New generation of data security in the digital age
Author:China Science and Technology N Time:2022.07.27
The digital era covers the digital economy, digital government, digital society, digital business, digital life, and digital individuals. The construction requires digital technology represented by cloud computing, big data, AI, Internet of Things, blockchain, 5G, etc. Supporting, data as a key element of digital economy, implementing data strategies, accumulating data resources, ensuring data security, bigger and stronger data industry, has become a common strategic choice of countries around the world. In the "Opinions on the Establishment of Data Basic Systems to better play the role of data elements" reviewed and approved in June 2022, it is emphasized that from the aspects of data property rights, circulation transactions, income distribution, security governance, etc., the establishment of a data basic system system is accelerated. The high -quality development of the digital economy requires the infrastructure of digital technology to have the security ability of native integration. It is based on digital security and credibility, and protects the digital era.
Early data security belongs to the category of information security, focusing on the security of data static storage. It is mainly to decrypt the density. There is no right to decrypt, but it cannot cope with the risks in the process of dynamic threats, controlling transmission, and use. The current traditional data security belongs to the category of network security. It is based on the early storage security of data storage. It provides various types of risks and threats in the process of storage (static), transmission (motion) and use (use) of data. Security Mechanism. However, its plug -in stacking passive anti -blocking mechanism does not have natural active immunity, and cannot cope with today's diverse dynamic threats and attacks. The new generation of data is safe to use "native integration, security, credibility, and dynamic and static use" and other methods. Following the core concept of "native security Native Security", adhering to the principles of "natural integration, active immunity, always verification, and continuous protection", it has " Native integration, security and credibility ", covering" dynamic and static use "and" cloud network edge end ", truly realize the number of numbers credible and security. In particular, the globalization of data flow, the legal compliance supervision requirements of regional attributes, the rights, rights, and permissions of data brings data in the process of use, trading, sharing, and circulation may change. , Storing, transmitters, processors, users, users, computing parties, scheduling, controller and regulators may be different, involving different industries, functions, regions, organizations, society, individuals and other related parties. Give full play to the important value and significance of data as a production factors, and escort the digital economy.
At the level of legal and governance, the data production factors must fully play a role, not only need to solve the problem of data ownership, confirmation, pricing issues, but also to solve the problem of separation of data rights, authority and rights and interests. The island can be traded and circulated multiple times, and is controlled by the rights and interests.
At the technical level, the data should always be at Control & Crypto Computing to achieve comprehensive coverage of "dynamic and static use" and "cloud network edge end". Ensure the security and credibility of the environment, models, algorithms, computing power and user identity, and then ensure the security and credibility of data in the use and circulation of use. To cope with the risks and challenges in the state of use, circulation, sharing, and transaction, prevent the risks brought about by changes in rights, rights, and permissions, and ensure data producers, owners, storage, transmitters, processors, users, users, users, users, users, users, users, users, users, users, users, and users The interests of the computing party, the scheduling, the controller, and the regulators to protect the safety during use.
Data and security and credible native integration are not only safe and credible. The protection objects of the data are "twin" and "inseparable" by the protective mechanism. They store and calculate the communication while performing real -time secure and credible protection in parallel. The letter chain provides the security and credibility of the storage computing communication, ensuring that the data resources and operations are measured and controllable throughout the process, and provides a safe and credible storage computing communication environment "active immunity".
The confidential control bipolar complementarity is complementary, according to the data grading, sensitivity, compliance requirements, and costs, the two -state can also exist at the same time, follow the concept of "native security Native Security" The principles of always verifying and continuous protection "can be" native, safe and credible ", covering" dynamic and static use "and" cloud network edge end to achieve a new generation of data security, give full play to the huge value of data, protect data and data and protect data and protect data and protect data and protect data and protect data. Privacy, ensure the interests of all parties related to data, and regulate compliance, greatly help data security governance, ensure the full use of data, and protect the data of the digital age. Deputy Dean of the International Cloud Safety Alliance Greater China Research Institute)
Source: Xinhua Digital
- END -
How do operators resolve the contradiction between green and development?Huawei Ding Yun: Energy efficiency is the key
Text/Huang HaifengSweeping the global high temperature, allowing high temperatures...
Alipay emergency response!
Yu'ebao's 460,000 yuan cannot be removed?A few days agoHarbin citizen Mr. YuThe pr...