Cloud computing giants are fighting around the cloud: Microsoft and Amazon have begun to deploy China’s cloud computing market, and domestic Internet giants Alibaba, Baidu and Tencent have also begun to bet on cloud computing. With the vigorous development of the cloud computing industry, information security issues have become more prominent and have become a major challenge facing all countries in the world. This article has details of The status quo of Cloud Security in China and the US and their existing Problems.
China and the U.S. Cloud Security Status
Whether cloud computing or big data, are Amazon, Google, Intel, Microsoft, Hewlett-Packard, IBM high-technology companies to promote the development of science and technology in innovation, which undoubtedly with American technology, management, law, security in the field of information and many other The solid foundation that has been established is closely related.
In terms of data security and personal privacy, the United States has established a systematic guarantee system covering legislation, management, and technology. In terms of technology and service standardization, the United States has also established a guarantee system for cloud security.
The sp800 and sp500 documents of the National Institute of Standards and Technology (NIST) in cloud computing basic concepts, technical roadmaps, and standard roadmaps have become the blueprint for research in this field around the world, and the cloud computing involved in the standard blueprint Use cases, interoperability standards, portability standards and cloud computing security standards have also led to innovation and applications in this field.
The number of netizens in my country ranks first in the world, and the amount of data generated every day is also among the highest in the world. However, there are still many problems in the development of cloud computing in my country.
Keep reading
- Microsoft Cloud Services Improve the Quality of Life in China
- China’s Cloud Computing Industry is still in Overheating Period
First of all, the application is not in-depth. At present, our country has not really entered the era of big data, and big data is still in the initial stage of application in China. The external environment is difficult to support the storage , development, utilization, and sharing of a large amount of data.
Enterprise investment and government support show experimental enthusiasm on more levels. Most companies fight alone in the use of data, and the phenomenon of information islands is relatively serious. The industry chain of collecting, sorting, analyzing, and applying the entire process has not yet formed.
Secondly, information security incidents occur frequently. China Internet Network Information Center (CNNIC) released the “Research Report on the Information Security Status of Chinese Netizens” that sometime ago, 456 million netizens encountered information security incidents, accounting for 84.8% of the total number of netizens, and the total economic loss was 19.4 billion yuan.
Thirdly, the prevention and control capabilities of security technology are insufficient. At present, domestic companies rely too much on foreign big data analysis technologies and platforms, not only can it be difficult to avoid the risk of information leakage, but they may also lose the ability to innovate in the industry.
In the era of big data, different countries have different technical capabilities to collect, process, and control data, resulting in asymmetric and unequal information flow. As far as economic and trade information and personal information are concerned, China is a typical information outflow country. Foreign Internet companies can collect, transmit and use Chinese data and information at almost zero cost.
Problems faced by China and the United States in the field of cloud security
From the perspective of data protection and privacy protection, China and the United States face two outstanding issues in the field of cloud security: mutual trust and the security of cross-border data flows. Read Details Here.
The conclusion of the “Cyber ​​Security and Sino-US Relations” report a year ago by the Brookings Institution and the China Institute of International Relations: China and the United States lack mutual trust in the field of cyber security. Such warnings should have allowed both parties to take concrete actions to improve the status quo. In other words, the two governments must find consensus in this regard and build mutual trust instead of blaming each other or taking actions to worsen the situation.
The challenge in the process of cross-border data flow is how to ensure data security, otherwise it will endanger national security, civil rights and commercial interests. In 2020/2021 seminar, the “Government Cyber ​​Security Recommendation Guidelines” jointly issued by the U.S. Information Technology Industry Council, Digital Europe, and the Japan Electronics and Information Technology Industry Association proposed transparency, standardization, risk control, voluntary participation, security, innovation, and technology.
Neutrality and other goals, these undoubtedly have considerable contribution and reference value to the establishment of international rules in the era of network globalization, but these cannot be the basis for comparing and criticizing the advantages and disadvantages of different regional policies.
We should be aware that there are differences in laws, policies, technical levels, and industry self-discipline in data security and personal privacy protection in different countries and regions. In the process of cross-border data protection, on the basis of responding to and solving the management policies of different countries, how we should respect and protect the legitimate rights and interests of relevant subjects, especially personal privacy, is an urgent issue that needs to be resolved.
China-US data security and privacy protection recommendations
The value and benefits behind big data are increasing. Data security, privacy protection, and transnational transmission and utilization of data have become problems that need to be solved urgently at this stage. On the issue of protecting data and personal privacy, China and the United States will face common network security risks, have common strategic interests, and have the same goals.
China needs to conduct in-depth exchanges with its American counterparts in terms of protecting data and personal privacy, whether it is the construction of a rule system or technological development capabilities to strengthen its own capacity building in data and privacy protection.
The protection of data and privacy requires complete rules and technical guarantee systems, including the improvement of relevant legislation and management systems, speeding up the development and application of information security technology, and improving the security standards for data and privacy protection.
In addition, the joint participation and protection of data subjects is also required, especially the improvement of citizens’ personal privacy protection awareness. The state should strengthen the publicity and education of data security and privacy protection , improve the quality of citizens and self-protection ability, not only to prevent personal privacy from being violated, but also to respect the rights of others and not to infringe on the privacy and data of others.
Second, establish an environment of mutual trust. Mutual trust is the basis of communication and cooperation between the two sides. The mutual trust between China and the United States in the field of cyber security will directly affect the strategic cooperation and core interests of the two countries.
Both parties should strengthen communication and understanding, enhance mutual trust, pay attention to and understand each other’s cutting-edge research results, network security technology trends, and legislative and management measures. This should be from basic theories such as information, information privacy, cyber attacks and other key terms.
Related Posts
- Domestic Cloud Computing Market Technology lacks Business Model Innovation
- Why Enterprises uses Cloud Computing more than other Resources
- Why Public Cloud must Ensure Reliability and Security
- Cloud Operators Inflates Cloud Computing Layout
They should start to clarify the basis of bilateral rules for data security and privacy protection. On the basis of establishing mutual trust, reach a certain consensus on data security and privacy protection issues to prevent mistrust, suspicion or accusations caused by cultural, ideological and other factors.
Third, build an effective communication and dialogue mechanism. The Internet has integrated global links into a whole, and cloud computing and big data have turned the borders of networks into suspended threads. Therefore, it is extremely urgent to establish an international and bilateral communication mechanism in the era of big data.
China and the United States should establish effective communication and dialogue mechanisms on data security and privacy protection issues, and communicate and cooperate on issues such as legislation, justice, law enforcement, regulatory enforcement, self-discipline, technical standards, and the cultivation of Internet users’ security awareness.
Effective network security protection mechanism. Establish communication and dialogue channels at both the government and private levels, conduct exchanges and consultations on data security and privacy protection and other related issues, and encourage and support the establishment of research forums.
Fourthly, the rights of data subjects are equally protected. The cross-border flow of data makes the protection of the data and privacy of companies or citizens of other countries an unavoidable issue. In particular, whether the data of users in different countries can be equally protected has become a problem that multinational companies and governments need to solve.
The principle of equal protection is a criterion to be followed by legislation, justice and law enforcement, and has been recognized and adopted by many countries. While protecting the legitimate rights and interests of citizens and enterprises of the country, the rights and interests of citizens and enterprises of other countries should also be equally protected.
Fifth, respect each other’s interests and jointly respond to network security. In the process of communication and cooperation on data security and privacy protection, China and the United States should respect each other’s core and major interests, whether it is at the official or private level, whether it is communication and cooperation on technical or regulatory issues. This is communication.
The foundation is also a prerequisite for continued and deepened cooperation. Both parties should establish an effective information sharing and cooperation mechanism, strengthen the supervision and management of violations of data security and personal privacy, and jointly combat violations of data security and personal privacy. Facing the complicated situation of data security and privacy protection, mutual trust, cooperation, and win-win should become the path of our big data era.