The understanding of privacy and secure computing will permanently change the fate of data

Wen|Cheng Zhou

Source | Intelligent Relativity (aixdlun)

In the era of big data, applications based on big data have brought great convenience to daily life, economic development, and urban governance. At the same time, user privacy is also facing "calculations" that may be ubiquitous. How to enjoy the benefits of data value and protect privacy is becoming a hot topic now.

1. Spear and Shield: Open application of data and protection of data privacy

A series of incidents related to "private data" have recently appeared one after another.

Ant Financial and Megvii's emergency public relations about "providing data for the other party to train algorithms" are behind people's concerns about the safety of "face data".

With the launch of Apple's iOS 14 beta version, the biggest change is the new privacy protection feature. For example, user tracking of App for advertising purposes will require user approval and so on. It is undoubtedly a huge "attack" for companies in the mobile Internet that will track user behavior for precision marketing and targeted delivery.

Behind the Tiktok US incident is the unclear user "privacy data" issue.

While "private data" has attracted much attention, it has also caused many people to think about "private data".

The value that the data can generate after calculation is immeasurable. For big data applications or artificial intelligence companies, the use of user data in reasonable boundaries and ways has become the core driving force for the development of enterprises, industries and the entire society.

But protecting "privacy security" is equally urgent. As the founder of Entropy Technology Yang Geng once said, privacy is the information asymmetry that we deliberately want to maintain. A person without privacy is at a disadvantage compared to a person with privacy. The protection of privacy allows individuals to be in a more fair environment.

It is not difficult to keep data private and safe. It can be done without collecting or using it. But in order to promote the value and contribution of data as a production factor, which seems to be the relationship between the shield and the spear, how to resolve it?

 

2. Both and the same: privacy and security computing becomes the "only technical solution"

E Weinan, an academician of the Chinese Academy of Sciences, once stated in a public speech that data, as a special resource, needs to flow to generate value. However, this kind of flow is not the sharing of data itself, but the flow of "data value", realizing that data is "available and not visible." It can not only meet the needs of data flow, but also protect data and privacy.

Therefore, a "converter" is needed to realize the "both and and and also" of data security and application openness. Privacy and secure computing is considered to be the "only technical solution" to complete this mission at the moment. It is an information technology that analyzes and calculates data and can verify the results of the calculations under the premise that the data provider does not disclose the original data and the calculation algorithm. .

Privacy and secure computing itself is not a single technology. Based on different trust assumptions and application scenarios, technologies that adapt to the corresponding conditions can be selected, including hardware-based TEE, cryptographic-based secure multi-party computing (MPC), and fully homomorphic encryption (FHE), federated learning derived from artificial intelligence, etc., to realize the sharing of "data value".

A number of companies with privacy and secure computing as their core technology have emerged in China. According to Luo Zhen, CEO of Yifang Jianshu, said in a public speech, Yifang Jianshu's privacy and secure computing platform Yishufang XDP is implementing data circulation through privacy and secure computing: data does not exit the platform, only authorized use within the platform , Only output data results.

 

(The picture comes from the Internet)

The establishment of the data element market should be a system and scale, and it should be quickly built through ecology.

By building the "Internet of Data and Computing" (IoDC), Yifang Jianshu builds an open ecosystem of data storage, computing and collaboration. Realize data connection, sharing and value realization through calculation.

In general, there are two major factors that affect the efficiency of "privacy and safe computing" conversion data value sharing-technology and ecology. Technology is a tool leading to "data value sharing", and ecology is a barrier to prosperity "data value sharing".

 

3. Techniques and devices: Can privacy and security computing be the “bigger”?

The methodology and products of privacy and secure computing have received a strong response in the market, and in 2020 it will be called the "first year of privacy computing." Among them, there are favorable policies. For example, data resources are becoming the third type of resources that are as important as human resources and natural resources. Data is also included in national documents as factors of production, just like land, labor, technology, and capital. The application of big data is of great significance at the industry and national and social levels.

There are also data application practices. For example, the green code in the epidemic is the product of data and algorithms.

To realize the “prosperity and inclusiveness” of big data at the industry and national level, firstly, it must cross the hurdle of “the contradiction between the increasing demand for personal privacy protection and the unbalanced and insufficient personal privacy protection capabilities”. "Privacy and secure computing" has become the most important escort in the era of big data. The specific manifestations are as follows.

1. Technical breakthrough + scene landing, breaking the "island"

In the entire data circulation, in the ecology built by Yifang Jianshu, its participating roles can be simply summarized as data provider, data user, data service party and management party. Before joining the ecology, various isolated islands are often formed because of the lack of interconnection.

Connect upstream and downstream through technology to determine the upper limit of the potential value of data. In this regard, Yifang Jianshu gave a "one vertical and one horizontal" solution of technological breakthrough + scene landing. Among them, "Yiheng" is a data capability platform represented by the XDP Yishufang platform, which can support access to various application scenarios, output AI capabilities, and be compatible with various infrastructures (such as Huawei Cloud, AWS, etc.) .

"One vertical" refers to the one-stop, full-process ability to open application scenarios. For example, the medical field needs to run through multiple lines of data such as medical insurance and credit investigation.

It can be seen that the “one vertical and one horizontal” scheme can not only increase the upper limit of data value, but also accelerate the “monetization” of data value. The landing of the scene determines the display of the value of the data.

2. The scene is the first to land, benchmarking forces promote the development of the industry

Objectively speaking, the current big data application is still in the most primitive stage. From the level of industrial economic development to the level of national urban governance, the application of new technologies such as big data, cloud computing, and artificial intelligence has formed a trend of industry-driven development. However, data security is the "Sword of Damocles" hanging over the head, and it makes "data development" face challenges.

 

For example, governments at all levels have massive amounts of data. If you can make good use of the big data in your hands, you can undoubtedly go further in social governance, economic development, and serving the people. At present, Yifang Jianshu is approaching city-level privacy and security computing platform projects with governments in many places, which confirms this trend- if the platform can ensure data security, the government is naturally happy to accelerate "data development." For example, Yifang Jianshu built a medical big data application and open platform based on XDP privacy and secure computing technology in Xiamen, which is the first known case of using privacy and secure computing technology to achieve city-level applications. The ecology is constantly growing, and it is being studied and copied in many places. It is foreseeable that, driven by benchmarking forces, there will be more and more cases of this kind in the future.

In short, in the era of big data, data provides a strong backing for scientific research, social development, and economic development. With the application of new technologies such as big data, cloud computing, and artificial intelligence, data mining will become deeper and deeper. On the road of protecting data security and promoting the sound development of the data ecology, the burden of privacy and safe computing will also "increasingly heavier", which is an opportunity and a challenge.

This content is the original [Intelligent Theory of Relativity],

It only represents personal views. Without authorization, no one may use it in any way, including reprinting, extracting, copying, or creating mirror images.

Some pictures are from the Internet, and the copyright ownership has not been verified. They are not for commercial use. If there is any infringement, please contact us.

Intelligent Relativity (WeChat ID: aixdlun):

• AI industry new media;

• Today’s Toutiao Qingyun Project winners TOP10;

• The paper's monthly top5 in the news technology list;

• Articles "occupies" the TOP10 list of popular articles in titanium media for a long time;

• Author of "One Hundred Thousand Whys of Artificial Intelligence"

• [Key areas of focus] Smart home appliances (including white appliances, black appliances, smart phones, drones and other AIoT devices), smart driving, AI+ medical care, robotics, Internet of Things, AI+ finance, AI+ education, AR/VR, cloud computing , Developers and the chips and algorithms behind them.

Guess you like

Origin blog.csdn.net/sinat_32970179/article/details/108699023