Zhou: Three principles of user information security in large data age

Source: Internet
Author: User
Keywords Large data Zhou 祎

The intermediary transaction SEO diagnoses Taobao guest stationmaster buys the Cloud host technology Hall

  

A few years ago, Rey Kuzwer wrote a book called "Singularity near." He said, human civilization after so many years of development, in the middle of this century will pass a point, this point, is singular point. Singularity is a turning point, that is to say, human civilization may enter a bifurcation, may enter a new height of civilization, may also be a sharp fall, human extinction. So the singularity has a double meaning, it can get better, and it can get worse.

I think with the advent of the big data age, the Internet will also go to a singular point, and security will determine the Internet through this singularity, in the end is to go up to a new height, or down to a bad situation. In the big data age, there are two things you can't avoid. First of all, now the user generated data will exist in the cloud, there will be various vendors on the server. Second, the data acquisition ability is more powerful, the collection scope is broader. Now not only has the mobile internet, there will be the future of things networking, car networking, there will be more wearable smart devices, after the popularity of these hardware, you will find that users use these devices produced by the size of the data will be unprecedented. On the mobile internet, the manufacturer understands to the user deeply, is the PC Internet completely cannot compare.

For example, the original in the PC Internet, the so-called user information, the user to save the point of the photos, and most likely there is a local directory. But with smartphones, the phone becomes your wallet, and there's too much private stuff on your phone. Once you lose your cell phone, you have a lot of problems. A big guy told me about his smart fridge dream. The fridge is sold at cost, not a penny. I asked, "How do you end up earning money?" he replied, "I have a lot of cameras in the fridge and the fridge is connected to the Internet." After China 1.3 billion people buy how many eggs, buy how many vegetables, put in there has not expired, I know all. There are big business opportunities in these figures. I think that is also, now the smart hand ring can record your movement data at any time, you do something in the middle of the night to analyze the data to know. It is likely that the bulbs will be connected to WiFi and the sockets will be WiFi, and one of the news I've seen recently is that even chengguan are wearing smart glasses to enforce the law.

China already has 1 billion Internet users, but the devices that connect to the Internet in the future are not just 1 billion, because each person may have a wide range of smart devices networked, maybe 5 billion, maybe 10 billion, and the data produced by so many devices can make a person more and more transparent. When the big data age comes, these user information can not guarantee enough security, it will be a singularity, determine the fate of this turning point.

Recently, the Internet industry has been a lot of security incidents, such as the exposure of SSL heart bleeding loopholes, and electric companies store the user's credit card should not store information.

In the next two or three years, this situation will become particularly serious. You will find that security problems have not been said to kill viruses on your computer, mobile phones, clean plug-ins. The car is now developing intelligently, driverless cars have been developed, and software is the foundation of intelligent cars. Any software has vulnerabilities, the more software features, the more complex, the more complex the software, the greater the likelihood of vulnerabilities. If a hacker discovers a loophole and breaks the software, it is possible for the hacker to control the car from the cloud via remote data exchange. This is not a problem of reformatting a computer, but a question of life security.

If in the large data age, security can not be guaranteed, then or users no longer trust you, dare not choose you. Like today's heart bleeding leak, many people immediately put the phone and net silver untied, some electric dealers stored the user's credit card CVV code, some users chose to boycott the company. Another possibility is that consumers are ignorant, but do not know what data they give to the manufacturer, nor how to deal with the manufacturer. Once another major security incident, it will even lead to a certain degree of social chaos. Without strong enough security, cloud computing and big data will be costly to the future.

All of our Internet practitioners have to think about how to better protect the user's information when it comes to the business benefits of big data. When Asimov put forward the famous robot three principles in many science fiction small, is to guard against the robot to replace the human security question.

So now, I think also need in the big data coming, we throw aside the portal, work together to develop a user information security three principles, to self-restraint, self-monitoring.

First, the user's information is the user's personal assets. A lot of big internet companies may resist my view, because the Internet companies in the user agreement said: "Because the user number is my, so the user is mine, the user's friend list is also my, user generated content is mine." However, it has also issued a disclaimer stating that any legal issues that arise from users are irrelevant to them. Without saying this paradoxical logic, my view is that the information generated by the user using the vendor's service is the personal asset of the user. Users use a variety of devices, various software generated data, although stored in the manufacturer's server, but in terms of ownership, it should clearly belong to the user, is the user's property.

The second is the principle of equal exchange. In the large data age, through the cloud of data exchange, vendors to provide services to users. As long as users use the vendor's services, there will be relevant data generation. When you use micro-letters, in order to match friends, your address will naturally upload. In order to chat with friends, your chat record will naturally be saved on the manufacturer's server. However, the user's information and manufacturers should follow the principle of equal exchange. What is equal Exchange? The user enjoys the service, the manufacturer obtains the information, but in this process, the user must have the right to know, the manufacturer must obtain the user authorization to use the user information, namely, the user must have the choice right, has the refusal right.

For example, if it is an application like the public comment, because it is necessary to find a restaurant based on the user's location, it naturally requires the user's location information, which I think is reasonable. This is equal exchange. But if it is a novel reading software, but also to obtain the user's location information, I think this service is no longer an equal exchange, in fact, it is not what should be. The principle of equal exchange accords with the basic principle of consumer protection law, that is, consumers should have the right to know and choose.

The third is the principle of safe handling. Some people think that security is the Internet security company to do, that is, anti-virus software, I think this view is wrong. Any internet company, including a company that now makes wearable hardware, will become an Internet service company that users use to generate a lot of data. Therefore, any Internet company has the responsibility to protect the security of user information, to be in the cloud to the user data in sufficient intensity of encryption, including secure storage and secure transmission.

Only when users feel that their information is safe, users are reassured that they will be more daring to try out new Internet services. If you are saying that my payment is unsafe, as you can see on the internet every day, I say your red envelopes are in danger. What is the final result? Many people will say that it is not safe to pay on the Internet. If so, the internet wants to prosper, I think it is impossible.

Therefore, the three principles are not a problem for our company, nor a few security companies, but from the Giants to the start-up companies, we should jointly promote things. Those of us in the Internet industry have a responsibility to build a secure base for users. So it's time to abandon bias! Three principles to promote the user to build real confidence in the Internet.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.