Authoritative report: Enterprises will fully migrate to the cloud in 2030, and privacy computing can ensure the security and trustworthiness of data on the cloud

Recently, the international authoritative organization Forrester released the report "The Status of Privacy Protection Technologies (PPTs) in the Asia-Pacific Region" (referred to as the "Report"). The report shows that privacy-preserving technology is growing strongly in the Asia-Pacific region, with 76% of decision makers adopting private computing to protect privacy and data security. Forrester also listed three mainstream application scenarios of cloud migration, personal data protection, and cross-border data transmission. Among the personal data protection applications, four Ant applications were selected as typical cases.

(Picture: Four applications of Ant Privacy Computing were selected as typical cases of Forrester report)

The report pointed out that although the return on investment in the global privacy protection technology market has not been significant in recent years, the growing demand for data usage and privacy protection has prompted companies to actively seek solutions for safe and trusted data transfer.

Ant Group's privacy computing application services have been expanded to finance, insurance, medical care, marketing and other scenarios to help activate the value of industry data. For example, the Shanghai Pudong Development Bank and Ant's "crypto" framework is based on a risk model based on multi-party security calculations, preventing billions of yuan in high-risk loans. Sunshine Property & Casualty Insurance adopts Ant’s “Yiyu” privacy computing solution, which safely integrates third-party medical data, thereby improving the efficiency of compensation and reducing the probability of wrong odds. A hospital in Jiande, Zhejiang Province used the system built by Alibaba Cloud Digital Medical and the Ant "Argot" framework to optimize medical insurance settlement and improve the hospital's operational efficiency. In the marketing scenario, the Antchain Moss privacy computing platform also provides partners with multi-party data analysis technical support.

The arrival of the comprehensive digital era has accelerated the process of digital upgrading of enterprises. As a production factor, data will be deeply involved in the full link cycle of digital upgrading. It has become mainstream for enterprises to use external data to help improve business intelligence . According to Forrester data , 76% of privacy decision makers in the Asia-Pacific region are using privacy computing to deal with the risks posed by data interaction. Forrester also predicts that by 2030, enterprises will fully migrate to the cloud, and confidential computing as a typical privacy computing technology can provide security for this complex work.

Forrester judges that it will take at least two years for the deeper application of privacy protection technology. The successful implementation of early privacy protection technologies is mainly due to increasingly stringent personal privacy protection and data security policies. However, as a factor of production, the release of its strategic value is the motivation for the widespread application of privacy protection technologies. The layout of privacy computing technology is also a technical reserve for the marketization of data elements.

In the Asia-Pacific region, Chinese technology companies lead the world in privacy computing technology layout. Taking Ant Group as an example, Ant Group has been laying out privacy computing technology since 2016, and has created a set of industrial-grade and usable lingo technology stacks. In 2022, the number of ant privacy computing patents will reach the first place in the world, exceeding the sum of the second, third and fourth places. At the same time, Ant has also actively opened up its technological achievements and co-constructed the ecology, and open-sourced the trusted privacy computing framework of argot. In terms of exploring the frontiers of technology, Ant has pioneered the TECC trusted dense state computing technology, and its academic achievements have also been recognized by USENIX, IJCAI and other top international conferences.

Generally speaking, privacy protection technology is a comprehensive technology that integrates multiple technical routes. Each technical route has its advantages and limitations, so it also brings a high threshold for use. Through open source and other forms, it can Effectively improve the usability of technology. Forrester suggested that AI and automation technologies can accelerate privacy computing application pilots, and attention to platforms, partners, and application practices will also promote the implementation of privacy protection technologies.

Guess you like

Origin blog.csdn.net/FL63Zv9Zou86950w/article/details/130626160