Frontiers of Data and Domputing ›› 2021, Vol. 3 ›› Issue (3): 19-31.doi: 10.11871/jfdc.issn.2096-742X.2021.03.003

• Special Issue: Communication and Security of Network • Previous Articles     Next Articles

Frontiers and Applications of Data Security Technology from the Perspective of Compliance

CHEN Lei1,2,*(),LIU Wenmao1,*()   

  1. 1. Nsfocus Information Technology Co., Ltd., Beijing 100089, China
    2. Department of Automation, Tsinghua University, Beijing 100084, China
  • Received:2021-03-08 Online:2021-06-20 Published:2021-07-09
  • Contact: CHEN Lei,LIU Wenmao E-mail:chenlei5@nsfoucs.com;liuwenmao@nsfocus.com

Abstract:

[Objective] From the perspective of compliance, this paper comprehensively reviews and analyzes the principles and applications of ten cutting-edge data security technologies, aiming to promote the research and development of data security compliance and privacy protection in China.[Methods] Based on security requirements and compliance challenges, the data security construction is divided into three kinds of scenarios: user privacy compliance, data security governance, and data sharing and computing. The ten innovative technologies, such as differential privacy, sensitive data identification, user entity behavior analysis, security multi-party computing, and federal learning, are described in these three scenarios. The application status and challenges in the industry are also presented.[Results] Based on the analysis, these ten technologies can not only improve the level of data security and privacy protection of enterprises, but also satisfy some specific compliance requirements of the EU General Data Protection Regulation and China Cybersecurity Law. [Conclusions] In general, the legislation and regulation of global data security regulations have aroused high security and compliance demands, which brings new development opportunities for data security technology. There is no doubt that some of these emerging technologies still face several critical challenges in a wide range of commercial applications, and more efforts and explorations are needed in the future.

Key words: data security, privacy protection, security compliance, differential privacy, federal learning