )》). at present 《 Personal information protection law ( Second review )》 Already in 5 month 28 Complete the consultation procedure on the day of , It is expected to pass a vote and implement this year .
chart 1 《 Data security law 》 The full text consists of seven chapters and 55 articles [3]
In the digital economy , Data has become a key factor of production and an important strategic resource , It has had a significant impact on economic and social development , The importance of data has also been further highlighted . One side , The development of digital economy is based on the development and application of big data ; On the other hand , Data security and privacy protection have also attracted more and more attention .《 Data security law 》 The effective supervision and governance of data has realized that there are laws to follow , It fills the gap of data security protection legislation , The legal system of cyberspace and data security governance has been improved , At the same time, we also encourage the rational and effective use of data according to law , Encourage technology and business innovation to achieve a balance between data security and application development . Yes 《 Data security law 》 Key points of interpretation and interpretation , Readers can refer to the literature [3-15]. This paper mainly discusses the balance between data security and development in 《 Data security law 》 The development trend of multi-party data cooperative application and privacy computing under the framework . We see :(1)《 Data security law 》 Advocate the balance between data security and development and utilization ;(2) Privacy computing will become the key technology to balance data security and utilization ;(3) Multi party data collaborative application will usher in more development opportunities . Here, data cooperative application refers to multi-party joint modeling and joint data analysis through privacy computing without sharing plaintext data , That's what we often say “ Data available ( count ) invisible ”.
2.《 Data security law 》 Multi party data collaborative application will usher in more development opportunities in the next century
《 Data security law 》 It will benefit the development of multi-party data collaborative application , Encourage secure multi-party data cooperation through technology and business model innovation , Achieve the goal of balancing data security and application development . for example ,《 Data security law 》 Article 14 of Chapter II of the provides that :“ The State implements the big data strategy , Promote the construction of data infrastructure , Encourage and support data in all industries 、 Innovative applications in various fields . People's governments at or above the provincial level shall incorporate the development of digital economy into their national economic and social development plans , And formulate the development plan of digital economy according to the needs .” thus it can be seen ,《 Data security law 》 The introduction of will further promote the development of digital economy , Promote the innovation of more data application models , Promote the development of multi-party data collaborative applications . While ensuring data security , Multi party data collaborative application based on privacy computing will become the main inter agency data cooperation mode .
2.1 Realize the balance between data security and collaborative application development through technology and business model innovation
《 Data security law 》 It's not just about data security and governance , Instead, it advocates equal emphasis on data security and application development , Adhere to the principle of paying equal attention to ensuring data security and promoting data development and utilization [14].《 Data security law 》 It is fully clear to balance data security and application development , Emphasis is placed on improving the level of data security governance and data development and utilization , Promote the development of digital economy with data as the key element . for example , In addition to the above 《 Data security law 》 Chapter II Article 14 ,《 Data security law 》 Article 7 of Chapter I also makes it clear :“ The state protects individuals 、 Organize data related interests , Encourage the rational and effective use of data according to law , Ensure the orderly and free flow of data according to law , Promote the development of digital economy with data as the key element .” Here again, we emphasize that we should pay equal attention to protecting data security and encouraging legitimate data applications . stay 《 Data security law 》 Within the framework of , Balancing data security and the development of big data industry is an effective path in line with the national big data strategy and promoting the development of digital economy .
Besides ,《 Data security law 》 Article 13 of Chapter II is also clear :“ The State coordinates development and security , Adhere to data development and utilization and industrial development to promote data security , Ensure data development, utilization and industrial development with data security .” It is further emphasized here that “ Data security ” And “ Data utilization ” The relationship between : reasonable 、 Effective data utilization can promote data security and governance , Data security can ensure the healthy development of data application industry . so ,《 Data security law 》 The emphasis is on “ Balance between data security and application development ”, Encourage the innovation of data security technology and application business model , And promote data security and governance through data application .
chart 2 《 Data security law 》 Advocate the balance between data security and development and utilization , Privacy computing can be used as a technical fulcrum to achieve the balance between data protection and data development and utilization
In the digital economy , Data security and development and utilization capacity have become an important part of the national production capacity matrix . The key elements of data and the role of innovation engine , It can accelerate the formation of a digital economy led and supported by business model innovation , Better serve economic and social development . As a new factor of production , The analysis of big data can also boost scientific and technological innovation 、 Judge business trends 、 Achieve precision marketing 、 Carry out educational model reform, etc [13]. Big data continues to drive technological breakthroughs , Innovative business model , Give birth to new industrial ecology , Improve economic efficiency . With the rapid development of data technology , The underdevelopment of big data industry will become the biggest insecurity of digital economy and society [13].
How to grasp the balance between data security and encouraging data development and utilization , Realize the balanced governance of data security and development in the process of data value release , This is a topic of great concern at present . Realizing the balance between data security and development requires the innovation of data security technology and big data application business model , The industry generally agrees that privacy computing will become the key technology to balance data security and application development [10, 19]. Privacy computing as a new technology , Multi party data joint calculation can be carried out without sharing plaintext data , Realize cross agency data collaborative application , It will become the key technical fulcrum of data protection and data application balance [10]. Privacy computing enables enterprises to meet data compliance requirements , It can fully mobilize the enthusiasm of data resource owners and users , Realize multi-party data collaborative application , And it can release the value of data resources of third-party institutions , Promote the marketization of data elements . stay 《 Data security law 》 Within the framework of , Privacy computing is more valuable .
2.2 The implementation of data classification and hierarchical protection will bring more opportunities for data development and utilization
《 Data security law 》 Encourage the implementation of data classification and hierarchical protection , This will bring more data application opportunities , So that more data can be developed and utilized . for example ,《 Data security law 》 Article 21 of Chapter III stipulates that :“ The state establishes a data classification and hierarchical protection system , According to the importance of data in economic and social development , And once tampered with 、 damage 、 Divulge or illegally acquire 、 Illegal use of , For national security 、 Public interest or personal 、 The degree of harm caused by the legitimate rights and interests of the organization , Classify and protect data . The national data security coordination mechanism coordinates relevant departments to develop important data catalogues , Strengthen the protection of important data . Related to national security 、 The lifeblood of the national economy 、 Important people's livelihood 、 Data such as major public interests belong to the national core data , A more stringent management system . Regions 、 All departments should implement the system of data classification and hierarchical protection , Identify the region 、 Our department and related industries 、 Specific directory of important data in the field , Focus on protecting the data listed in the catalog .”
thus it can be seen ,《 Data security law 》 It stipulates the classification and hierarchical management of data for the purpose of national security , On the basis of distinguishing important data from unimportant data , Strengthen the key regulation of national core data , And with a special chapter ( Chapter five ) Clarify the security and opening system of government data .《 Data security law 》 Equipped with a regulatory system with important data as the core , It fully embodies the principle of hierarchical and classified management and protection of data governance in China [14, 15].
chart 3 Examples of data classification : data 、 Personal information 、 Important data [15]
《 Data security law 》 There is no detailed guidance on how to classify data and implement classified protection , Instead, local government departments and industry regulators are required to implement a hierarchical protection system according to data classification , Identify the region 、 Our department and related industries 、 Specific directory of important data in the field , Focus on protecting the data listed in the catalog . and 《 Data security law 》 It did not “ Important data ” Clearly defined . Reference resources 《 Data security management measures ( Solicitation draft )》 Yes “ Important data ” The definition of :“ It means that once leaked, it may directly affect national security 、 Economic security 、 Social stability, 、 Public health and safety data , Such as unpublished government information , A large population 、 Genetic health 、 Geography 、 Mineral resources, etc .” It is worth noting that , according to 《 Data security management measures ( Solicitation draft )》,“ Important data ” Generally, it does not include enterprise production and operation and internal management information 、 Personal information, etc [15].
basis 《 Data security law 》 Full text 、 As well as the 《 Personal information protection law 》 Look at , From the perspective of data security supervision , In the future, the data may be classified into the following three categories [15]: data ( It refers to any record of information in electronic or non-electronic form )、 Personal information 、 Important data . For these three types of data ,《 Network security law 》、《 Data security law 》、《 Personal information protection law ( The draft )》 Put forward the supporting safety protection requirements .
Data classification and hierarchical governance will bring more data application opportunities , stay 《 Data security law 》 Under the framework, we can develop and utilize data of different classifications more flexibly . For different application scenarios , for example , Finance 、 government affairs 、 Medical care 、 advertisement 、 Education, etc , Different data protection mechanisms can be adopted , Provide different levels of security protection , In this way, the collaborative application of multi-party data can be realized through different technical means , It can serve more business scenarios . In this context , Privacy computing platform products should include a variety of privacy mechanisms , According to the specific classification and classification of data protection scenarios, optional privacy protection schemes are provided , Applicable to more practical application scenarios .
《 Data security law 》 Further improve the system and norms to promote the cross-border flow of data . Under the background of economic and Technological Globalization , The cross-border flow of data will become more and more frequent , Support international cooperation in the field of data , Promote the cross-border flow of data [11]. for example ,《 Data security law 》 Article 11 of Chapter I stipulates :“ The state actively carries out data security governance 、 International exchanges and cooperation in data development and utilization , Participate in the formulation of international rules and standards related to data security , Promote cross-border data security 、 Free flow .” stay 《 Data security law 》 Within the framework of , The cross-border flow of data should be balanced “ Security ” And “ Development ”, Classify and protect cross-border data , Stick to the safety bottom line according to the requirements of laws and regulations , At the same time, continue to promote data flow , Effectively release data value . Data export control helps to balance data sovereignty and data cross-border flow , We should pay equal attention to security and development [11]. Cross border data collaborative application will bring huge market value .
2.3 The open application of government data will effectively promote the development of data business in relevant industries
《 Data security law 》 Encourage the development and application of government data , It will promote the development of government enterprise data collaborative application . Government data is a kind of highly effective data , In Finance 、 government affairs 、 Medical care 、 There are rich application scenarios in education and other fields . In particular, the rapid development of financial technology provides a broad space for the application of government data in the financial field [20]. Government data has become an important tool to promote government scientific decision-making 、 Accurate ShiCe 、 Important resources to improve the efficiency of Public Management . On the premise of data security ,《 Data security law 》 With a special chapter ( Chapter five ) The form of defines the principle of openness of government data 、 The basic idea of non disclosure as an exception . for example ,《 Data security law 》 Article 42 of Chapter V stipulates that :“ The State formulates an open catalogue of government data , Build a unified specification 、 Interconnection 、 A safe and controllable open platform for government data , Promote the open utilization of government data .”
In terms of government data interconnection , For the ubiquitous government data in practice “ Unwilling to open 、 Dare not open 、 Not open ” Other questions ,《 Data security law 》 It is required to establish an open platform for government data at the national level , And deal with the fragmentation of data resources in the field of government data in the form of open directory of government data 、 The development of government affairs is uneven 、 Lack of mutual trust in government coordination and other issues . stay 《 Data security law 》 Within the framework of , The opening of government data will bring new data application opportunities . Through privacy computing technology , for example , Federal learning 、 secure multi-party computation , Can unite government affairs 、 Enterprises 、 Bank and other multi-party data for joint calculation , Realize multi-party joint modeling and joint data analysis without data sharing , Release the application value of data fusion on the premise of protecting user privacy and data security , Create a new data application business model .
chart 4 government affairs 、 Enterprises 、 Bank tripartite data collaborative application , Form a closed loop of data collaborative application
《 Data security law 》 Encourage the exploration of new government data application modes through technological and business innovation , for example , Formulate norms and systems for classification, classification and sharing , Do a good job of convenience 、 Security 、 The balance between privacy , Protect the data that should be protected , Operations should be open to data . Blockchain technology can be used to clearly define data ownership 、 Management power 、 Right to use , Make all parties in the chain exchange data based on algorithm mutual trust . Can make full use of federal learning 、 Secure multi-party computing technology , So that all parties do not share the original data , Conduct joint modeling and collaborative training , Give full play to the value of underlying data , And avoid direct data sharing , So as to effectively solve the security and trust problems in cross departmental data cooperation .
3、《 Data security law 》 Privacy computing will become the key technology to balance data security and development
stay 《 Data security law 》 Within the framework of , Privacy computing will rapidly develop into a technical fulcrum to balance data security and application development , Among enterprises in the future 、 Data governance and data collaborative application among organizations 、 And things like artificial intelligence 、 New infrastructure and other emerging digital industries play a key role . The supporting privacy computing group standard 、 Industry standard 、 Even national standards will be gradually improved . Authoritative evaluation and certification of privacy computing platform products ( Including security 、 Basic function 、 Performance evaluation ) It will also gradually standardize and mature , And further promote the large-scale commercial use of private computing .
3.1 Privacy computing will become the key technical fulcrum to balance data security and development and utilization
《 Data security law 》 When data activities are required, corresponding technical measures and other necessary measures shall be taken to ensure data security , And encourage technological innovation to achieve a balance between data security and development . for example ,《 Data security law 》 Article 16 of Chapter II stipulates that “ The State supports data development and utilization and data security technology research , Encourage technology promotion and business innovation in the fields of data development and utilization and data security , Cultivation 、 Develop data development and utilization and data security products 、 The industrial system .” In this context , Privacy computing will become the key technical fulcrum to balance data security and application development .
Privacy computing is a technology and system that is jointly calculated by two or more participants , Participants carry out joint machine learning and joint analysis on their data through cooperation without divulging their own data [10, 19]. The participants of privacy computing can be different departments of the same organization , It can also be different institutions . Under the framework of privacy Computing , The data of the participants cannot be sent out of the local in clear text , Realize multi-source data cross domain cooperation while protecting data security , It can solve the problems of data protection and fusion applications [19]. Common technology paths to achieve privacy computing include federated learning 、 secure multi-party computation 、 Trusted computing, etc . Besides , Blockchain is also an important supplement to privacy computing , It can ensure the credibility of the calculation process and data , Realize a wider range of data collaborative applications .
Driven by the development of artificial intelligence and big data applications , Federated learning is the main promotion and application method in the field of privacy computing , It is the most mature technology path in the field of privacy computing . In artificial intelligence 、 In the new technology cycle represented by big data application , Privacy computing puts forward higher data governance requirements for Internet platforms and enterprises , That is, we should really be user-centered , There is no need to rely on the data server controlled by the enterprise itself or a third-party company for security protection , Let users really master their own data ownership , Protecting data security and privacy requirements [20].
chart 5 Privacy computing architecture [19]
Privacy computing protects data security 、 Break the advantages of data island , There are more and more excellent landing scenes and cases , With the continuous improvement of data security and governance system , Privacy computing will maximize the value of data , Become data circulation 、 Share the necessary infrastructure . Data is becoming more and more valuable 、 Data security is becoming more and more important in the era of digital economy , Privacy computing will become the most important technical solution between user data security protection and enterprise data value . future , Privacy computing will be widely used in finance 、 government affairs 、 Medical care 、 advertisement 、 Education and many other data application fields , While solving the problem of data privacy protection , It also helps alleviate the problem of data islands in the industry , Provide a compliant solution for multi-party data collaborative application . In the field of private Computing , Legal positioning of data security use 、 Analysis and application of data within and between enterprises and global cross-border transaction and circulation of data , Are still facing unprecedented challenges .
3.2 Promote and standardize the development of private computing and large-scale business through industry standards
《 Data security law 》 Standardize the development of good privacy computing . At present , There are many domestic privacy computing enterprises , Each company has launched its own privacy computing platform products , No unified technical standards and specifications have been formed .《 Data security law 》 Article 17 of Chapter II stipulates that :“ The state promotes the construction of data development and utilization technology and data security standard system . The administrative department for standardization under the State Council and the relevant departments under the State Council shall, in accordance with their respective functions and duties , Organize the formulation and timely revision of relevant data development and utilization technologies 、 Standards related to product and data security . The State supports enterprises 、 Social groups and Education 、 Scientific research institutions participate in the formulation of standards .” therefore , stay 《 Data security law 》 Within the framework of , Privacy computing technology standards will be improved day by day , And through unified standards to promote and standardize the development of privacy computing technology and large-scale business .
chart 6 People's Bank of China 《 Multi party secure computing financial application technical specification 》(JR/T 0196—2020)[21]
for example ,2020 year 11 month 24 Japan , Issued by the people's Bank of China 《 Multi party secure computing financial application technical specification 》(JR/T 0196—2020, abbreviation 《 standard 》) Financial industry standards .《 standard 》 It specifies the basic requirements for the financial application of multi-party secure computing technology 、 safety requirements 、 Performance requirements, etc , It is suitable for financial institutions to carry out relevant product design 、 software development 、 Technology application, etc .《 standard 》 The release of helps to achieve without divulging the original data 、 Promote data cooperation and collaborative application among multiple subjects on the premise of ensuring information security .
China academy of information and communications ( abbreviation “ Xintong hospital ”) Jointly developed and revised a series of privacy computing standards with industry leaders , We hope to promote the development and compliance application of privacy computing technology , Lay a solid technical foundation for data compliance and circulation . Yunda Institute of ICT 、 The privacy Computing Alliance has long focused on the field of privacy computing , Relying on the big data technology standard Promotion Committee of China Communication Standardization Association (TC601) Formulated the 《 Data circulation products based on multi-party secure computing - Technical requirements and test methods 》、《 Data circulation products based on Federated learning - Technical requirements and test methods 》、《 Data computing platform based on trusted execution environment - Technical requirements and test methods 》、《 Technical requirements and test methods of blockchain assisted privacy computing technology tools 》4 Functional standard , as well as 《 Privacy computing - Performance requirements and test methods of multiparty secure computing products 》 And 《 Privacy computing - Federal learning product performance requirements and test methods 》2 Performance criteria [22, 23]. in addition , Special standards for product security of privacy computing platform and two standards for interconnection are also being formulated .
Beijing Financial Technology Industry Alliance is also actively cooperating with financial institutions 、 Financial technology enterprises 、 Internet companies formulate technical standards related to privacy Computing , for example , Standards under development include 《 Federal learning technology financial application specification - Technology Architecture 》、《 Federal learning technology financial application specification - Interconnection protocol 》、《 Current situation and implementation guidelines of multi-party secure computing finance 》 etc. .
3.3 Enhance the security and performance of private computing platform through industry authoritative evaluation
《 Data security law 》 It will promote the development of the evaluation system of private computing platform products . Facing many privacy computing platform products , At present, there is no unified 、 Authoritative security and performance evaluation certification . Especially the evaluation of security , There is no authoritative definition and test method according to the security boundary .《 Data security law 》 Article 18 of Chapter II stipulates that :“ The state promotes data security detection and evaluation 、 Development of certification and other services , Support data security detection and evaluation 、 Certification and other professional institutions carry out service activities according to law . The State supports relevant departments 、 Industry organizations 、 Enterprises 、 Educational and scientific research institutions 、 Relevant professional institutions are involved in data security risk assessment 、 To guard against 、 Cooperation in disposal, etc .” stay 《 Data security law 》 Within the framework of , Improving the authoritative evaluation and certification of the security and performance of privacy computing platform products will also become an important development trend . At present, there are mainly two domestic institutions that provide evaluation of privacy computing products .
National financial technology evaluation center ( Bank card testing center ) Established with the approval of the people's Bank of China , It is an authoritative testing institution in China's financial industry , Undertake the general purpose of bank card networking 、 Chip migration and important technical support for financial science and technology innovation . The national financial technology evaluation center has started the evaluation of multi-party secure computing application technology in the financial industry , The evaluation index includes basic characteristics 、 Ability to calculate 、 Computing performance 、 Dozens of indicators in the four areas of product safety .
China Academy of communications “ Big data product capability evaluation ” It is the first authoritative evaluation system for big data products in China , China Academy of communications and communications as the lead unit , And academia 、 Close cooperation between industry and users in the field , Jointly formulate evaluation standards , The experts of the review meeting come from the Institute 、 Tsinghua University 、 Chinese academy of sciences 、 Beijing University of Posts and telecommunications 、 Industrial and Commercial Bank of China 、 Everbright Bank 、 China Mobile 、 It is composed of experts from China Unicom . China Academy of communications “ Big data product capability evaluation ” It has become an authoritative third-party evaluation brand in the field of big data , Become the wind vane of supply side product R & D and demand side procurement selection . Tencent's own research Angel PowerFL The privacy computing platform has passed the evaluation and certification of privacy computing products of China Academy of communications .
Angel PowerFL The platform adopts a decentralized architecture , It can effectively avoid single point security risk ,3072 Bit high intensity homomorphic encryption calculation , Far beyond the of financial regulation 2048 Bit encryption level requirements , Provide greater security . meanwhile , Because the bottom layer adopts asynchronous and concurrent mechanism , At the same time, the encryption operation is optimized at the instruction level ,PowerFL It has achieved super industry 5 Times higher performance , The distributed architecture adopted by the platform , Support the calculation of 100 billion scale . Besides ,PowerFL The platform supports joint data modeling and joint data analysis , Provide end-to-end full scene privacy computing capability and one click cloud native deployment capability , More agile 、 Easy to use .PowerFL The framework has been completed CSIG Integration of aegis and Lingkun cloud products , Provide private computing platform products and services .
chart 7 tencent Angel PowerFL The platform passes the function evaluation of privacy computing products of the Institute of information and communications
chart 8 tencent Angel PowerFL The platform passed the special performance evaluation of privacy computing products of the Institute of information and communications
China Academy of communications “ Zhuoxin big data plan ” Federal learning technology security assessment , It has also attracted the attention of all parties in the industry , Relevant enterprises actively respond to and participate in . China Academy of communications “ Zhuoxin big data ” plan ,“ Federal learning safety assessment program ” Take federal learning products or programs as the evaluation object , Help enterprises find security problems , Improve the level of security protection in the application of federal Learning Technology .
4、 Conclusion and prospect
《 Data security law 》 Clarify the national implementation of big data strategy , Deepen the construction of data security system 、 Strengthen data security supervision and governance , It is proposed that the state will implement classification and classification protection for data , It is stipulated that the obligation of data security protection must be fulfilled when carrying out data activities , At the same time, it also emphasizes the need to promote the development and utilization of data , Encourage the development of data industry and legal and compliant commercial utilization , Standardized data element market . With 《 Data security law 》 Introduction and implementation of , Data resources will burst out with greater vitality , Further promote the security control and marketization of data elements , Enhance the value of big data resources . stay 《 Data security law 》 Within the framework of , We should strengthen data security supervision and governance , And promote the collaborative application of data , There is an urgent need for effective technical solutions to achieve the balance between data security and development . Data security control 、 Compliance data flow 、 Secure joint computing will become a part of the core competence of the big data industry , Realize data through privacy computing technology “ It's invisible ”、 data “ Available not visible ”, Achieve the goal of balancing data security and application development , It will continue to drive the development of digital economy industry with data as the key element .
reference
[1] xinhua ,( Authorized release ) Data security law of the people's Republic of China ,http://www.xinhuanet.com/2021-06/11/c_1127552204.htm
[2] Baidu Encyclopedia , Data security law of the people's Republic of China ,https://baike.baidu.com/item/%E4%B8%AD%E5%8D%8E%E4%BA%BA%E6%B0%91%E5%85%B1%E5%92%8C%E5%9B%BD%E6%95%B0%E6%8D%AE%E5%AE%89%E5%85%A8%E6%B3%95
[3] Safety information ,《 Data security law 》 A comprehensive interpretation of ,https://mp.weixin.qq.com/s/fEcrGIHCLEghkrlCjegH8g
[4] Jiao Jiao ,《 Data security law 》 Interpretation of highlights ,https://mp.weixin.qq.com/s/jt1U5gN94UryT7wH7PDkZg
[5] Deloitte China ,《 Data security law of the people's Republic of China 》 Reading ,https://www2.deloitte.com/cn/zh/pages/risk/articles/china-data-security-law-interpretation.html
[6]《 Data security law 》 In depth reading ,https://zhuanlan.zhihu.com/p/38001425
[7] Reading 《 Data security law 》,https://zhuanlan.zhihu.com/p/379919193
[8] Expert interpretation 《 Data security law 》,http://www.cac.gov.cn/2021-06/15/c_1625341228851523.htm
[9]《 Data security law 》 Interpretation of highlights ,https://www.163.com/dy/article/GCL00F9D0519BMQ6.html
[10] China's data security law has been promulgated , Privacy computing promotes the marketization of data elements ,https://www.ccvalue.cn/article/1130629.html
[11] How to understand the importance of cross-border data flow ,http://cbnri.org/news/5418670.html
[12] Data Security Law Interpretation Series ( One ) The way to break the data cross-border dilemma , https://mp.weixin.qq.com/s/FIAGQCjQenWYFtdQ5cbMeA
[13] China's plan to provide data security legislation , http://finance.people.com.cn/n1/2021/0621/c1004-32135498.html
[14] Build a new legal guarantee system for data security , http://www.xinhuanet.com/tech/2021-06/22/c_1127585364.htm
[15] Yes 《 Data security law 》 Understanding and understanding of : Data classification , https://www.secrss.com/articles/23618
[16] Baidu Encyclopedia , Network security law of the people's Republic of China ,https://baike.baidu.com/item/%E4%B8%AD%E5%8D%8E%E4%BA%BA%E6%B0%91%E5%85%B1%E5%92%8C%E5%9B%BD%E7%BD%91%E7%BB%9C%E5%AE%89%E5%85%A8%E6%B3%95
[17]DLA Piper, Data Protection Laws of the World, https://www.dlapiperdataprotection.com/
[18] Sharing and application of government data in the financial field , https://note.youdao.com/ynoteshare1/index.html?id=a17844b7c6aaf56ab4b02767f42c557a&type=note
[19]《 Tencent privacy computing white paper (2021)》, https://www.tisi.org/18351
[20] Privacy computing : Take what to protect our data security ?https://finance.sina.com.cn/tech/2020-11-09/doc-iiznezxs0770929.shtml
[21] People's Bank of China ,《 Multi party secure computing financial application technical specification 》(JR/T 0196—2020),https://www.cfstc.org/bzgk/gk/view/yulan.jsp?i_id=1896
[22]2021 Privacy computing product testing and industry development observation in the first half of the year , https://mp.weixin.qq.com/s/3Dw8_0dF0Qmwt1IS8kZZ9w
[23] Interpretation of China Academy of information and communications “ Privacy Computing Series Standards and test methods ”, https://www.163.com/dy/article/G16OH68I05149RFA.html
边栏推荐
- selenium将元素保存为图片
- Interview pit summary I
- I want to know how to open an account through online stock? Is online account opening safe?
- 人人都当科学家之免Gas体验mint爱死机
- Selenium chrome disable JS disable pictures
- 3. Keras version model training
- 简单科普Ethereum的Transaction Input Data
- 9 use of tensorboard
- Comprehensive analysis of discord security issues
- C语言读取数据
猜你喜欢
全面解析Discord安全问题
Tweenmax+svg switch color animation scene
还存在过有键盘的kindle?
Particle filter PF - 3D CV target tracking with uniform motion (particle filter vs extended Kalman filter)
2 three modeling methods
Summary of data interface API used in word search and translation applications
查词翻译类应用使用数据接口api总结
[CEPH] Introduction to cephfs caps
NFT合约基础知识讲解
Stepn novice introduction and advanced
随机推荐
3. Keras version model training
How to handle 2gcsv files that cannot be opened? Use byzer
3 keras版本模型训练
(1) Keras handwritten numeral recognition and recognition of self written numbers
golang 临时对象池优化
NFT 项目的开发、部署、上线的流程(2)
Audio and video learning (II) -- frame rate, code stream and resolution
【问题解决】新版webots纹理等资源文件加载/下载时间过长
Svg canvas canvas drag
振动式液量检测装置
AbortController的使用
AUTO sharding policy will apply DATA sharding policy as it failed to apply FILE sharding policy
Beijing Fangshan District specialized special new small giant enterprise recognition conditions, with a subsidy of 500000 yuan
音视频学习(一)——PTZ控制原理
[CEPH] Introduction to cephfs caps
JS text scrolling scattered animation JS special effect
Golang temporary object pool optimization
svg野人动画代码
js创意图标导航菜单切换背景色
8 自定义评估函数