当前位置:网站首页>Privacy computing helps secure data circulation and sharing

Privacy computing helps secure data circulation and sharing

2022-07-05 17:58:00 Star Ring Technology

In recent days, , Shanghai Information Service Industry Association, together with yiou, held a “ The successful path of privacy computing from virtual to real ” Webinar themed . Star Ring Technology privacy computing scientist Yi Ren was invited to attend , With 《 Privacy computing helps secure data circulation and sharing 》 The theme of , Shared a series of key issues on how to solve the flow of data elements in privacy computing .

Data elements are the core engine of the deepening development of digital economy , The circulation and utilization of data is the premise of value creation of data elements . With 《 Data security law 》、《 Personal information protection law 》 Implementation , The open utilization of data based on security has ushered in a new round of development opportunities . Yi Ren pointed out that the phased construction path of data element circulation includes data security protection and reinforcement 、 Peer to peer privacy computing data service 、 Data element circulation .

To realize the circulation of data elements , At present, there are four key problems to be solved . One is how to ensure safety ; The second is how to ensure compliance ; Third, how to ensure security and open data services ; Fourth, how to design the technical framework of the data factor market .

First of all , How to ensure safety . From the perspective of data system architecture , The first thing is to ensure the security of the entire infrastructure , This requires reinforcement , Such as container isolation 、 Zero trust security technology 、 Dynamic vulnerability detection, etc ; The second layer is the security protection for the big data platform , With storage 、 Audit 、 And the overall protective measures for the platform authority control ; The third layer is to protect data resources , For example, data classification 、 Data security governance 、 Desensitization and encryption of data ; The fourth layer is to ensure the security of the application layer , Privacy computing will be used .

second , How to ensure compliance . The overall principle to ensure compliance is to protect the security of data throughout its life cycle , The whole life cycle of data includes data collection 、 The data processing 、 The data transfer 、 data storage 、 Data usage 、 Data destruction , On the whole link, some compliance requirements can be made in terms of management means and technical means .

Third , How to ensure security and open data services . This actually goes through the process of data flow 1.0- Packet form to data flow 2.0- Plaintext API Interface , And then to data flow 3.0- Evolution of trusted data circulation services . In the implementation of trusted data flow , Privacy computing plays a crucial role .

Privacy computing does not disclose sensitive data , Multi party data can be analyzed and calculated, and the calculation results can be verified , Ensure that data is available and invisible in all links / Data fixed model / Data is not available , It can effectively help data security protection . Privacy computing provides three technical frameworks : Multiparty secure computing 、 Federal learning 、 Trusted execution environment . Star ring technology depends on different scenarios or performance requirements , There are corresponding adaptations to the three technical frameworks . Privacy computing is mainly used in the whole data application and data service layer , Including joint analysis and modeling 、 result / Model publishing flow 、 Model operation and maintenance and other scenarios .

Take the intelligent marketing scenario as an example , Star ring technology is based on privacy computing to ensure the data security of both parties , Realize the integration of brand data and payment agency data , Comprehensive cognition of user portrait , Help a certain automobile brand wake up the 100 million level annual clues , By matching external data and jointly modeling , Quickly and effectively judge the authenticity and value of clues . Federated learning technology protects the data privacy of both parties , Significantly improve the marketing effect .

In the case of security reinforcement and circulation of marketing data in a manufacturing enterprise , Lack of classification and classification of marketing system data faced by customers 、 There are individual retail data in the marketing data, which will be circulated in the data center 、 Retail data is often idle after being applied for by various business systems , Not recovered in time 、 Lack of necessary safety protection for the use of marketing data , Star ring technology provides it with a solution for the security reinforcement and circulation of marketing data platforms , A data security management center and a data security circulation center have been established . The data security management center provides classification 、 Access control 、 Desensitized watermark 、 Monitoring and auditing ; The data security circulation center supports federal learning 、 Trusted computing 、 Security gateway , Ensure the enterprise to realize the safe docking of external data , Under the premise of privacy protection , Achieve accurate user touch .

Fourth , How to design the technical architecture of the data element market . First, there will be foundation layer reinforcement based on infrastructure ; The big data cloud platform will be reinforced at the platform layer , Including isolation 、 encryption 、 jurisdiction 、 Audit, etc . In this , Many enterprises have different requirements for system architecture , Will open several independent environments , For example, there will be public data in the shared area , It is some low sensitive data that you can use . In a trusted environment , Some data are sensitive , Can't be used directly , There will be many applications for privacy computing . Finally, the data sandbox environment , It is more about the separation of deposit and settlement , Protect the data resource itself , The availability of data is not visible .

Based on the four key issues of data element circulation , Star ring technology also provides corresponding safety protection and reinforcement products in all links , Including privacy computing platforms Transwarp Sophon P²C、 Data transaction portal Transwarp Datamall、 Big data security and privacy protection tools Transwarp Defensor etc. . And behind it , Xinghuan technology also has a strong consulting service team to sort out the entire data 、 exploration , And the construction of compliance system , Many scenes have also been precipitated in various products of starring technology . Such a product chain has a good security guarantee for both the data source and the output of services .

Xinghuan technology is committed to building enterprise level big data basic software , Around data integration 、 Storage 、 government 、 modeling 、 analysis 、 Provide basic software and services in the whole life cycle of data mining and circulation , Build tomorrow's data world . With the gradual acceleration of the marketization of data elements , Star ring technology will continue to contribute technical strength , Help the digital economy develop vigorously and healthily .

Edited on 2022-06-23 14:07

原网站

版权声明
本文为[Star Ring Technology]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/186/202207051747224028.html