安全可信的数据要素流通综述
CSTR:
作者:
作者单位:

作者简介:

通讯作者:

中图分类号:

TP311

基金项目:

国家自然科学基金区域创新发展联合基金(U23A20303); 国家自然科学基金面上项目(62372149, 62572168); 国家留学基金委访问学者项目(202406690030); 安徽省自然科学基金面上项目(2508085MF151); 中文大数据知识工程教育部重点实验室开放课题(BigKEOpen2025-04); 网络与交换技术全国重点实验室(北京邮电大学)开放课题(SKLNST-2025-1-12)


Survey on Secure and Trustworthy Data Factor Circulation
Author:
Affiliation:

Fund Project:

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    随着数字经济的快速发展, 数据作为重要的生产要素, 在推动新质生产力和经济社会高效运转中发挥了核心作用. 数据要素的高效利用及其在不同主体间的有序、安全、合规流通对于数据要素价值释放具有重要意义. 然而, 数据流通过程中面临显著的安全隐患与可信挑战, 如泄露、篡改以及不可用等问题, 同时数据真实性和流通透明性要求也愈发重要. 为应对这些问题, 密码学、区块链、可信执行环境等技术被广泛应用, 但仍存在成本高、灵活性不足等限制, 且当前研究多集中于特定阶段, 缺乏系统性视角. 为此, 以数据要素全生命周期为主线, 构建了包含数据采集、传输、存储、处理、发布、溯源这6大阶段的分析框架, 系统性分析其安全与可信挑战. 提炼出安全技术“三线分化、协同融合”和可信技术“验证深度递进”两大演进模型. 旨在为该领域的关键问题提供体系化的解决思路, 并对未来研究方向提出展望.

    Abstract:

    With the rapid development of the digital economy, data, as an important productive factor, plays a central role in fostering new forms of productive forces and ensuring the efficient functioning of the economy and society. The efficient utilization of data as a production factor, along with its orderly, secure, and compliant circulation among various entities, is essential to realizing its full value. However, data circulation is confronted with significant security risks and trust-related challenges, including leakage, tampering, and unavailability. At the same time, the requirements for data authenticity and circulation transparency are becoming increasingly important. To address these issues, technologies such as cryptography, blockchain, and trusted execution environments are widely applied. However, these technologies still face limitations such as high costs and insufficient flexibility, and current research often focuses on specific stages, lacking a holistic perspective. Therefore, this study is structured around the full life cycle of data factors, develops an analytical framework comprising six stages: data collection, data transmission, data storage, data processing, data publication, and data traceability, and systematically analyzes the security and trust-related challenges at each stage. For the first time, this study explicitly proposes two evolutionary models: the “three-line differentiation and collaborative integration” model for security technologies and the “verification-depth progression” model for trustworthy technologies. This study aims to offer systematic solutions to key issues in this field and outline directions for future research.

    参考文献
    相似文献
    引证文献
引用本文

陈毅飞,李萌,乔焰,汪青,张子剑,祝烈煌.安全可信的数据要素流通综述.软件学报,,():1-40

复制
相关视频