大数据 ›› 2023, Vol. 9 ›› Issue (6): 15-27.doi: 10.11959/j.issn.2096-0271.2023073

• 专题:大数据安全与隐私计算 • 上一篇    下一篇

基于多方安全计算的公共数据融合创新模式研究及应用

金加和1, 赵程遥1, 求昊泽2, 刘鹏2   

  1. 1 浙江省数据开放融合关键技术研究重点实验室,浙江 杭州 310007
    2 浙江大学计算机科学与技术学院,浙江 杭州 310027
  • 出版日期:2023-11-15 发布日期:2023-11-01
  • 作者简介:金加和(1965- ),男,浙江省数据开放融合关键技术研究重点实验室副主任,浙江省大数据发展中心主任、高级工程师,浙江省政务服务标准化技术委员会副秘书长。主要研究方向为数字政府、数据治理、隐私计算等。
    赵程遥(1985- ),男,浙江省数据开放融合关键技术研究重点实验室副主任,浙江省大数据发展中心副主任、高级工程师,浙江省信创、国土空间专家库专家。主要研究方向为数据全生命周期管理、数据安全、数据开发利用等。
    求昊泽(2000- ),男,浙江大学计算机科学与技术学院硕士生,主要研究方向为隐私计算。
    刘鹏(1993- ),男,浙江大学软件学院硕士生,主要研究方向为隐私计算。
  • 基金资助:
    国家重点研发计划资助项目(2022YFF0902700)

Research and application of innovative models for public data integration based on secure multi-party computation

Jiahe JIN1, Chengyao ZHAO1, Haoze QIU2, Peng LIU2   

  1. 1 Zhejiang Provincial Laboratory of Data Integration Technology, Hangzhou 310007, China
    2 School of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China
  • Online:2023-11-15 Published:2023-11-01
  • Supported by:
    The National Key Research and Development Program of China(2022YFF0902700)

摘要:

多方安全计算技术已广泛应用于金融、互联网等领域,用于解决“数据孤岛”难题,然而其在公共数据领域的应用尚不成熟。针对公共数据领域提出了基于多方安全计算的公共数据融合创新模式,开发设计了在保护数据安全前提下利用各主体公共数据联合计算的技术架构。该模式通过技术创新突破制度制约,实现数据价值提升和保障数据安全的兼顾。主要分析了模式中多方安全计算核心系统的3个子层:联合计算子结构层、安全关系代数层和多方安全计算基础算子层。此外,还给出了实现公共数据融合创新模式的通用流程,并对公共数据融合创新模式的应用实例进行了阐述,为助力数字中国建设、畅通数据资源大循环提供新模式的借鉴。

关键词: 多方安全计算, 公共数据, 融合创新

Abstract:

Secure multi-party computation is widely used in finance, the Internet, and other fields to solve the problem of "data silos", but its application in the field of public data is not yet mature.An innovative model for public data integration based on secure multi-party computation was proposed, and a technical architecture for joint computing using public data from different parties while protecting their private information was presented.The model breaks through institutional constraints through technological innovation, achieving a balance between improving data value and ensuring data security.Three sub-layers of the core system of secure multi-party computation in the proposed model, including the joint computation substructure layer, the secure relational algebra layer, and the basic operator layer of secure multi-party computation were mainly analyzed.Additionally, a general process for implementing the innovative model was presented, and the practical application of the innovative model was also discussed.The results of this study provide a new reference for promoting digital China construction and facilitating the flow of data resources.

Key words: secure multi-party computation, public data, innovative integration

中图分类号: 

No Suggested Reading articles found!