Wei Tao, Vice President of Ant Group: Secret computing can promote the reliable circulation of large-scale data

Wei Tao, Vice President of Ant Group: Secret computing can promote the reliable circulation of large-scale data
07:46, May 24, 2024 Surging news

   ·Dense computing is a technology for processing and computing data when it is kept in a dense state to ensure the security, controllability and auditability of the whole data flow link. The cost of dense computing is less than 5% of the value of data circulation, which can promote the realization of large-scale data trusted circulation.

In the complex process of data processing in which the original data becomes a data product, there are a lot of data leakage and abuse risks. The "dark side of data" has become an industry risk cost that cannot be bypassed.

IBM's Report on the Cost of Data Leakage in 2023 shows that the average total cost of data leakage in 2023 is 4.45 million US dollars, a record high. Most organizations' own security teams are not easy to find loopholes. Only one third of companies find data leakage through their own security teams. Cross domain data leakage is a common phenomenon. How to provide full process guarantee for reliable data circulation? On May 23, Ant Group Wei Tao, Vice President and Chief Technology Security Officer, said on the eve of the opening of the 7th Digital China Construction Summit that the secret computing technology based on cryptography and trusted computing can provide full process guarantee for the trusted circulation of data.

Wei Tao, Vice President and Chief Technical Security Officer of Ant Group.

   Risk cost of "data dark side"

As the fifth largest factor of production, the difference between data elements and other factors of production lies in the two-sided nature of data value, that is, the greater the positive business value of data, the higher the negative risk. Wei Tao said that only the flow of data elements has element value, but data is very easy to copy, partition, tamper with, and spread. The original data has become a data product through data cleaning, data conversion, data fusion, quality improvement, feature processing, and product construction. During this period, there is a serious risk of data leakage and abuse. Cross domain data flow will be accompanied by terminal intrusion, data theft and other operation, maintenance and R&D risks. Data is easy to be illegally redistributed, resulting in rapid depreciation of the market value of data products and exponential increase in the risk cost of circulation.

The "dark side of data" is an industry risk cost that cannot be bypassed. After the data leaves the security domain of the owner, a new technical requirement standard and technical method system are required. Wei Tao said that secret computing technology based on cryptography and trusted computing can provide full process guarantee for trusted data circulation.

In the secret computing technology, the secret computing is the key. The secret state refers to the state in which the original plaintext cannot be restored without authorization after special technical processing when the data enters the circulation for sharing, calculation and destruction. Dense computing is a technology for processing and computing data when it is kept in a dense state, so as to ensure the safety, controllability and auditability of the whole data flow link.

"Today, many data sources lack the ability to process data themselves, but they dare not let the data be processed externally. When the crypto computing system can operate in full link, it can effectively connect the data source and the data processor, so that the data source can trust the data to external data processors for analysis, integration, and processing to generate more data value." Wei Tao said, The goal of Ant Group is to make dense computing an end-to-end solution of the whole chain, and to solve the pain point of "unwilling to circulate, afraid to circulate, unable to circulate" in the whole process of data storage, computing, research and development, processing, standardized governance, and application delivery. Through the construction of data infrastructure, realize low-cost full link secret computing, and make the cost of secret computing less than 5% of the value of data circulation, which can promote the realization of large-scale data trusted circulation.

   How to make data elements work like tap water

At the recent Digital China Construction Summit Outcome Exhibition, Ant Group disclosed for the first time the "argot cloud" secret computing cloud service, which supports the reliable flow of data across clouds and terminals. Related products and services will be released in succession this year. "Argot cloud" will provide big data secret computing service, big model secret computing service, secret data hosting, secret data research and development and other services. It will provide "on-demand access, out of the box" inclusive secret computing services, so that SMEs can also access secret computing services at low cost, opening up industrial collaboration space.

Ant Group disclosed the "argot cloud" secret computing cloud service for the first time.

"We hope to build a reliable data circulation system through secret computing technology, so that data elements can be used like tap water." Wang Lei, general manager of the privacy computing department of Ant Group, introduced that there are many technical routes of privacy computing, different scenarios need different technical routes, different frameworks, and switching costs are very high, but "argot" The technical route is included in a unified architecture, which is suitable for different scenarios, and realizes the standardized design of modular design and module interaction. Users can customize and replace one of the modules according to the scenario, which makes industrial applications flexible.

Taking new energy vehicles as an example, the electric charge of new energy vehicles is cheap and the premium is expensive. Wang Lei said that the key data of the new energy vehicle insurance pricing model is scattered, and the data cannot be out of the domain, so it is difficult to price new energy vehicle insurance. To solve this problem, PICC Property&Casualty Insurance, Ping An Property&Casualty Insurance the pacific ocean Several insurance companies, such as property insurance, cooperated with the Internet insurance agency platform "Ant Insurance" to research and develop, and launched the "joint pricing" technology for auto insurance. This technology is based on Ant Group's trusted privacy computing technology framework "argot", gathers multiple data, builds an actuarial platform for joint pricing of auto insurance, realizes more accurate auto insurance pricing from the two dimensions of car and people, improves the operating efficiency of insurance companies and the differentiation of auto insurance pricing, and the auto insurance quotation after "joint pricing" can save hundreds of yuan for car owners on average.

Massive information, accurate interpretation, all in Sina Finance APP

Editor in charge: Jiang Yuhan

VIP course recommendation

Loading

APP exclusive live broadcast

one / ten

Popular recommendation

Stow
 Sina Finance Official Account
Sina Finance Official Account

24-hour rolling broadcast of the latest financial information and videos, and more fans' welfare scanning QR code attention (sinafinance)

Live broadcast of stock market

  • Teletext studio
  • Video studio

7X24 hours

  • 05-31 Dameng Data six hundred and eighty-eight thousand six hundred and ninety-two --
  • 05-28 Lian Technology three hundred thousand seven hundred and eighty-four twenty-eight point three
  • 05-24 Confluent vacuum three hundred and one thousand three hundred and ninety-two twelve point two
  • 05-21 Wanda Bearing nine hundred and twenty thousand and two twenty point seven four
  • 04-29 Ruidi Zhiqu three hundred and one thousand five hundred and ninety-six twenty-five point nine two
  • Sina homepage Voice Announcements Related news Back to top