论文标题

数字主权和身份的分析:从数字化到数字化

Analysis of Digital Sovereignty and Identity: From Digitization to Digitalization

论文作者

Tan, Kheng-Leong, Chi, Chi-Hung, Lam, Kwok-Yan

论文摘要

新兴技术的进步通过经济和社会的普遍数字化加速了数字化转型,推动了智能城市,工业4.0和金融科技等创新。与数字化不同,数字化是通过利用数字技术和数字化数据来改善过程的转变。网络空间已经从硬件互联网基础架构演变为虚拟环境的概念,从而改变了人们,企业和政府的互动和运作方式。通过这种转型,捕获了许多个人数据,这些数据没有任何所有权或控制权,威胁了他们的隐私。因此,数据所有者必须通过适当的数据治理,网络安全控制和隐私保护来控制其数据的所有权,监护和利用,并保护其数据的所有权和使用。这导致数据主权和数字主权的概念 - 两个在概念上相关的术语,但重点不同。本文首先根据指导原则,法律法规要求解释了这两个概念,并分析和讨论实施这些要求的技术挑战。接下来,为了了解数字主权对个人的新兴趋势转变,以完全控制自己的数字资产的安全性和隐私,本文进行了系统的研究和分析自我实现身份,并讨论了现有的解决方案,并指出有效的密钥管理系统,解决方案和良好的挑战和良好的挑战和良好标准的问题和良好的标准是对挑战和良好的范围的范围。

Advances in emerging technologies have accelerated digital transformation with the pervasive digitalization of the economy and society, driving innovations such as smart cities, industry 4.0 and FinTech. Unlike digitization, digitalization is a transformation to improve processes by leveraging digital technologies and digitized data. The cyberspace has evolved from a hardware internetworking infrastructure to the notion of a virtual environment, transforming how people, business and government interact and operate. Through this transformation, lots of personal data are captured which individuals have no ownership or control over, threatening their privacy. It is therefore necessary for the data owners to have control over the ownership, custody and utilization of their data and to protect one's digital assets and identity through proper data governance, cybersecurity control and privacy protection. This results in the notions of data sovereignty and digital sovereignty - two conceptually related terms, but different focuses. This paper first explains these two concepts in terms of their guiding principles, laws and regulations requirements, and analyse and discuss the technical challenges of implementing these requirements. Next, to understand the emerging trend shift in digital sovereignty towards individuals to take complete control of the security and privacy of their own digital assets, this paper conducts a systematic study and analysis of Self-Sovereign Identity, and discuss existing solutions and point out that an efficient key management system, scalability and interoperability of the solutions and well established standards are some of its challenges and open problems to wide deployments.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源