Home Technology peripherals AI WAIC Observation: Privacy computing is accelerating its implementation in the industry, and a new technical standard system is about to emerge.

WAIC Observation: Privacy computing is accelerating its implementation in the industry, and a new technical standard system is about to emerge.

Jul 15, 2024 am 10:08 AM
privacy computing industry World Artificial Intelligence Conference

In recent years, people are talking about big models. Especially under the guidance of Scaling Law, people hope to use larger-scale data for training to infinitely improve the intelligence level of the model. In China, as a production factor alongside land, labor, capital, and technology, the value of "data" is increasingly valued. In recent years, the pace of market-oriented construction of China's data elements has accelerated significantly. The key to making "data" realize its value lies in the circulation and reuse of data between different subjects and in different scenarios. Data elements are essentially different from traditional production elements. The value of data is two-sided. The greater the business value, the higher the risk cost. Creating a trusted environment for data circulation is the underlying support for fully releasing the value of data elements.

WAIC Observation: Privacy computing is accelerating its implementation in the industry, and a new technical standard system is about to emerge.


In this context, the value of private computing technology has gradually become prominent and has become the focus of attention from academia and industry. From the birth of its concept, privacy computing has spent nearly 40 years extending from a cutting-edge theory to industrial applications. However, whether privacy computing can become the "cornerstone technology" of the data element circulation market still needs to clear a series of obstacles.
The flow of data in a dense form will become a future trend, and traditional privacy computing technology can no longer meet the requirements of the new situation. On the one hand, traditional privacy computing mainly focuses on computing security in multi-party cooperation scenarios, lacks a holistic security perspective, and cannot meet the additional risks brought by the introduction of new scenarios and roles in the large-scale data circulation process (such as operator risks, processing risk). Secondly, it is necessary to adopt different security graded technical solutions for data with different security levels in order to minimize the implementation cost of privacy computing. Therefore, it is particularly important to promote industry standardization.
At the 2024 World Artificial Intelligence Conference, industry, academia and research brought new exploration and practice. On July 5, a number of domestic industry-university-research institutions jointly released two white papers focusing on "General Security Classification of Privacy Computing Products" and "Personal Information Anonymization System" to provide the latest technology for the challenges currently encountered by the data element circulation industry. thinking and industry practice.
What kind of privacy computing technology standard system do we need?
Privacy computing is a comprehensive interdisciplinary technology that cross-integrates knowledge in many fields such as cryptography, artificial intelligence, and computer hardware. It has currently formed technical routes such as multi-party secure computing, federated learning, and trusted execution environments.
Promoting the trusted circulation of data elements requires the cooperation of technology research and development and standard setting. In various directions of privacy computing technology, there is still a lot of standard-setting work to be completed. Industry, academia and research circles generally believe that the three directions of "cross-domain data control", "controlled anonymization" and "universal security classification" deserve attention.
The purpose of cross-domain data control is to ensure that data will not be accessed or tampered with by unauthorized entities during the process of data sharing and flow, while complying with relevant laws, regulations and privacy policies. As a new production factor, the key to the value of data lies in the circulation and reuse of data by different entities and in different scenarios. However, this process often suffers from "unclear responsible entities, inconsistent interest demands, uneven capabilities, and difficult to trace responsibility links." risks of.
Controlled anonymization is usually used to ensure that personal privacy information will not be revealed when data is used and analyzed, while maintaining the usefulness and accuracy of the data. my country's "Cybersecurity Law" and "Personal Information Protection Law" specifically set up "personal information anonymization clauses" to exclude anonymized personal data from personal information protection, but the legal connotation and implementation standards have yet to be clarified. In fact, the existence of personal information anonymization clauses has become one of the biggest bottlenecks in the flow of data transactions and the construction of the market for data elements.
In addition, in privacy computing, universal security classification can help determine the most suitable protection measures for various products, thereby rationally allocating security resources and ensuring that sensitive data is properly protected. Currently, although there are some safety classification standards for a single technology route, the classification standards for different technology routes are completely inconsistent. Users cannot make horizontal comparisons of all products, and these standards are not applicable to emerging technology routes.
With the in-depth cooperation between industry, academia and research circles, we have already seen some progress.
Many domestic industry, academia and research institutions reached a consensus at this conference
Regarding the issue of "cross-domain data management and control", we can find the answer in a white paper released at the end of 2023.
At the end of 2023, the Data Law Research Center of East China University of Political Science and Law and Ant Group took the lead in releasing the "White Paper on Cross-Domain Data Management and Control", which for the first time systematically explained the practical guidelines and strategies for cross-domain data management and control, and proposed the use of technical means such as dense state computing to effectively manage and control data. Risks of circulation and utilization.
The white paper forms a trinity of cross-domain data management and control solutions from the technical, legal and management levels, including data governance mechanisms such as data desensitization and encryption beforehand, process control mechanisms such as defining the scope of use based on scenarios and security levels during the process, and post-event data management and control mechanisms. Audit supervision mechanism.
At the same time, the white paper also proposes five management and control technical requirements that are adapted to data circulation risks, including data sources that can be confirmed, data that is available but not visible, data that can be calculated but not identifiable, data use that can be defined, and data circulation that can be traced, and provides guidance on how to clarify A feasible solution for the responsibilities of each subject in data circulation will help build China's trusted data circulation reference architecture.
Regarding the two propositions of "controlled anonymization" and "universal security classification", we also saw the latest consensus between academia and industry at the recent WAIC conference:
At the 2024 World Artificial Intelligence Conference, many domestic industry-university-research institutes The agencies jointly released two white papers, "General Security Classification of Privacy Computing Products" and "Personal Information Anonymization System: Technology and Law."
Security classification in privacy computing has always had many difficulties.Judging from the experience of industrial practice, privacy computing products with different technical routes, different product forms, and different application scenarios face huge differences in privacy data leakage risks and security requirements. In the absence of unified security classification standards, product development It is difficult for parties and users to evaluate and measure the balance between security and performance.
Luo Feng, technical director of the Shenzhen National Fintech Evaluation Center, once said that the application of privacy computing technology in the financial industry is relatively advanced, but there are still technical and business challenges in large-scale implementation. The routes of privacy computing are diverse, and different application scenarios require different balances between security and performance. Judging from existing evaluations and standards, it is difficult to evaluate the difference between the overall safety and performance of a product before safety classification. The phenomenon of "technological islands" exists objectively. The inability of technologies to interconnect and interoperate may lead to differences in product selection among different financial institutions. In addition, the expected benefits are difficult to estimate and investment costs are high, resulting in many small and medium-sized financial institutions being reluctant to promote privacy computing applications.
A universal security classification scheme that can be applied to more technical routes and has practical guidance is indispensable for the large-scale implementation of privacy computing.
Based on the above situation, 16 domestic institutions including Ant Group, China Communications Standards Association Big Data Technology Standards Promotion Committee, Shenzhen National Financial Technology Evaluation Center, Tsinghua University and other institutions jointly wrote the white paper "General Security Classification of Privacy Computing Products". It is worth mentioning that the members of the writing steering group include Wang Xiaoyun, an academician of the Chinese Academy of Sciences and a fellow of the International Cryptozoology Association, and authoritative scholars such as Ren Kui, dean of the School of Computer Science and Technology of Zhejiang University and deputy director of the National Key Laboratory of Blockchain and Data Security.

WAIC Observation: Privacy computing is accelerating its implementation in the industry, and a new technical standard system is about to emerge.

In this white paper, industry, academia and research parties discuss the many difficulties faced by privacy computing security classification one by one, and provide design ideas for universal security classification. For example, we can shield the differences between different technical routes according to the classification of attack and defense effects, add a graded level of "resistance to known attacks" between "provably safe" and "unsafe", and introduce more dimensions such as software credibility to quantify "implementation of security" , clarify the corresponding relationship between all types of technical features and safety classification.
Shi Xinlei, algorithm engineer of the Bank of China's Privacy Computing Team, once said that due to the influence of participant data, different demand scenarios have different security requirements. Through grading, we can provide an appropriate level of security for the business and achieve a balance between performance and security. It can also allocate reasonable computing resources to achieve cost control. Secondly, the degree of risk can be quickly identified through security classification. Different levels of security can take corresponding levels of regulatory control measures to reduce security risks. Reasonable privacy computing product security assessment standards and rating systems can help better understand and evaluate product security, build a trust mechanism for data circulation, and promote industry standards.
How to realize data value development on the basis of personal privacy protection is another thorny challenge faced by the industry. Personal data is the data with the highest utilization value, the most diverse use scenarios, and the most mature processing measures. How to realize the development of data value on the basis of personal privacy protection and promote the realization of trusted and secure data sharing between different industries and different institutions. Openness and trade are the common exploration directions of industry, academia and research.
Among them, anonymization technology is an important and effective means to protect personal data privacy. In the planning and construction process of my country's data infrastructure, the processing technology and institutional specifications related to the anonymization of personal information have also been placed in an important position. From the perspective of industrial implementation, the key to collaboratively promoting the solution of this problem lies in the construction and expansion of a set of infrastructure that integrates law and technology.
To this end, based on the guidance of the "Personal Information Anonymization Clauses" set in the "Cybersecurity Law" and "Personal Information Protection Law", the University of International Business and Economics, the Big Data Technology Standards Promotion Committee and Ant Group jointly wrote the "Personal Information Anonymization Clause" Regime: Technology and Law (2024)" white paper.

WAIC Observation: Privacy computing is accelerating its implementation in the industry, and a new technical standard system is about to emerge.

Personal information anonymization system

1. Dilemmas and challenges

  • Enterprises are worried that anonymization measures will be ineffective because they cannot meet legal requirements, or will lose their use value.
  • Regulators are worried that anonymization will become a tool to circumvent regulation.
  • Users worry that anonymity is a false promise.

2. Data Infrastructure Path

  • Shift to the composite "data infrastructure" path.
  • Data infrastructure is the infrastructure of the data element market.
  • Anonymization terms are expanded into infrastructure that integrates law and technology.

3. "presumed anonymity beforehand" and "anonymity determined afterward"

  • Prior "presumed anonymity" is accomplished through anonymization technology solutions.
  • After-the-fact "judgment anonymity" is accomplished by explaining the law and perfecting responsibilities.

4. Controlled anonymization measures

  • Pseudonymization, only used in controlled spaces.
  • Attribute information is only used in controlled spaces and will not be associated with open space data.

From technical standards to large-scale implementation

1. Build standards

  • Reduce the difficulty and enterprise costs of large-scale implementation of new technologies.

2. Construct a system of technical requirements standards and technical methods

  • The circulation of data elements urgently requires the construction of a new technical standard system.

3. Social cooperation

  • to jointly build a new technical standard system.

    WAIC Observation: Privacy computing is accelerating its implementation in the industry, and a new technical standard system is about to emerge.

The above is the detailed content of WAIC Observation: Privacy computing is accelerating its implementation in the industry, and a new technical standard system is about to emerge.. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Chat Commands and How to Use Them
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

DeepMind robot plays table tennis, and its forehand and backhand slip into the air, completely defeating human beginners DeepMind robot plays table tennis, and its forehand and backhand slip into the air, completely defeating human beginners Aug 09, 2024 pm 04:01 PM

But maybe he can’t defeat the old man in the park? The Paris Olympic Games are in full swing, and table tennis has attracted much attention. At the same time, robots have also made new breakthroughs in playing table tennis. Just now, DeepMind proposed the first learning robot agent that can reach the level of human amateur players in competitive table tennis. Paper address: https://arxiv.org/pdf/2408.03906 How good is the DeepMind robot at playing table tennis? Probably on par with human amateur players: both forehand and backhand: the opponent uses a variety of playing styles, and the robot can also withstand: receiving serves with different spins: However, the intensity of the game does not seem to be as intense as the old man in the park. For robots, table tennis

The first mechanical claw! Yuanluobao appeared at the 2024 World Robot Conference and released the first chess robot that can enter the home The first mechanical claw! Yuanluobao appeared at the 2024 World Robot Conference and released the first chess robot that can enter the home Aug 21, 2024 pm 07:33 PM

On August 21, the 2024 World Robot Conference was grandly held in Beijing. SenseTime's home robot brand "Yuanluobot SenseRobot" has unveiled its entire family of products, and recently released the Yuanluobot AI chess-playing robot - Chess Professional Edition (hereinafter referred to as "Yuanluobot SenseRobot"), becoming the world's first A chess robot for the home. As the third chess-playing robot product of Yuanluobo, the new Guoxiang robot has undergone a large number of special technical upgrades and innovations in AI and engineering machinery. For the first time, it has realized the ability to pick up three-dimensional chess pieces through mechanical claws on a home robot, and perform human-machine Functions such as chess playing, everyone playing chess, notation review, etc.

Claude has become lazy too! Netizen: Learn to give yourself a holiday Claude has become lazy too! Netizen: Learn to give yourself a holiday Sep 02, 2024 pm 01:56 PM

The start of school is about to begin, and it’s not just the students who are about to start the new semester who should take care of themselves, but also the large AI models. Some time ago, Reddit was filled with netizens complaining that Claude was getting lazy. "Its level has dropped a lot, it often pauses, and even the output becomes very short. In the first week of release, it could translate a full 4-page document at once, but now it can't even output half a page!" https:// www.reddit.com/r/ClaudeAI/comments/1by8rw8/something_just_feels_wrong_with_claude_in_the/ in a post titled "Totally disappointed with Claude", full of

At the World Robot Conference, this domestic robot carrying 'the hope of future elderly care' was surrounded At the World Robot Conference, this domestic robot carrying 'the hope of future elderly care' was surrounded Aug 22, 2024 pm 10:35 PM

At the World Robot Conference being held in Beijing, the display of humanoid robots has become the absolute focus of the scene. At the Stardust Intelligent booth, the AI ​​robot assistant S1 performed three major performances of dulcimer, martial arts, and calligraphy in one exhibition area, capable of both literary and martial arts. , attracted a large number of professional audiences and media. The elegant playing on the elastic strings allows the S1 to demonstrate fine operation and absolute control with speed, strength and precision. CCTV News conducted a special report on the imitation learning and intelligent control behind "Calligraphy". Company founder Lai Jie explained that behind the silky movements, the hardware side pursues the best force control and the most human-like body indicators (speed, load) etc.), but on the AI ​​side, the real movement data of people is collected, allowing the robot to become stronger when it encounters a strong situation and learn to evolve quickly. And agile

ACL 2024 Awards Announced: One of the Best Papers on Oracle Deciphering by HuaTech, GloVe Time Test Award ACL 2024 Awards Announced: One of the Best Papers on Oracle Deciphering by HuaTech, GloVe Time Test Award Aug 15, 2024 pm 04:37 PM

At this ACL conference, contributors have gained a lot. The six-day ACL2024 is being held in Bangkok, Thailand. ACL is the top international conference in the field of computational linguistics and natural language processing. It is organized by the International Association for Computational Linguistics and is held annually. ACL has always ranked first in academic influence in the field of NLP, and it is also a CCF-A recommended conference. This year's ACL conference is the 62nd and has received more than 400 cutting-edge works in the field of NLP. Yesterday afternoon, the conference announced the best paper and other awards. This time, there are 7 Best Paper Awards (two unpublished), 1 Best Theme Paper Award, and 35 Outstanding Paper Awards. The conference also awarded 3 Resource Paper Awards (ResourceAward) and Social Impact Award (

Hongmeng Smart Travel S9 and full-scenario new product launch conference, a number of blockbuster new products were released together Hongmeng Smart Travel S9 and full-scenario new product launch conference, a number of blockbuster new products were released together Aug 08, 2024 am 07:02 AM

This afternoon, Hongmeng Zhixing officially welcomed new brands and new cars. On August 6, Huawei held the Hongmeng Smart Xingxing S9 and Huawei full-scenario new product launch conference, bringing the panoramic smart flagship sedan Xiangjie S9, the new M7Pro and Huawei novaFlip, MatePad Pro 12.2 inches, the new MatePad Air, Huawei Bisheng With many new all-scenario smart products including the laser printer X1 series, FreeBuds6i, WATCHFIT3 and smart screen S5Pro, from smart travel, smart office to smart wear, Huawei continues to build a full-scenario smart ecosystem to bring consumers a smart experience of the Internet of Everything. Hongmeng Zhixing: In-depth empowerment to promote the upgrading of the smart car industry Huawei joins hands with Chinese automotive industry partners to provide

Li Feifei's team proposed ReKep to give robots spatial intelligence and integrate GPT-4o Li Feifei's team proposed ReKep to give robots spatial intelligence and integrate GPT-4o Sep 03, 2024 pm 05:18 PM

Deep integration of vision and robot learning. When two robot hands work together smoothly to fold clothes, pour tea, and pack shoes, coupled with the 1X humanoid robot NEO that has been making headlines recently, you may have a feeling: we seem to be entering the age of robots. In fact, these silky movements are the product of advanced robotic technology + exquisite frame design + multi-modal large models. We know that useful robots often require complex and exquisite interactions with the environment, and the environment can be represented as constraints in the spatial and temporal domains. For example, if you want a robot to pour tea, the robot first needs to grasp the handle of the teapot and keep it upright without spilling the tea, then move it smoothly until the mouth of the pot is aligned with the mouth of the cup, and then tilt the teapot at a certain angle. . this

Distributed Artificial Intelligence Conference DAI 2024 Call for Papers: Agent Day, Richard Sutton, the father of reinforcement learning, will attend! Yan Shuicheng, Sergey Levine and DeepMind scientists will give keynote speeches Distributed Artificial Intelligence Conference DAI 2024 Call for Papers: Agent Day, Richard Sutton, the father of reinforcement learning, will attend! Yan Shuicheng, Sergey Levine and DeepMind scientists will give keynote speeches Aug 22, 2024 pm 08:02 PM

Conference Introduction With the rapid development of science and technology, artificial intelligence has become an important force in promoting social progress. In this era, we are fortunate to witness and participate in the innovation and application of Distributed Artificial Intelligence (DAI). Distributed artificial intelligence is an important branch of the field of artificial intelligence, which has attracted more and more attention in recent years. Agents based on large language models (LLM) have suddenly emerged. By combining the powerful language understanding and generation capabilities of large models, they have shown great potential in natural language interaction, knowledge reasoning, task planning, etc. AIAgent is taking over the big language model and has become a hot topic in the current AI circle. Au

See all articles