CNCC2023 will be held in Shenyang from October 26 to 28, during which 129 technical forums will be held, covering more than 30 directions such as artificial intelligence, security, computing +, software engineering, education, network, chip, cloud computing, etc. This article introduces the "Data Flow and Privacy Computing" technical forum that will be held on October 27.
Data is the core engine for the in-depth development of the digital economy. What privacy issues and challenges are faced in the whole process of data circulation? And what are the coping strategies? How to use privacy computing to achieve a balance between privacy protection and effective use of data? The forum will invite industry experts and audiences to discuss data circulation and privacy computing.
To register and learn more about the technical forum, please identify the QR code below to enter the official website of CNCC2023.
As a new type of production factor, data has become a national basic strategic resource and the core engine for the in-depth development of the digital economy. However, data contains a large amount of private information, and data circulation and sharing faces major challenges. Privacy computing, as a new theory and technology, can seek a balance between privacy protection and effective use of data. Privacy computing is a computing theory and method for the whole life cycle protection of privacy information, a computable model and axiomatic system for privacy measurement, privacy leakage cost, privacy protection and privacy analysis complexity when the ownership, management right and use right of privacy information are separated, and it is the core technology for efficient data governance and utilization. The forum will invite the original authors and well-known scholars of privacy computing to report on the cutting-edge theories, technologies and applications in this field based on the needs of data circulation and sharing, and discuss the relationship between data circulation sharing and privacy computing and future development trends in the discussion session to help the development of the digital economy.
Forum arrangement
order | topic | Keynote speaker | unit |
1 | The development trend of privacy computing and the security system of data circulation | Li Fenghua | Institute of Information Engineering, Chinese Academy of Sciences |
2 | Privacy measurement, masking control, and data flow | Li Hui | Xidian University |
3 | Build a solid personal information protection barrier and escort the construction of a network power and digital China | Jiang Wei | Institute of Cyber Security, China Academy of Cyberspace |
4 | Typical data element security issues and policies | Liu Zheli | Nankai University |
5 | Some explorations of data flow transfer technology under privacy protection are discussed | Liu Zhe | Zhejiang Laboratory |
Panel Guest (Moderator) | Wang wei | Beijing Jiaotong University | |
Panel guest | Li Fenghua | Institute of Information Engineering, Chinese Academy of Sciences | |
Li Hui | Xidian University | ||
Jiang Wei | Institute of Cyber Security, China Academy of Cyberspace | ||
Liu Zheli | Nankai University | ||
Liu Zhe | Zhejiang Laboratory | ||
Zheng Xiaolin | Zhejiang University | ||
Zhu Hui | Xidian University | ||
Yao | Shenzhen Insight Intelligent Technology Co., Ltd |
Chairman of the Forum
Li Fenghua
Second-level researcher and deputy chief engineer of the Institute of Information Engineering, Chinese Academy of Sciences
Distinguished researcher and doctoral supervisor of Chinese Academy of Sciences. He has successively served as the head of the Department of Computer Science, the director of the Division of Graduate Studies, the director of the Division of Science and Technology, and the deputy chief engineer. Member of the Cyberspace Security Discipline Review Group of the Academic Degrees Committee of the State Council, project leader of the "13th Five-Year Plan" and "14th Five-Year Plan" of the National Key R&D Program, chief expert of the theme project of the National 863 Program, and leader of the key project of NSFC-General General Fund, etc.; Director of China Cyberspace Security Association, Standing Director of China Chinese Information Society, Director of Big Data Security and Privacy Computing Professional Committee, Director of China Communications Society, Deputy Director of Journals and Publication Working Committee, Member of Academic Working Committee, etc.; Executive editor-in-chief of Journal of Network and Information Security, editorial board member of WWW, CJE, Journal of Electronics, Journal of Communications, etc. Mainly engaged in network and system security, privacy computing, data security and other aspects of research, won the 2018 Network Security Outstanding Talent Award, 2001 State Council Government Special Allowance, in recent years won 1 second prize of National Technological Invention Award, 5 provincial and ministerial level scientific and technological progress (or technical invention) first prize.
Co-Chairs
Wang wei
Deputy Director of CCF Blockchain Committee
Professor at Beijing Jiaotong University
Distinguished member and speaker of CCF, Director of the Department of Information Security of Beijing Jiaotong University, Deputy Director of Beijing Key Laboratory of Intelligent Traffic Data Security and Privacy Protection Technology. Research on network and system security, blockchain and privacy protection theories and technologies. He has presided over more than 30 projects such as the National Natural Science Foundation of China, the key projects of the National Natural Science Foundation of China and the national key research and development plan. Presided over or participated in the compilation of 18 industry, national or international standards. He has published more than 100 papers in ACM CCS, TDSC, TIFS and other conferences and journals, and has been continuously selected as one of Elsevier's "Highly Cited Scholars in China" in the field of cyberspace security. The research achievements have won 3 provincial and ministerial science and technology progress awards. He serves on the editorial board of journals such as Computers & Security.
Forum speaker
Li Fenghua
Second-level researcher and deputy chief engineer of the Institute of Information Engineering, Chinese Academy of Sciences
The development trend of privacy computing and the security system of data circulation
The continuous evolution and wide application of communication technology, network technology and computing technology are promoting the development of the digital economy in the digital era, data is the core driving factor, and a new production and cognitive revolution is unfolding around the development and utilization of data. Ubiquitous data sharing faces many new challenges in privacy protection and circulation sharing control. This report introduces the evolution process of information technology, the standards of data production factors, and the security of data transaction services, focuses on analyzing the new challenges and countermeasures in data right confirmation, data transactions, privacy protection, use control, compliance supervision and other aspects from the perspective of data circulation, and elaborates the academic connotation and technological development trend of privacy computing and data security.
Li Hui
Professor/PhD supervisor of Xidian University
Huashan Leading Professor of Xidian University and Executive Dean of the School of Network and Information Security. Project leader of the National Key R&D Program, National Natural Science Foundation of China, etc. He serves as the director of the China Cryptologic Society, the director of the China Chinese Information Society, the deputy director of the Big Data Security and Privacy Computing Committee of the China Chinese Information Society, the deputy director of the Artificial Intelligence and Security Committee of the Chinese Intelligence Society, and the vice chairman of the Tianyi Network Information Security Industry Alliance. He has won 2 second prizes of national teaching achievement awards and 3 first prizes of provincial and ministerial science and technology progress awards; The published paper Google has been cited more than 12,000 times, H index 54.
Privacy measurement, masking control, and data flow
Data is the core driving factor of the development of the digital economy, a large number of personal sensitive information contained in data is facing an increasingly serious risk of leakage, the privacy protection of data ubiquitous sharing has become the key to release the value of data, and privacy computing is the theory and technology of privacy information life cycle protection. Aiming at the application scenarios of cross-domain data circulation, this report discusses the measurement methods of privacy information in data based on the framework of privacy computing theory, and discusses its desensitization effect and security evaluation based on mainstream desensitization mechanisms such as differential privacy, so as to provide support for the desensitization control and data pricing of data circulation.
Jiang Wei
Director and researcher of the Institute of Network Security, China Academy of Cyberspace
Chief expert of major projects of the National Social Science Foundation, young talents of the "four batches" propaganda ideology of the Central Propaganda Department, and member of the National Information Security Standardization Technical Committee. His research interests include network security, network governance, data security, privacy computing and personal information protection. Take the lead in organizing the preparation of relevant national "14th Five-Year Plan" plans, and preside over the preparation of network information plans and network security special plans for 9 provinces and municipalities. He has presided over more than 20 national, provincial and ministerial projects, including the Central Propaganda Department, the Cyberspace Administration of the Central Committee, the Ministry of Education, major projects of the National Social Science Foundation, and sub-projects of the National Key R&D Program. He has published more than 50 academic papers, applied for more than 10 patents and soft books, and organized and participated in more than 10 national standards.
Build a solid personal information protection barrier and escort the construction of a network power and digital China
Data has become an important factor of production and a basic strategic resource of the country, and the protection of personal information is an important field of national security. Strengthening the protection of personal information is an urgent need to promote the healthy and orderly development of the digital economy, and it is also an inevitable requirement for promoting the modernization of the national security system and capabilities. This report introduces the current situation and policies of personal information protection, analyzes the problems and challenges faced by personal information protection, and gives countermeasures and suggestions.
Liu Zheli
Professor at Nankai University
Deputy Dean of School of Computer Science, Deputy Dean of School of Cyberspace Security, Director of Key Laboratory of Data and Intelligent System Security of Ministry of Education, Professor, Doctoral Supervisor. He has published more than 40 papers and conferences in top journals and conferences such as USENIX Security, EUROCRYPT, VLDB, ASE, ISSTA, IEEE INFOCOM, IEEE TDSC, IEEE TKDE, IEEE TIFS, IEEE TC, etc., and 9 papers have been highly cited by ESI. His research interests include ciphertext database, ciphertext set operation, differential privacy, and artificial intelligence security. He has presided over more than 10 longitudinal projects such as the National Natural Science Foundation of China, the National Key R&D Program, the National Defense Science and Technology Innovation Project, and the Industrial Internet Innovation Project of the Ministry of Industry and Information Technology.
Typical data element security issues and policies
Aiming at the data circulation and sharing scenarios, this paper summarizes the typical problems of data element security. Aiming at the security requirements of data release and circulation, some solutions for data desensitization and data traceability of privacy computing are introduced. Aiming at the security requirements of data sharing and use in special application scenarios, this paper introduces the security threats faced by cryptographic applications and the strategies for protecting access behavior patterns.
Liu Zhe
Professor at Zhejiang University
Vice President of the Institute of Basic Theory of Zhijiang Laboratory
National young talent, special expert of Zhejiang Province, adjunct professor/doctoral supervisor of Zhejiang University. His research direction is cyberspace security, and he has published more than 160 academic papers, of which 10 papers have won the Best Paper Award of international conferences including CCF-A class conferences ACM SIGSOFT FSE'2022, WASA'2022, etc. He has won many academic awards at home and abroad, such as the Outstanding Teacher Award of Computer Science in Colleges and Universities of the Ministry of Education/Fok Yingdong Young Teacher Fund, and the Alibaba Damo Academy Green Orange Award. He has presided over more than 20 national projects/projects, including the key projects of the National Natural Science Foundation of China and the key research and development projects of the Ministry of Science and Technology.
Some explorations of data flow transfer technology under privacy protection are discussed
As a new production factor, data is the foundation of digitalization, networking and intelligence, and an important strategic resource for national scientific and technological innovation and economic and social development. The "Opinions on Building a Data Infrastructure System to Better Play the Role of Data Elements" issued by the State Council proposes to explore a structural separation system for data property rights, aiming to achieve prudent treatment of original data flow, encourage the development and utilization of data, and lay an institutional foundation for releasing the value of data elements. Based on the use process of storage-release-circulation-use-destruction, this report discusses the possible reconstruction attacks and defense methods in the process, and realizes the safe use of data based on differential privacy, random matrix theory, data secure storage, data sealing and destruction, etc., so as to provide strong support for the joint utilization of data in the process of openness and win-win.
Other guests
Zheng Xiaolin
Professor/PhD supervisor, School of Computer Science, Zhejiang University
Zhu Hui
Professor/PhD supervisor of Xidian University
Yao
Founder and Chairman of Shenzhen Insight Intelligent Technology Co., Ltd
This year marks CNCC's 20th anniversary. Over the past two decades, CNCC has gradually developed to cover 129 technical forums in dozens of directions, with more than 700 domestic and foreign speakers actively participating and more than 13,000 people registering as an annual event in the field of computing. Twenty years of continuous surpassing, as an annual event with many participants, large scale and high level in the field of domestic computing, CCF will carefully plan to bring participants a cutting-edge collision and look forward to the future technology feast, so that every participant can enhance their professional value and gain momentum in the super large professional platform of CNCC! Wait for you to come, act now, welcome to participate and register!