The new book "Privacy Computing: Opening a New Business Model for Data Sharing" by Yan Li, the founder of Hashpower Think Tank, was released, and it is the first time to systematically record full-scenario application cases

Suddenly, like a spring breeze overnight, as the data in 2020 was officially incorporated into the production factors, it was like the firing of the starting gun, and privacy computing ushered in its "time, place, and harmony".

Afterwards, the construction of the data element market started like a catastrophe, and 2021 will enter the first year of data compliance. The three laws of "Network Security Law", "Data Security Law" and "Personal Information Protection Law" will be parallel, marking the end of the feast of plaintext data and the era of data encryption. Arriving, as a key technical solution to solve the problem of "data is available but not visible, use is controllable and measurable", privacy computing has once again been pushed to the forefront of the market. Gartner has included it as one of the annual strategic technology trends for two consecutive years, and pointed out that by 2024, global privacy-driven data protection and compliance technology spending will exceed 15 billion U.S. dollars. Shouldering the important task of cultivating the infrastructure of the data element market, it is also the need for governance under the compliance framework. What lies ahead is the blue ocean of tens of millions of levels to be explored.

Just as Baron Kelvin's classic prophecy to the physics community, the private computing building is about to be completed, but there are still heavy clouds in the sky. From the conception of privacy computing to the present, it is still in the early stages of commercialization. What must be faced is that this is a highly complex and collaborative project that requires a huge data source and a suitable scenario, which will test multiple factors such as funds, talents, and resources. Secondly, many issues such as computing power performance, computing cost, productization capability, interconnection standardization and compatibility still hinder the breakthrough of privacy computing towards commercial level, and there is no broad consensus on technology credibility and market recognition.

Why did you choose to prepare this book?

For privacy computing, the computing power think tank has witnessed its growth. As early as November 2018, Hashpower Think Tank, together with original data ecology builders and cryptography experts, jointly launched the privacy computing alliance organization "Zhenjin Society", and took the lead in publishing the first research report on the privacy computing industry in China. During the four years of tracking, recording and observation, we have deeply felt that the privacy computing market is uneven, and commercial applications are like "barrel short boards", which trap the overall situation. I often worry that privacy computing has not yet grown up. To open the "involution", the market needs education and training, and the evangelization and upgrading of business cases is the first step. " Yan Li, the founder of the computing power think tank, said with emotion.

"I know the value of data flow, but I don't know how to use it and where to use it, and whether the effect is as expected." This is the confusion that many friends in the industry have expressed to the computing power think tank, and many of them have already entered into the game. Computing vendors and data scene parties. It's like looking for a nail with a hammer. Manufacturers have technical products, but they can't find a suitable scenario; in many data scenarios, the data is "a basket", but the business logic is unclear, and it is not clear which links can be established with technology. Models, which areas belong to the category of privacy protection, need to be protected by privacy computing. The needs of all parties are misplaced and cannot be matched. The result is "private computing" for "private computing". This is not the proper posture for the healthy development of an industry.

Just because the dark clouds floating over privacy computing have not dissipated for a long time, and the implementation of scenarios and commercial exploration are hindered, the industry needs a set of "practical and proven" business action guidelines and reference coordinates. This book was born That is why.

"Privacy Computing: Opening a New Business Model for Data Sharing"
is listed

In this context, Yan Li, the founder of the computing power think tank, began to prepare to write this book. It began in 2020 and lasted for 2 years. Business Model", published by the official media People's Daily Publishing House, is now on the market.

insert image description here

Features of this book

1. It is equivalent to the "Privacy Computing Application Cases" full-scenario illustrated book, systematically analyzing and interpreting the commercial landing path.

Starting from several core scenarios with the largest amount of data, the most complex data types, and the highest demand for data governance, such as finance, medical care, government affairs, Internet of Things, and smart cities, some typical application cases and business models of current privacy computing are listed and analyzed. , and the path to productization of privacy computing. The content is detailed, and it answers what role privacy computing can play in commercial applications. In the construction of the data element market, from which links can privacy computing be used? These practitioners in the industry The most concerned issues have widely applicable reference value.

2. Based on a global perspective, clarify the context and map of the privacy computing industry at home and abroad, and understand the latest trends.

It not only focuses on major domestic privacy computing manufacturers and industrial ecology, but also provides an overview of the development of foreign privacy computing industries, including the productization status and latest progress of core companies such as Google, Facebook, and Intel. Today, when the dispute over the right to speak is increasingly fierce, it is more practical.

3. Under the new normal in the first year of data compliance, the history of domestic and foreign data laws and regulations is comprehensively sorted out, and a special section is also devoted to the special situation of cross-border data flow.

From the current status of data privacy and security laws and regulations, the current status of data legislation at home and abroad, the development trend and characteristics of cross-border data flow from a global perspective, the legal regulation and judicial practice of cross-border data flow in China, etc., to facilitate practitioners to understand Keep up to date with the latest data legislation and comply with regulations.

4. The theory is solid, the structure is complete, and it is elaborated from multiple dimensions such as data, technology, market, business, and compliance, and has both instrumental and application value.

Systematically explain the key technology map of privacy computing and the challenges and issues faced by current privacy protection technologies, including secure multi-party computing, homomorphic encryption, differential privacy, zero-knowledge proof, trusted execution environment, etc., to facilitate readers to understand the advantages and limitations of technologies , while discussing the relationship between blockchain and privacy computing, how the two complement each other and complement each other.

5. The preface is highly recommended by top experts and scholars.

Academician of the Royal Canadian Academy of Sciences and Academy of Engineering, former chair professor and head of the Department of Computer and Engineering, Hong Kong University of Science and Technology, Professor Yang Qiang, chairman of Shanghai Wanxiang Blockchain Co., Ltd., founder of Wanxiang Blockchain Laboratory, economics of Nankai University Dr. Xiao Feng wrote the preface, and Chen Xun, chairman of Yifang Jianshu, co-founder and director of Future Forum, and partner of Softbank Vision Fund, strongly recommended it.

Suitable reading group

Whether it is an introduction or an advanced exploration, this book is a professional-level reader commonly used in the privacy computing industry. Practitioners and college students who are interested in privacy computing and data tracks, and those who are engaged in data industry research or privacy computing technology research It is generally suitable for researchers, decision makers, legislators of laws and regulations, regulators, and clients who need privacy computing.

about the author

insert image description here
Yan Li, graduated from Shanghai Jiaotong University with a master's degree, and is the founder of Hashpower Think Tank, a research platform for intelligent data and privacy computing. Focus on the research of intelligent data, privacy computing, blockchain and other technologies to synergistically empower digital transformation solutions and business model innovations of traditional industries. Selected by Hexun as one of the 2019 "her role models" female figures.

Recommended by experts

Today, we have been emphasizing common prosperity and data equality. Anti-monopoly has become a top priority. How to determine data rights and price transactions, regulate cross-border data flows, and compete for the right to speak in data have become a series of propositions. The emergence of privacy computing has given the rudiments of answers to these questions. I am very happy to see such a systematic, instrumental and commercial monograph published on privacy computing.
——Professor Yang Qiang, academician of the Royal Canadian Academy of Sciences and Academy of Engineering, former chair professor and head of the Department of Computer and Engineering, Hong Kong University of Science and Technology

With the help of blockchain and privacy computing technology, billions of people have the possibility of making decisions about their own data. Then, a "decentralized" right confirmation, protection and transaction mechanism is obviously more credible than a centralized right confirmation, protection and transaction mechanism. Privacy computing is opening up a new way out for this. For those who develop privacy computing and data fields, this book is a reference book worth reading and learning.
——Xiao Feng, Chairman of Shanghai Wanxiang Blockchain Co., Ltd., Founder of Wanxiang Blockchain Laboratory, Ph.D. in Economics of Nankai University

Data is a key foundation for building information civilization and digital economy, but the value of data has not been fully released at this stage. But in this process, our understanding of data elements is constantly deepening, and the value of privacy computing has gradually been recognized by all walks of life. This book not only systematically expounds the technical means, but also includes the commercial value of privacy computing, and also sees many model innovations. It is a book that can help develop ideas.
——Chen Xun, chairman of Yifang Jianshu, co-founder and director of Future Forum, and partner of Softbank Vision Fund

thank you

This book can finally come out, thanks to Tongdun Technology, Zhongan Technology, Light Tree Technology, Fushu Technology, Financial OneConnect, Yifang Jianshu, Nuowei Technology, Yulian Technology, Gejing Technology, Da The first-hand information, cases and opinions contributed by companies such as Puhuilian Technology, WeBank, and Matrix Yuan (the above are listed in the order of appearance of the cases) are also the main force of this book.

In addition, special thanks to Tong Lin, an expert on blockchain privacy, and Su Guantong, an industry cryptographer and Ph.D. in cryptographic chips from Tsinghua University, for participating in the writing of some chapters, and Li Jiliang, an associate professor, specially appointed researcher, and doctoral supervisor at the School of Cyberspace Security of Xi'an Jiaotong University, for their valuable comments. At the same time, I would also like to thank Yuan Zhaoying and Liu Qingqing, the responsible editors of People's Daily Publishing House, for their help and hard work on the final publication of this book.

Guess you like

Origin blog.csdn.net/weixin_45413034/article/details/123927724