Please wait a minute...

Information and Communications Technology and Policy

Information and Communications Technology and Policy
Archive
[an error occurred while processing this directive]

Current Issue

    • Overview of the development of privacy preserving computing
    • YAN Shu, LYU Ailin
    • Information and Communications Technology and Policy. 2021, 47(6): 1-11. DOI:10.12267/j.issn.2096-5931.2021.06.001
    • Abstract ( 1720 )   
    • Data circulation is the key to release the value of data. Privacy preserving computing technology provides a solution for data circulation. This paper summarizes the technical principles of privacy preserving computing, lists the main application scenarios of privacy preserving computing, and analyzes the development of privacy preserving computing industry all around the world. On this basis, this paper summarizes the problems faced by the development, and analyzes the future development trend of privacy preserving computing from the perspective of technology, industry and application.
    • Related Articles | Metrics
    • Privacy preserving computing product evaluation system
    • YUAN Bo, WANG Siyuan
    • Information and Communications Technology and Policy. 2021, 47(6): 12-18. DOI:10.12267/j.issn.2096-5931.2021.06.002
    • Abstract ( 387 )   
    • At present, the usability of privacy preserving computing technology is greatly enhanced, usage scenarios are gradually enriched, the degree of productization gradually matures, the number of products has exploded, and the types of products are becoming more abundant, and the privacy preserving computing industry is gradually taking shape. As an emerging technology, it is difficult for users to comprehensively determine the choice of privacy preserving computing products. Therefore, it is urgent to establish a unified privacy preserving computing product specification and product evaluation system. This article discusses the history of privacy preserving computing from cutting-edge technology to landing products, analyzes the current situation of privacy preserving computing products, and proposes a set of evaluation systems for privacy preserving computing products based on actual work, and looks forward to the future development.
    • References | Related Articles | Metrics
    • Key technology and innovation of privacy preserving computing
    • FU Fangcheng, HOU Chen, CHENG Yong, TAO Yangyu
    • Information and Communications Technology and Policy. 2021, 47(6): 27-37. DOI:10.12267/j.issn.2096-5931.2021.06.004
    • Abstract ( 1006 )   
    • Big Data has become one of the factors of production and a strategic resource in the digital economy.However, data are usually scattered in different organizations and cannot be integrated in a centralized manner due to privacy concerns in practice, hindering the performance of many real-world big data applications. In order to tackle this problem, privacy preserving computing has been developed to enable the application of data from different parties for federated learning and analysis with privacy guarantees. In this paper, we provide a survey of the key techniques and advances in privacy preserving computing, including private set intersection, diagonal federated learning, asynchronous parallel computation, message compression protocols, unidirectional connections, trusted execution environments, and federated data analysis. Finally, we introduce the applications and techniques in Angel PowerFL, which is a general and industry-grade privacy preserving computing platform.
    • References | Related Articles | Metrics
    • Middleware and blockchain based interconnecting system of heterogeneous privacy preserving computing platforms
    • XU Qian, ZHANG Qing, YU Bo, YU Wenqing, HE Wei
    • Information and Communications Technology and Policy. 2021, 47(6): 38-49. DOI:10.12267/j.issn.2096-5931.2021.06.005
    • Abstract ( 606 )   
    • With the rapid development of digital economy, data security has become an important challenge. How to release data value while ensuring the data privacy is a key issue in the this digital age. As a logical combination of secure multi-party computation and federated learning, privacy preserving computing has widely attracted the attentions from many tech providers and data holders. Basing on the modern cryptography techniques such as secret sharing, oblivious transfer, and garbled circuit, privacy preserving computing can enable efficient cross-domain data sharing and data fusion in a secure manner. To date, the adoption of privacy-preserving computing has taken place in many realworld scenarios, for example, finance, telecommunication, health care, and government affairs. In this paper, basing on the basic conceptions of privacy preserving computing, a brief analysis of key technologies of secure multi-parity computation and federated learning will be presented. Several typical applications in the data security scenarios will be provided. Furthermore, for addressing the interconnection problem between heterogeneous platforms, two practical approaches relying on middleware and blockchain will be discussed in the latter part of this paper.
    • References | Related Articles | Metrics
    • A survey of Private Set Intersection technology and finance practice
    • HUANG Cuiting, ZHANG Fan, SUN Xiaochao, BIAN Yang
    • Information and Communications Technology and Policy. 2021, 47(6): 50. DOI:10.12267/j.issn.2096-5931.2021.06.006
    • Abstract ( 1084 )   
    • Private Set Intersection (PSI) is a research hotspot in the field of privacy-preserving computation. As a common pre-step for the data cooperation among different institutions or companies, it has highly practical value in the realistic scenarios. In this paper, we first introduce the classification and the relevant technologies of PSI. Secondly, we explain a comprehensive implementation process of PSI based on blind signature as an example. Then we present the use scenarios of PSI in finance industry, including financial joint modeling, financial joint statistics, financial joint marketing and financial joint operation analysis, etc. , for revealing the research and practical value of PSI. Finally, this paper analyzes and discusses the technical challenges and some research directions of current PSI technology.
    • Related Articles | Metrics
    • Privacy preserving computing in the financial field
    • QIANG Feng, XUE Yushan, XIANG Mei
    • Information and Communications Technology and Policy. 2021, 47(6): 57-62. DOI:10.12267/j.issn.2096-5931.2021.06.007
    • Abstract ( 561 )   
    • At present, banks, insurance companies and other financial institutions have fully excavated their own data. Facing the homogeneous competition, the innovation of traditional financial services needs to be transformed to support online scenarios by exploring and integrating both internal and external data. While the demand for data fusion usage is booming, in recent years, external data collaboration has been frequently exposed to the problems of improper data uses, violation of customer privacy, and its doubtfulness business compliance. In this paper, we sort out the data compliance issues existed in the current laws and regulations, and analyze the compliance of privacy preserving computing according to its technical principles and applications in the financial services.
    • References | Related Articles | Metrics
    • Problems and reflections on the development of value of data elements
    • SUN Ke
    • Information and Communications Technology and Policy. 2021, 47(6): 63-67. DOI:10.12267/j.issn.2096-5931.2021.06.008
    • Abstract ( 506 )   
    • As a key factor of production in the development of digital economy, data has a fundamental and strategic position. The CPC Central Committee and the State Council attach great importance to the development of data elements, and the valualization of data elements plays an important role in realizing high-quality economic development, promoting the modernization of governance capacity, and meeting the needs of people for a better life. The value of data elements has been accelerated along the three stages of data resource utilization, data asset utilization and data capitalization, and has achieved initial results. Based on the analysis of the current problems of the value of data elements, this paper puts forward the policy suggestions of building four systems: data elements resource system, data transaction circulation system, data fusion application system and data security guarantee system.
    • References | Related Articles | Metrics
    • Data driven network intelligent operation architecture
    • CHENG Xinzhou, JIA Yuwei, CHENG Chen
    • Information and Communications Technology and Policy. 2021, 47(6): 68-73. DOI:10.12267/j.issn.2096-5931.2021.06.009
    • Abstract ( 331 )   
    • At present, the digital transformation of the entire society is accelerating, and the value of telecom networks is prominent, operators are facing huge opportunities. At the same time, with the large-scale deployment of 5G networks, operators are also facing many challenges such as complex network deployment, diversified business models, and personalized user demand. Under this background, this paper proposes a data-driven network intelligent operation architecture. The basis capability of this architecture is built through three steps, which are “ cloud network empowerment”, “data enablement”, and “application intelligence”, supplemented by “smart ecology” as a guarantee, this architecture aims to achieve the ultimate goal of “smart services”. Thereby it will be comprehensively promoting the intelligent development of the whole social.
    • References | Related Articles | Metrics
    • Thoughts on personal information protection supervision strategies in the digital development era
    • QUAN Xiaofeng, LIU Gaofeng
    • Information and Communications Technology and Policy. 2021, 47(6): 74-79. DOI:10.12267/j.issn.2096-5931.2021.06.010
    • Abstract ( 378 )   
    • The global sweep of the COVID-19 has accelerated the digitalization process of economy and the society. Digital development brings new experiences to the public from social, shopping, travelling and other aspects. However, while digitalization drives economic development, there are frequent security incidents such as personal information being leaked, stolen, and trafficked, which brings personal psychological and property security threats. Therefore, how to balance data-driven development and personal information security supervision in the process of global digitalization has become an international hot topic. Based on the multi-source analysis of the current hot issues of personal information security, this paper analyzes the challenges of China􀆳s current regulatory strategies by comparing the typical international regulation mode on personal information protection, and offers some suggestions on law making, supervision and personal assistance to ensure a balance between the innovative development of the digital economy and the protection of personal information.
    • References | Related Articles | Metrics
    • The development of computing industry in post Moore era
    • WEI Liurong
    • Information and Communications Technology and Policy. 2021, 47(6): 80-84. DOI:10.12267/j.issn.2096-5931.2021.06.011
    • Abstract ( 430 )   
    • As the industrial process continues to approach the physical limit, it is no longer realistic to achieve the improvement of computing system performance and the upgrading of the computing power industry through the reduction of industrial processes in accordance with Moore􀆳s Law. The entire computing power industry has entered the post-Moore era, and computing technology has entered a multi- factor comprehensive innovation stage. This paper analyzes the development trend of computing power industry from two aspects of supply and demand, studies the opportunities and challenges faced by China􀆳s computing power industry, and puts forward some suggestions to promote the innovation and development of China􀆳s computing power industry.
    • References | Related Articles | Metrics
    • Discussion on 5G base station power supply and refrigeration energy-saving technology
    • YU Bin, YU Haibin
    • Information and Communications Technology and Policy. 2021, 47(6): 85-90. DOI:10.12267/j.issn.2096-5931.2021.06.012
    • Abstract ( 493 )   
    • With the rapid development of the information and communication industry and “new infrastructure”, the infrastructure construction of China􀆳s 5G network is developing rapidly. While 5G networks have the characteristics of high speed, large capacity, low latency, and high reliability, the single-site power consumption of 5G base stations has also increased several times. It is particularly important to realize energy-saving operation of 5G base stations. This article discusses the energy-saving technology of 5G base station power supply system and cooling system to help 5G base station safe, reliable, green and low-carbon operation.
    • References | Related Articles | Metrics
    • Research and implementation of AI technology related to air conditioning in data center
    • LIU Weimin, ZHANG Binghua, XIAO Yujia, YU Xinglin
    • Information and Communications Technology and Policy. 2021, 47(6): 93-96. DOI:10.12267/j.issn.2096-5931.2021.06.013
    • Abstract ( 401 )   
    • Based on the intelligent big data monitoring platform and deep learning platform, this paper constructs a set of intelligent cooling technology products of air conditioning water system in data center. In terms of data collection and processing, model deep learning, and security boundary protection, the air-conditioning water system realizes intelligent adjustment and solves the problems of safety and universality. The energy consumption of data center infrastructure can be reduced by 25%, the average annual PUE can be reduced from 1. 17 to 1. 13, and the electricity cost of single module computer room can be saved by more than 1 million yuan. Finally, this paper analyzes and explains from three aspects: data processing, model strategy and landing practice.
    • References | Related Articles | Metrics