网络与信息安全学报 ›› 2022, Vol. 8 ›› Issue (6): 1-8.doi: 10.11959/j.issn.2096-109x.2022078

• 视角 •    下一篇

隐私计算的学术内涵与研究趋势

李凤华1, 李晖2, 牛犇1, 邱卫东3   

  1. 1 中国科学院信息工程研究所,北京 100085
    2 西安电子科技大学网络与信息安全学院,陕西 西安 710126
    3 上海交通大学网络空间安全学院,上海 200240
  • 修回日期:2022-11-30 出版日期:2022-12-15 发布日期:2023-01-16
  • 作者简介:李凤华(1966- ),男,湖北浠水人,博士,中国科学院信息工程研究所研究员、博士生导师,主要研究方向为网络与系统安全、隐私计算、密码应用
    李晖(1968- ),男,河南灵宝人,博士,西安电子科技大学教授、博士生导师,主要研究方向为网络与信息安全、隐私计算、信息论
    牛犇(1984- ),男,陕西西安人,博士,中国科学院信息工程研究所副研究员、博士生导师,主要研究方向为隐私计算、网络安全防护
    邱卫东(1973- ),男,江西修水人,上海交通大学教授、博士生导师,主要研究方向为计算机取证、密码分析、人工智能安全、大数据隐私保护
  • 基金资助:
    国家重点研发计划(2021YFB3101301);国家自然科学基金(61932015)

Academic connotation and research trends of privacy computing

Fenghua LI1, Hui LI2, Ben NIU1, Weidong QIU3   

  1. 1 Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100085, China
    2 School of Cyber Engineering, Xidian University, Xi’an 710126, China
    3 School of Cyber Science and Engineering, Shanghai Jiaotong University, Shanghai 200240, China
  • Revised:2022-11-30 Online:2022-12-15 Published:2023-01-16
  • Supported by:
    The National Key R&D Program of China(2021YFB3101301);The National Natural Science Foundation of China(61932015)

摘要:

笔者在国际上率先提出隐私计算的概念、定义及学术内涵,并形成了较为成熟的理论与技术体系。为了持续推动隐私计算的学术研究和产业应用,详细诠释了隐私计算的学术内涵,包括如何理解全生命周期、延伸控制、隐私量化与映射、脱敏效果评估,为什么要做迭代按需脱敏、为什么要研究隐私计算语言以及自存证在泛在共享中的作用等,并对一些被曲解的学术概念予以澄清;给出了隐私计算九大方面37个研究点,以及数据安全八大方面40个研究点,并从18个维度将隐私计算与数据安全等技术进行了全面对比,以帮助读者更好地理解隐私计算的研究范畴,正确区分隐私计算与数据安全。

关键词: 隐私计算, 延伸控制, 动态度量, 迭代按需脱敏, 保护效果评估

Abstract:

The authors of this paper first proposed the concept, definition and academic connotation of privacy computing, and formed a relatively mature theoretical and technical system accordingly.In order to continuously promote the academic research and industrial application of privacy computing, the academic connotation of privacy computing was elaborated, including how to understand the full-life cycle, extended control, privacy quantification and mapping, desensitization effect evaluation.Besides, the necessity of iterative on-demand desensitization and the motivation to study the language of privacy computing were presented.The role of audit log self-storage in ubiquitous sharing was explained and some distorted academic concepts were also clarified.Moreover, 37 research points in 9 aspects of privacy computing and 40 research points in 8 aspects of data security were given.It helps to better understand the research scope of privacy computing and correctly distinguish between privacy computing and data security.

Key words: privacy computing, extended control, dynamic measurement, iterative on-demand desensitization, protection effect evaluation

中图分类号: 

No Suggested Reading articles found!