In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-03-31 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > IT Information >
Share
Shulou(Shulou.com)12/24 Report--
On November 23, the second Global Digital Trade Expo opened in Hangzhou. In the "data Factor Governance and marketization Forum", guests from Alibaba, Huawei, Ant, International data Management Association and other enterprises and institutions shared their thoughts on the industry of data circulation. Wei Tao, vice president and chief technology security officer of Ant Group, stressed the importance of technology trust for trusted data circulation, saying that establishing a technology trust mechanism through technologies such as private computing and blockchain can help achieve a high level of data cross-domain control and effectively reduce the risk of data flow.
(photo: Wei Tao, vice president and chief technical security officer of Ant Group, delivered a keynote speech)
"at present, the complexity of the life body of the digital economy is exploding, and the operators of data elements are facing more complex external environment and technical challenges. The cross-domain flow of data only depends on the subjective trust between people is not enough, it needs to go through the risk-prone links in the trust chain of technical support subjects. The core of technology trust is trusted identity remote verification and cross-domain control of data use rights. Through the enhancement of trusted technology, the problem of trust cascade failure can be solved, the identity of data application can be verified remotely, and the execution environment can be measured to realize the security and controllability of the whole link from data transfer, calculation, fusion to destruction. Wei Tao expounded the connotation of technological trust.
Data security has become a global issue, and countries around the world have issued laws and regulations related to data security. China has more clearly defined the value of data circulation, listed data as factors of production comparable to land and technology, and encouraged security and development to be driven by both wings.
However, the data application of the actual scene is still faced with severe security risks, which will bring huge losses in the event of an accident.
For example, in January 2021, the US technology company Ubiquiti exposed the "insider gate" data leak, resulting in a market capitalization loss of hundreds of millions of dollars; in February 2023, Wanguo data and Singapore data center suffered a "hacker door", resulting in a large number of personal information disclosure. Successive outbreaks of data security incidents show that there is still a big gap in the control and protection of large-scale data circulation in the current industry.
"data leaks caused by long data supply chain and underground industry attacks, as well as data abuse caused by improper use of data, are two prominent challenges facing the industry. Starting from the theoretical system and practical experience of data security, we have had a lot of discussions with industry experts, and gradually formed a consensus on the path of technology trust: trusted PaaS is an important infrastructure for trusted circulation of large-scale data, providing important support such as application identity and operation and maintenance environment. On this basis, the calculation, modeling and analysis of secret data can be realized through privacy computing to avoid data disclosure; the combination of trusted computing and block chain can provide certificate traceability and audit capabilities, support the cross-domain management and control of data use rights, and finally realize the availability, invisibility, controllability and metrology of data cross-domain circulation, "said Wei Tao.
It is understood that ants dig deep into privacy computing and blockchain technology, leading the industry's technological exploration and application effectiveness. According to Wei Tao, Ant has developed an industrial-grade high-availability hidden language trusted privacy computing technology stack, ant chain privacy data cooperation network, and built a multi-level and three-dimensional data value exchange network to help efficient industrial cooperation. Privacy computing and blockchain-related patents rank first in the world. At the same time, ants have been actively promoting technology inclusion, including the hidden language subject framework of the open source hidden language technology stack, as well as key technologies and products such as trusted execution environment operating system Occlum, trusted base HyperEnclave and so on.
According to Wei Tao, Ant is currently exploring a set of data secret cross-cloud interconnection service facilities based on technology trust. Through the layout of dense pipeline computing nodes to meet the computing needs of small and medium-sized institutions, and on these dense pipelines to build a distributed dense hub to meet the data elements of a larger scale of "dense sky computing" cross-cloud interconnection.
Wei Tao stressed, "at present, there is a lack of unified technical requirements and system standards for the cross-domain control of data use rights, and more industry co-construction is needed. In addition, the threshold for the use of technologies such as private computing is still high, and the ease of use of the technology needs to be improved. Ants are willing to join hands with the industry to build a moat of data security and trust, so as to promote high-quality development with a high level of security."
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.