当前位置:网站首页>Privacy computing helps secure data circulation and sharing
Privacy computing helps secure data circulation and sharing
2022-07-05 17:58:00 【Star Ring Technology】
In recent days, , Shanghai Information Service Industry Association, together with yiou, held a “ The successful path of privacy computing from virtual to real ” Webinar themed . Star Ring Technology privacy computing scientist Yi Ren was invited to attend , With 《 Privacy computing helps secure data circulation and sharing 》 The theme of , Shared a series of key issues on how to solve the flow of data elements in privacy computing .
Data elements are the core engine of the deepening development of digital economy , The circulation and utilization of data is the premise of value creation of data elements . With 《 Data security law 》、《 Personal information protection law 》 Implementation , The open utilization of data based on security has ushered in a new round of development opportunities . Yi Ren pointed out that the phased construction path of data element circulation includes data security protection and reinforcement 、 Peer to peer privacy computing data service 、 Data element circulation .
To realize the circulation of data elements , At present, there are four key problems to be solved . One is how to ensure safety ; The second is how to ensure compliance ; Third, how to ensure security and open data services ; Fourth, how to design the technical framework of the data factor market .
First of all , How to ensure safety . From the perspective of data system architecture , The first thing is to ensure the security of the entire infrastructure , This requires reinforcement , Such as container isolation 、 Zero trust security technology 、 Dynamic vulnerability detection, etc ; The second layer is the security protection for the big data platform , With storage 、 Audit 、 And the overall protective measures for the platform authority control ; The third layer is to protect data resources , For example, data classification 、 Data security governance 、 Desensitization and encryption of data ; The fourth layer is to ensure the security of the application layer , Privacy computing will be used .
second , How to ensure compliance . The overall principle to ensure compliance is to protect the security of data throughout its life cycle , The whole life cycle of data includes data collection 、 The data processing 、 The data transfer 、 data storage 、 Data usage 、 Data destruction , On the whole link, some compliance requirements can be made in terms of management means and technical means .
Third , How to ensure security and open data services . This actually goes through the process of data flow 1.0- Packet form to data flow 2.0- Plaintext API Interface , And then to data flow 3.0- Evolution of trusted data circulation services . In the implementation of trusted data flow , Privacy computing plays a crucial role .
Privacy computing does not disclose sensitive data , Multi party data can be analyzed and calculated, and the calculation results can be verified , Ensure that data is available and invisible in all links / Data fixed model / Data is not available , It can effectively help data security protection . Privacy computing provides three technical frameworks : Multiparty secure computing 、 Federal learning 、 Trusted execution environment . Star ring technology depends on different scenarios or performance requirements , There are corresponding adaptations to the three technical frameworks . Privacy computing is mainly used in the whole data application and data service layer , Including joint analysis and modeling 、 result / Model publishing flow 、 Model operation and maintenance and other scenarios .
Take the intelligent marketing scenario as an example , Star ring technology is based on privacy computing to ensure the data security of both parties , Realize the integration of brand data and payment agency data , Comprehensive cognition of user portrait , Help a certain automobile brand wake up the 100 million level annual clues , By matching external data and jointly modeling , Quickly and effectively judge the authenticity and value of clues . Federated learning technology protects the data privacy of both parties , Significantly improve the marketing effect .
In the case of security reinforcement and circulation of marketing data in a manufacturing enterprise , Lack of classification and classification of marketing system data faced by customers 、 There are individual retail data in the marketing data, which will be circulated in the data center 、 Retail data is often idle after being applied for by various business systems , Not recovered in time 、 Lack of necessary safety protection for the use of marketing data , Star ring technology provides it with a solution for the security reinforcement and circulation of marketing data platforms , A data security management center and a data security circulation center have been established . The data security management center provides classification 、 Access control 、 Desensitized watermark 、 Monitoring and auditing ; The data security circulation center supports federal learning 、 Trusted computing 、 Security gateway , Ensure the enterprise to realize the safe docking of external data , Under the premise of privacy protection , Achieve accurate user touch .
Fourth , How to design the technical architecture of the data element market . First, there will be foundation layer reinforcement based on infrastructure ; The big data cloud platform will be reinforced at the platform layer , Including isolation 、 encryption 、 jurisdiction 、 Audit, etc . In this , Many enterprises have different requirements for system architecture , Will open several independent environments , For example, there will be public data in the shared area , It is some low sensitive data that you can use . In a trusted environment , Some data are sensitive , Can't be used directly , There will be many applications for privacy computing . Finally, the data sandbox environment , It is more about the separation of deposit and settlement , Protect the data resource itself , The availability of data is not visible .
Based on the four key issues of data element circulation , Star ring technology also provides corresponding safety protection and reinforcement products in all links , Including privacy computing platforms Transwarp Sophon P²C、 Data transaction portal Transwarp Datamall、 Big data security and privacy protection tools Transwarp Defensor etc. . And behind it , Xinghuan technology also has a strong consulting service team to sort out the entire data 、 exploration , And the construction of compliance system , Many scenes have also been precipitated in various products of starring technology . Such a product chain has a good security guarantee for both the data source and the output of services .
Xinghuan technology is committed to building enterprise level big data basic software , Around data integration 、 Storage 、 government 、 modeling 、 analysis 、 Provide basic software and services in the whole life cycle of data mining and circulation , Build tomorrow's data world . With the gradual acceleration of the marketization of data elements , Star ring technology will continue to contribute technical strength , Help the digital economy develop vigorously and healthily .
Edited on 2022-06-23 14:07
边栏推荐
- Star ring technology data security management platform defender heavy release
- 数据访问 - EntityFramework集成
- Leetcode daily question: the first unique character in the string
- mybash
- How to save the trained neural network model (pytorch version)
- Sophon base 3.1 launched mlops function to provide wings for the operation of enterprise AI capabilities
- Disorganized series
- Action avant ou après l'enregistrement du message teamcenter
- 提高應用程序性能的7個DevOps實踐
- Interpretation: how to deal with the current security problems faced by the Internet of things?
猜你喜欢
GFS分布式文件系统
Leetcode exercise - 206 Reverse linked list
"Xiaodeng in operation and maintenance" is a single sign on solution for cloud applications
LeetCode每日一题:合并两个有序数组
What are the requirements for PMP certification? How much is it?
Seven Devops practices to improve application performance
Vulnerability recurrence - 48. Command injection in airflow DAG (cve-2020-11978)
Oracle recovery tools -- Oracle database recovery tool
Sophon KG升级3.1:打破数据间壁垒,解放企业生产力
Abnormal recovery of virtual machine Oracle -- Xi Fenfei
随机推荐
LeetCode 练习——206. 反转链表
使用QT设计师界面类创建2个界面,通过按键从界面1切换到界面2
Knowledge points of MySQL (7)
Why is February 28 in the Gregorian calendar
寻找第k小元素 前k小元素 select_k
钉钉开放平台小程序API的缓存接口都有哪些内容?
Interpretation: how to deal with the current security problems faced by the Internet of things?
Unicode processing in response of flash interface
VC编程入门浅谈「建议收藏」
检查命名空间和类
Star ring technology data security management platform defender heavy release
隐私计算助力数据的安全流通与共享
Daily exercise: a series of dates
毫无章法系列
提高應用程序性能的7個DevOps實踐
[JMeter] advanced writing method of JMeter script: all variables, parameters (parameters can be configured by Jenkins), functions, etc. in the interface automation script realize the complete business
Leetcode daily question: the first unique character in the string
EPM相关
Why is all (()) true and any (()) false?
Clickhouse (03) how to install and deploy Clickhouse