当前位置:网站首页>Privacy computing helps secure data circulation and sharing
Privacy computing helps secure data circulation and sharing
2022-07-05 17:58:00 【Star Ring Technology】
In recent days, , Shanghai Information Service Industry Association, together with yiou, held a “ The successful path of privacy computing from virtual to real ” Webinar themed . Star Ring Technology privacy computing scientist Yi Ren was invited to attend , With 《 Privacy computing helps secure data circulation and sharing 》 The theme of , Shared a series of key issues on how to solve the flow of data elements in privacy computing .
Data elements are the core engine of the deepening development of digital economy , The circulation and utilization of data is the premise of value creation of data elements . With 《 Data security law 》、《 Personal information protection law 》 Implementation , The open utilization of data based on security has ushered in a new round of development opportunities . Yi Ren pointed out that the phased construction path of data element circulation includes data security protection and reinforcement 、 Peer to peer privacy computing data service 、 Data element circulation .
To realize the circulation of data elements , At present, there are four key problems to be solved . One is how to ensure safety ; The second is how to ensure compliance ; Third, how to ensure security and open data services ; Fourth, how to design the technical framework of the data factor market .
First of all , How to ensure safety . From the perspective of data system architecture , The first thing is to ensure the security of the entire infrastructure , This requires reinforcement , Such as container isolation 、 Zero trust security technology 、 Dynamic vulnerability detection, etc ; The second layer is the security protection for the big data platform , With storage 、 Audit 、 And the overall protective measures for the platform authority control ; The third layer is to protect data resources , For example, data classification 、 Data security governance 、 Desensitization and encryption of data ; The fourth layer is to ensure the security of the application layer , Privacy computing will be used .
second , How to ensure compliance . The overall principle to ensure compliance is to protect the security of data throughout its life cycle , The whole life cycle of data includes data collection 、 The data processing 、 The data transfer 、 data storage 、 Data usage 、 Data destruction , On the whole link, some compliance requirements can be made in terms of management means and technical means .
Third , How to ensure security and open data services . This actually goes through the process of data flow 1.0- Packet form to data flow 2.0- Plaintext API Interface , And then to data flow 3.0- Evolution of trusted data circulation services . In the implementation of trusted data flow , Privacy computing plays a crucial role .
Privacy computing does not disclose sensitive data , Multi party data can be analyzed and calculated, and the calculation results can be verified , Ensure that data is available and invisible in all links / Data fixed model / Data is not available , It can effectively help data security protection . Privacy computing provides three technical frameworks : Multiparty secure computing 、 Federal learning 、 Trusted execution environment . Star ring technology depends on different scenarios or performance requirements , There are corresponding adaptations to the three technical frameworks . Privacy computing is mainly used in the whole data application and data service layer , Including joint analysis and modeling 、 result / Model publishing flow 、 Model operation and maintenance and other scenarios .
Take the intelligent marketing scenario as an example , Star ring technology is based on privacy computing to ensure the data security of both parties , Realize the integration of brand data and payment agency data , Comprehensive cognition of user portrait , Help a certain automobile brand wake up the 100 million level annual clues , By matching external data and jointly modeling , Quickly and effectively judge the authenticity and value of clues . Federated learning technology protects the data privacy of both parties , Significantly improve the marketing effect .
In the case of security reinforcement and circulation of marketing data in a manufacturing enterprise , Lack of classification and classification of marketing system data faced by customers 、 There are individual retail data in the marketing data, which will be circulated in the data center 、 Retail data is often idle after being applied for by various business systems , Not recovered in time 、 Lack of necessary safety protection for the use of marketing data , Star ring technology provides it with a solution for the security reinforcement and circulation of marketing data platforms , A data security management center and a data security circulation center have been established . The data security management center provides classification 、 Access control 、 Desensitized watermark 、 Monitoring and auditing ; The data security circulation center supports federal learning 、 Trusted computing 、 Security gateway , Ensure the enterprise to realize the safe docking of external data , Under the premise of privacy protection , Achieve accurate user touch .
Fourth , How to design the technical architecture of the data element market . First, there will be foundation layer reinforcement based on infrastructure ; The big data cloud platform will be reinforced at the platform layer , Including isolation 、 encryption 、 jurisdiction 、 Audit, etc . In this , Many enterprises have different requirements for system architecture , Will open several independent environments , For example, there will be public data in the shared area , It is some low sensitive data that you can use . In a trusted environment , Some data are sensitive , Can't be used directly , There will be many applications for privacy computing . Finally, the data sandbox environment , It is more about the separation of deposit and settlement , Protect the data resource itself , The availability of data is not visible .
Based on the four key issues of data element circulation , Star ring technology also provides corresponding safety protection and reinforcement products in all links , Including privacy computing platforms Transwarp Sophon P²C、 Data transaction portal Transwarp Datamall、 Big data security and privacy protection tools Transwarp Defensor etc. . And behind it , Xinghuan technology also has a strong consulting service team to sort out the entire data 、 exploration , And the construction of compliance system , Many scenes have also been precipitated in various products of starring technology . Such a product chain has a good security guarantee for both the data source and the output of services .
Xinghuan technology is committed to building enterprise level big data basic software , Around data integration 、 Storage 、 government 、 modeling 、 analysis 、 Provide basic software and services in the whole life cycle of data mining and circulation , Build tomorrow's data world . With the gradual acceleration of the marketization of data elements , Star ring technology will continue to contribute technical strength , Help the digital economy develop vigorously and healthily .
Edited on 2022-06-23 14:07
边栏推荐
- Vulnerability recurrence - 48. Command injection in airflow DAG (cve-2020-11978)
- Sophon base 3.1 launched mlops function to provide wings for the operation of enterprise AI capabilities
- Thesis reading_ Medical NLP model_ EMBERT
- Mongodb (quick start) (I)
- 集群部署如何解决海量视频接入与大并发需求?
- 证券网上开户安全吗?证券融资利率一般是多少?
- 钉钉开放平台小程序API的缓存接口都有哪些内容?
- Sentinel-流量防卫兵
- Tencent music launched its new product "quyimai", which provides music commercial copyright authorization
- 2022新版PMP考试有哪些变化?
猜你喜欢
星环科技数据安全管理平台 Defensor重磅发布
Abnormal recovery of virtual machine Oracle -- Xi Fenfei
Knowledge points of MySQL (7)
[JMeter] advanced writing method of JMeter script: all variables, parameters (parameters can be configured by Jenkins), functions, etc. in the interface automation script realize the complete business
Unicode processing in response of flash interface
ELK日志分析系统
Sophon KG升级3.1:打破数据间壁垒,解放企业生产力
论文阅读_医疗NLP模型_ EMBERT
VBA drives SAP GUI to realize office automation (II): judge whether elements exist
GFS分布式文件系统
随机推荐
论文阅读_医疗NLP模型_ EMBERT
EPM related
Customize the theme of matrix (I) night mode
Leetcode exercise - 206 Reverse linked list
Configure pytorch environment in Anaconda - win10 system (small white packet meeting)
Sophon autocv: help AI industrial production and realize visual intelligent perception
星环科技重磅推出数据要素流通平台Transwarp Navier,助力企业实现隐私保护下的数据安全流通与协作
提高應用程序性能的7個DevOps實踐
修复漏洞 - mysql 、es
Data access - entityframework integration
ELK日志分析系统
Knowing that his daughter was molested, the 35 year old man beat the other party to minor injury level 2, and the court decided not to sue
Sentinel-流量防卫兵
ISPRS2020/云检测:Transferring deep learning models for cloud detection between Landsat-8 and Proba-V
较文心损失一点点性能提升很多
寻找第k小元素 前k小元素 select_k
数据访问 - EntityFramework集成
Redis基础
基于YOLOv3的口罩佩戴检测
一文读懂简单查询代价估算