Please wait a minute...
Advanced Search
数据分析与知识发现  2022, Vol. 6 Issue (1): 35-42     https://doi.org/10.11925/infotech.2096-3467.2021.1420
     专题 本期目录 | 过刊浏览 | 高级检索 |
数据流通场景下的统一隐私计算框架研究——基于深圳数据交易所的实践
曾坚朋1,赵正2(),杜自然3,洪博然4
1武汉大学公共管理学院 武汉 430072
2国家信息中心大数据发展部 北京 100045
3深圳市数聚湾区大数据研究院平台研发部 深圳 518048
4深圳市数聚湾区大数据研究院工程管理部 深圳 518048
Unified Privacy Computing Framework in Data Circulation Scenario Based on the Practice of Shenzhen Data Exchange
Zeng Jianpeng1,Zhao Zheng2(),Du Ziran3,Hong Boran4
1School of Public Management, Wuhan University, Wuhan 430072, China
2Department of Big Data Development, State Information Center, Beijing 100045, China
3Department of Platform Research and Development, Greater Bay Area Big Data Research Institute, Shenzhen 518048, China
4Department of Engineering Management, Greater Bay Area Big Data Research Institute, Shenzhen 518048, China
全文: PDF (751 KB)   HTML ( 30
输出: BibTeX | EndNote (RIS)      
摘要 

【目的】 为保障数据安全流通,促进数据流通交易市场发展,针对隐私计算平台在数据流通场景的互联互通问题,构建标准化的统一隐私计算框架。【方法】 梳理隐私计算技术与平台发展现状,结合当前数据流通问题与数据交易所实践,提出基于数据流通场景的统一隐私计算框架。【结果】 提出三层架构实现与数据交易平台的业务联动、流通过程中的统一监管、互联互通的标准规范管理;两类互通实现数据流通交易平台与隐私计算平台的互联互通及不同隐私计算平台间互联互通;一个生态实现数据要素流通交易生态。【局限】 隐私计算技术尚未得到大规模商业应用的检验;隐私计算技术在计算安全性与计算效率方面尚未达到平衡。【结论】 基于数据流通交易场景的统一隐私计算框架有利于将隐私计算技术与数据流通紧密结合,促使数据价值最大化,并为实现隐私计算互联互通提供落地参考路径。

服务
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章
曾坚朋
赵正
杜自然
洪博然
关键词 数据流通交易隐私计算互联互通数据交易平台    
Abstract

[Objective] In order to ensure the safe circulation of data and promote the development of the data circulation trading market, a standardized unified privacy computing framework is constructed for the interconnection of privacy computing platforms in the data circulation scenario. [Methods] This paper summarizes the development status of privacy computing technologies and platform in recent years, and proposes a unified privacy computing framework based on data circulation scenario with reference to current data circulation problems and data exchange practices. [Results] The unified privacy computing framework proposes a “three-layer architecture, two types of interoperability and one ecology” to achieve business linkage with data exchange platform, unified supervision in the circulation process, and interconnected standard management respectively. Two types of interoperability realize the interconnection between data exchange platform and privacy computing platforms, as well as the interconnection between different privacy computing platforms. One ecology realizes the circulation and transaction ecology of data elements. [Limitations] Private computing technologies are untested for large-scale commercial use; privacy computing technology has yet to strike a balance between computing security and computing efficiency. [Conclusions] The unified privacy computing framework proposed in this paper based on the data circulation transaction scenario is conducive to the close combination of privacy computing technology and data circulation, to maximize the value of data, and to provide a reference for the realization of privacy computing interconnection.

Key wordsData Transaction and Circulation    Privacy Computing    Combine and Connect    Data Exchange Platform
收稿日期: 2021-12-10      出版日期: 2022-02-22
ZTFLH:  TP391  
通讯作者: 赵正,ORCID:0000-0002-0822-7408     E-mail: pmlzzz0426@163.com
引用本文:   
曾坚朋, 赵正, 杜自然, 洪博然. 数据流通场景下的统一隐私计算框架研究——基于深圳数据交易所的实践[J]. 数据分析与知识发现, 2022, 6(1): 35-42.
Zeng Jianpeng, Zhao Zheng, Du Ziran, Hong Boran. Unified Privacy Computing Framework in Data Circulation Scenario Based on the Practice of Shenzhen Data Exchange. Data Analysis and Knowledge Discovery, 2022, 6(1): 35-42.
链接本文:  
https://manu44.magtech.com.cn/Jwk_infotech_wk3/CN/10.11925/infotech.2096-3467.2021.1420      或      https://manu44.magtech.com.cn/Jwk_infotech_wk3/CN/Y2022/V6/I1/35
Fig.1  统一隐私计算框架
Fig.2  统一隐私计算框架在深圳数据交易所应用流程
[1] Gao W C, Yu W, Liang F, et al. Privacy-Preserving Auction for Big Data Trading Using Homomorphic Encryption[J]. IEEE Transactions on Network Science & Engineering, 2020, 7(2):776-791.
[2] Li D H, Yang Q Y, Yu W, et al. A Strategy-proof Privacy-preserving Double Auction Mechanism for Electrical Vehicles Demand Response in Microgrids [C]//Proceedings of the 36th International Performance Computing and Communications Conference (IPCCC). IEEE, 2017.
[3] Neela K L, Kavitha V. Enhancement of Data Confidentiality and Secure Data Transaction in Cloud Storage Environment[J]. Cluster Computing, 2018, 21:115-124.
doi: 10.1007/s10586-017-0959-4
[4] Domingo-Ferrer J. A Provably Secure Additive and Multiplicative Privacy Homomorphism [C]//Proceedings of the 5th International Conference on Information Security. 2002:471-483.
[5] Machanavajjhala A, Kifer D, Gehrke J, et al. L-diversity: Privacy Beyond k-Anonymity[J]. ACM Transactions on Knowledge Discovery from Data, 2007, 1(1). DOI: 10.1145/1217299. 1217302.
doi: 10.1145/1217299. 1217302
[6] Dwork C, Roth A. The Algorithmic Foundations of Differential Privacy[M]. Now Foundations and Trends, 2014.
[7] 何军. 支持数据交易的大数据试验场关键技术研究[J]. 网络安全技术与应用, 2016(9):71-72.
[7] ( He Jun. Research on Key Technologies of Big Data Testing Ground Supporting Data Trading[J]. Network Security Technology & Application, 2016(9):71-72.)
[8] Yao A C. Protocols for Secure Computations [C]//Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science. 1982.
[9] Dwork C, McSherry F, Nissim K, et al. Calibrating Noise to Sensitivity in Private Data Analysis[A]// Halevi S, Rabin T.TCC 2006, LNCS 3876, 2006:265-284.
[10] Niu C, Zheng Z, Fan W, et al. Trading Data in Good Faith: Integrating Truthfulness and Privacy Preservation in Data Markets [C]//Proceedings of IEEE International Conference on Data Engineering. IEEE, 2017.
[11] McMahan H B, Moore E, Ramage D, et al. Communication-Efficient Learning of Deep Networks from Decentralized Data[OL]. arXiv Preprint, arXiv: 1602.05629.
[12] 张辰雨. 隐私计算关键技术发展趋势展望[J]. 中国工业和信息化, 2021(10):16-22.
[12] ( Zhang Chenyu. Outlook on the Development Trend of Key Technologies in Privacy Computing[J]. Science & Technology Industry of China, 2021(10):16-22.)
[13] 杨晶. 基于隐私计算技术的数据安全应用研究[J]. 中国科技产业, 2021(10):61-63.
[13] ( Yang Jing. Research on Data Security Application Based on Privacy Computing Technology[J]. China Technology Industry, 2021(10):61-63.)
[14] JR/T 0196-2020. 多方安全计算金融应用技术规范R/T 0196-2020. 多方安全计算金融应用技术规范[S]. 2020.
[14] (JR/T 0196-2020. Technical Specification for Multi-party Secure Computing Finance ApplicationsR/T 0196-2020. Technical Specification for Multi-party Secure Computing Finance Applications[S]. 2020.)
[15] IEEE P3652. 1/D6.1. IEEE Approved Draft Guide for Architectural Framework and Application of Federated Machine Learning[S]. 2020.
[16] IEEE P2842/D4. IEEE Approved Draft Recommended Practice for Secure Multi-party Computation[S]. 2021.
[17] IEEE P2830/D3. IEEE Draft Standard for Technical Framework and Requirements of Trusted Execution Environment based Shared Machine Learning[S]. 2021.
[18] 强锋, 魏博言. 联邦学习技术金融应用规范标准的研究与建立[C]// 第十八届中国标准化论坛论文集, 2021.
[18] ( Qiang Feng, Wei Boyan. Research and Establishment of the Standard of Federal Learning Technology and Finance Application[C]// Proceedings of the 18th China Standardization Forum. 2021.)
[19] 边万莉 隐私计算:行业应用潜力巨大, “不愿、不敢、不能”困境待解[N]. 21世纪经济报道, 2021-11-11(012).
[19] ( Bian Wanli. Privacy Computing: Industry Applications have Huge Potential[N]. 21st Century Business, 2021-11-11(012).
[20] 中国信通院. 数据价值释放与隐私保护计算应用研究报告[R]. 中国信通院, 2021.
[20] (China Information and Communication Institute. Research Report on Computing Applications of Data Value Release and Privacy Protection[R]. China Information and Communication Institute, 2021.)
[1] 朱侯,方清燕. 社会化媒体用户隐私计算量化模型构建及隐私悖论均衡解验证*[J]. 数据分析与知识发现, 2021, 5(7): 111-125.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
版权所有 © 2015 《数据分析与知识发现》编辑部
地址:北京市海淀区中关村北四环西路33号 邮编:100190
电话/传真:(010)82626611-6626,82624938
E-mail:jishu@mail.las.ac.cn