Journal of Guangxi Teachers Education University (Philosophy and Social Sciences Edition) ›› 2022, Vol. 58 ›› Issue (5): 86-99.doi: 10.16088/j.issn.1001-6597.2022.05.008

Previous Articles     Next Articles

Block-chain Empowerment: The Way of Data Security Governance in the Operation of “Internet+Government Service”

HAN Yi, LIU Can   

  1. School of Public Policy and Administration, Nanchang University, Nanchang 330031, China
  • Received:2022-02-03 Online:2022-09-15 Published:2022-11-10

Abstract: “Internet+government service” bears the characteristics of convenience and high efficiency, and it faces potential security risks such as data leakage and tampering, virus intrusion and hacker attack, headaches which can well be coped with by the block-chain for its unique advantages like decentralization, distributed storage, information tamper proof and information transparency. Therefore, based on the block chain empowerment, a data security governance barrier integrating public chain empowerment, alliance chain empowerment, side chain empowerment and technology group empowerment is a feasible path to ensure data security and promote the orderly development of “Internet+government service”.

Key words: “Internet+government service”, data security, block-chain empowerment

CLC Number: 

  • D63
[1] 国家互联网应急中心.2019年我国互联网网络安全态势综述[EB/OL]. (2020-04-20)[2022-01-20].https://www.cert.org.cn/publish/main/upload/File/2019-year.pdf.
[2] 国家互联网应急中心.2021年上半年我国互联网网络安全检测数据分析报告[EB/OL].(2021-07-31)[2022-01-20].https://www.cert.org.cn/publish/main/upload/File/first-half%20%20year%20cyberseurity%20analysis%20%20report%202021.pdf.
[3] Nakamoto S. Bitcoin: a peer-to-peer electronic cash system[EB/OL].(2008-10-05)[2022-01-20].https://bitcoin.org/bitcoin.pdf.
[4] Trope R L, Power E M. Lessons in data governance: a survey of legal developments in data management, privacy and security[J]. The Business Lawyer, 2005, 61(1):516.
[5] [美]约塞夫·莱特.人与信息安全[M].北京:社会科学文献出版社,2006.
[6] [美]格洛弗·斯塔林.公共部门管理[M].北京:中国人民大学出版社,2014.
[7] 安璐,沈燕,徐曼婷.2021“数据分析与应急情报”系列学术活动纪要[J].信息资源管理学报,2021(5):135.
[8] 陈朝兵,郝文强.我国政府数据开放的力场模型与路径选择研究[J].图书情报知识,2020(6):133.
[9] 相丽玲,陈梦婕.试析中外信息安全保障体系的演化路径[J].中国图书馆学报,2018(2):125.
[10] 盛小平,袁圆.科学数据开放共享中的数据权利治理研究[J].中国图书馆学报,2021(5):90.
[11] 刘耀宗,刘云恒.基于区块链的RFID大数据安全溯源模型[J].计算机科学,2018(S2):367.
[12] 王化群,张帆,李甜,等.智能合约中的安全与隐私保护技术[J].南京邮电大学学报(自然科学版),2019(4):69.
[13] 王继业,高灵超,董爱强,等.基于区块链的数据安全共享网络体系研究[J].计算机研究与发展,2017(4):742.
[14] Al-Bassam M.SCPKI: a smart contract-based PKI and identity system[C]//Proceedings of the ACM workshop on blockchain, cryptocurrencies and contracts. New York:ACM, 2017:35.
[15] Andrychowicz M, Dziembowski S, Malinowski D, et al. Fair two-party computations via bitcoin deposits[C]//Proceeding of international conference on financial cryptography and data security. Springer, Berlin, Heidelberg, 2014:105.
[16] Neisse R, Steri G, Nai-Fovino I.A blockchain-based approach for data accountability and pro-venance tracking[C]//Proceedings of the 12th international conference on availability,realiability and security(ARES'17).New York:ACM,2017:1-10.
[17] Chowdhury M J M, Colman A, Kabir M A, et al.Blockchain as a notarization service for data sharing with personal data store[C]//Proceeding of 2018 17th IEEE international conference on trust, security and privacy in computing and communications/12th IEEE international conference on big data science and engineering (TrustCom/BigDataSE).New York:IEEE,2018:1330-1335.
[18] 中国互联网协会.《中国网民权益保护调查报告2016》:54%的网民认为个人信息泄漏严重[EB/OL].(2016-06-26)[2022-01-20].https://www.isc.org.cn/article/33759.html.
[19] IBM Security,Ponemon Institute.2020 cost of data breach report [EB/OL].(2020-07-30)[2022-01-20].http://www.ibm.com/downloads/cas/O7YVRYA2?mhsrc=ibmsearch_a&mhq=2020%20Cost%20of%20Data%20Breach%20Report.
[20] CNCERT/CC.A review of China’s internet security situation in 2019[EB/OL].(2020-07-30)[2022-01-20].https://www.cert.org.cn/publish/main/upload/File/2019-year.pdf.
[21] 王煜.南京一公务员倒卖个人信息获刑4年[N].新京报,2018-03-22(A18).
[22] 刘宏顺.去年我省250余亿条公民个人信息被泄露[N].四川日报,2018-01-17(12).
[23] 网宿科技,数世咨询.2020年中国互联网安全报告[EB/OL].(2021-06-17)[2022-01-20].http://www.199it.com/archives/1266435.html.
[24] 国家互联网应急中心.2020年我国互联网网络安全态势综述[EB/OL].(2021-05-26)[2022-01-20].https://www.cert.org.cn/publish/main/upload/File/2020%20CNCERT%20Cybersecurity%20Analysis.pdf.
[25] 杨杨,于水,胡卫卫.区块链赋能重塑社会治理结构:场景、风险与治理之道[J].电子政务,2020(3):55.
[26] [美]斯坦利·麦克里斯特尔.赋能:打造应对不确定性的敏捷团队[M].北京:中信出版社,2017.
[27] 孔海东,张培,刘兵.价值共创行为分析框架构建——基于赋能理论视角[J].技术经济,2019(6):101.
[28] 沈翔宇,陈思捷,严正,等.区块链在能源领域的价值、应用场景与适用性分析[J].电力系统自动化,2021(5):21.
[29] 陆明远,张帆.基于私有区块链的分布式信息安全系统设计[J].电子设计工程,2021(7):55.
[30] 杨鑫,涂思欢.我国地方政府数据治理体系的创新路径探究——基于疫情背景下区块链赋能逻辑的思考[J].新媒体与社会,2020(2):235.
[31] Blockstream.Enabling blockchain innovations with pegged sidechains[EB/OL].(2014-10-22)[2022-01-20].https://www.blockstream.com/sidechains.pdf.
[32] 颜嘉麒,宋金倍,达婧玮,等.基于区块链的传染病预警系统:融合复杂网络的风险度量[J].信息资源管理学报,2021(4):97.
[33] 黄武双,邱思宇.论区块链技术在知识产权保护中的作用[J].南昌大学学报(人文社会科学版),2020(2):69.
[34] 钱再见.“政务上链”:应用场景、风险挑战与治理对策[J].人民论坛,2021(1):49.
[35] 黄俊飞,刘杰.区块链技术研究综述[J].北京邮电大学学报,2018(2):3.
[36] 周倩伊,王亚民,王闯.基于互联网大数据的脱敏分析技术研究[J].数据分析与知识发现,2018(2):58.
[37] 朱岩,甘国华,邓迪,等.区块链关键技术中的安全性研究[J].信息安全研究,2016(12):1090.
[38] 袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016(4):490.
[1] Liu Jian-hua, Liu Xin-yi. The Risk of Big Data Technology and Its Precautionary Mechanism [J]. Journal of Guangxi Teachers Education University (Philosophy and Social Sciences Edition), 2020, 56(1): 113-120.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LAN Jiang. Critique of Alienated Labor under Contemporary Western Digital Capitalism—Contemporary Digital Labor Embodied in Economic and Philosophic Manuscripts of 1844[J]. Journal of Guangxi Teachers Education University (Philosophy and Social Sciences Edition), 2022, 58(5): 1 -10 .
[2] PANG Jin-you. The Achilles’ Heel of Digital Order: The Myth and Dilemma of Contemporary Data Governance[J]. Journal of Guangxi Teachers Education University (Philosophy and Social Sciences Edition), 2022, 58(5): 11 -20 .
[3] MA De-yong, HUANG Min-xuan. The Political Cognitive Basis of the Modernization of National Governance—An Empirical Analysis Based on Chinese Netizens and College Students[J]. Journal of Guangxi Teachers Education University (Philosophy and Social Sciences Edition), 2022, 58(5): 21 -36 .
[4] YU Wen-xuan, WEI Wei. Agile Governance of Data: Value Remodeling and Framework Construction[J]. Journal of Guangxi Teachers Education University (Philosophy and Social Sciences Edition), 2022, 58(5): 37 -49 .
[5] XIE Xin-shui. Content Producers in the Meta-universe: Production Situation and Action Swamp[J]. Journal of Guangxi Teachers Education University (Philosophy and Social Sciences Edition), 2022, 58(5): 50 -61 .
[6] ZHANG Ai-jun, HE Jing-jing. The Empowerment of Digital Political Subjects by the Meta-universe: Performance, Risk and Regulation[J]. Journal of Guangxi Teachers Education University (Philosophy and Social Sciences Edition), 2022, 58(5): 62 -71 .
[7] SUO LI-ming, WANG Xue. Complex Logic, Coupling Change and Governance Transformation of Urban Intelligent Upgrading   —Take the Practice of “urban brain” as An Example[J]. Journal of Guangxi Teachers Education University (Philosophy and Social Sciences Edition), 2022, 58(5): 72 -85 .
[8] TAN Hai-bo, GUO Yi-tong. Balance and Adaptability: A Quantitative Research on Digital Economic Policies of Local Governments—An Analytical Perspective Based on “Policy Tool-Policy Preference”[J]. Journal of Guangxi Teachers Education University (Philosophy and Social Sciences Edition), 2022, 58(5): 100 -116 .
[9] WANG Jian-xin, ZHANG Yu-ke. Cooperation Mechanism and Path of Regional Market Integration of DataElements: from the Perspective of Industrial Chain Cluster[J]. Journal of Guangxi Teachers Education University (Philosophy and Social Sciences Edition), 2022, 58(5): 117 -126 .
[10] WANG Xiao-hua, CHENG Lin. Digital Inclusive Finance and the Urban-Rural Income Gap: Opportunity or Divide[J]. Journal of Guangxi Teachers Education University (Philosophy and Social Sciences Edition), 2022, 58(5): 127 -146 .