Big data has four characteristics: huge volume, complex types, fast processing speed and low value density. Therefore, it is difficult for individuals to process extremely huge data, and only organizations or groups such as countries and large enterprises can obtain all kinds of sensitive information; I may not fully understand the personal information collected by big data, such as personal behavior characteristics, language style, hobbies and so on. How to protect personal sensitive information or privacy in the era of big data will surely become a worldwide problem.
20 13 In June, Snowden, a former CIA employee, exposed the secret project codenamed "Prism" launched by the National Security Agency and the Federal Bureau of Investigation in 2007 during the Bush administration. By visiting the central servers of nine American Internet companies, such as Yahoo, Google, Microsoft and Apple, the National Security Agency monitors 10 data such as emails, pictures, videos and telephone calls, so as to collect intelligence and monitor people's network activities. The "Prism" project originated from the US government's "Starwind" surveillance plan in 2004. However, at that time, the Bush administration made concessions due to sensitive issues such as legal procedures, and the monitoring projects in the United States were reduced. In order to continue the "Star Wind" plan, the Bush administration split the "Star Wind" monitoring plan into four monitoring projects implemented by the National Security Agency through judicial procedures, including "Prism", "Road", "Dock" and "Nuclear", all of which were handed over to the US National Security Agency. The Prism project is used to monitor personal information on the Internet. The "Main Road" and "Wharf" projects are responsible for storing and analyzing hundreds of trillions of "metadata" in communications and the Internet. Metadata mainly refers to time, place, equipment used, participants, etc. The content of a call or communication, excluding telephone calls or emails. The "nuclear" project is responsible for obtaining content information, intercepting telephone callers' conversation content and keywords, and realizing daily monitoring by intercepting callers' phone calls and mentioned places. It can be seen that Snowden not only exposed the large-scale eavesdropping plan of the United States, but also exposed the national information security protection in the era of big data. The analysis and use of big data is obviously beneficial to individuals (such as tracking health status to prevent diseases), enterprises (such as understanding market preferences to effectively arrange product design, production and marketing) and even countries (such as preventing epidemics or terrorism). Internet companies such as Google, Microsoft and Yahoo can use their millions, tens of millions or even billions of data through "supercomputing" for commercial purposes. In this way, business has many uses and potential benefits in politics, economy and military affairs. Like Google, Yahoo, Apple, Microsoft and other big websites that participate in the "Prism" project, people input a lot of personal information into them every day for various business needs, but they are often not informed of the purpose of these data in advance. And these data will be used by enterprises or the government to carry out some special calculations or analysis, such as punishing people's behavior through the analysis and prediction of big data. For example, Schoenberg, the "father of big data", once disclosed an example: in the United States, there is a plan called "Predicting the Distribution of Police Force". Through the analysis of big data, it is predicted that a certain time of a street in a certain city in the United States is the peak of crime, and then more police forces are deployed in that position. From now on, the residents in this area will be monitored for a long time, which is a violation or punishment in disguise. They were punished not because they did something wrong, but because a computer algorithm predicted that they might do something wrong, which is obviously unfair. The National Security Bureau of the United States also has a similar new intelligence gathering system based on "big data". This system, called "Unbounded News", receives 97 billion messages from the global network system in a cycle of 30 days, and then can restore the real-time situation of individuals by comparing credit cards or communication records. Of course, a business organization like Google may also have the same level of information for business forecasting and analysis. Therefore, a set of rules must be established to regulate and restrict the collection and use of big data. First, although the information is stored on different servers, the data is the user's asset, and the ownership belongs to the user himself rather than these companies. This must be clear. Just like property ownership, personal privacy data should also have ownership. Second, companies or enterprises that use big data and cloud computing technologies to provide information services to users need to securely store and transmit the collected user data, which is the responsibility and obligation of enterprises. Third, if enterprises or governments want to use users' information, they must give users the right to know and choose. It is not only considered immoral but also illegal to disclose users' data or even make profits. The way of data storage and application in the era of big data is cross-regional or even cross-border. As a national strategy, the Obama administration raised the "Big Data Strategy" to the highest national policy in March 20 12. Like land rights, sea rights and air rights, it regards the possession and control of data as an important national core competence. China should also attach great importance to big data from the national perspective, and pay attention to three aspects in security protection and policy formulation: First, face up to data hegemony and clearly realize that China is still subject to the West in network control, key technologies and high-end equipment. The second is to clarify sovereignty. As an important strategic resource, data, whether owned by individuals or countries, should be included in the scope of sovereignty. The third is the right to govern, because sovereignty may not be able to govern. For example, data is stored abroad, and cloud computing crosses national boundaries, which may not be within your sovereignty. To treat different data differently, we must have practical and reliable means to effectively manage the data that really needs protection. If we can't manage data effectively, big data will be out of control. The policy stipulates the issue of safety responsibility. The security issues of big data involve the government, related enterprises, network operators, service providers, data producers, users and other aspects, and their respective security responsibilities must be clarified through policies. Information security risks exist in the whole life cycle of data, and the corresponding security responsibilities should be shared from all aspects such as technical ideas, product development, user use and service management. Supervise to ensure the safety of infrastructure. The development of big data is inseparable from key infrastructures such as telecommunication networks and even industrial control systems, and its security and reliability also depend on these infrastructures. Due to the globalization of supply chain and the privatization of industry, the security between network and key infrastructure becomes more and more complicated. One country's big data may be stored in the networks of other countries, and one country's infrastructure may serve multiple countries at the same time. The high degree of global interdependence challenges the original concept of national sovereignty. Therefore, the safety supervision system of key infrastructure is very important, and China needs to establish substantive national safety review of supply chain and normalized safety supervision of basic network as soon as possible.
Conflict management in cyberspace. The resource value of big data is getting higher and higher, and the competition and conflict around big data are becoming more and more fierce. The generation, processing and utilization of big data will greatly change the manifestation and destructive intensity of various conflicts. Through legislation and international cooperation, we should deal with the protection of intellectual property rights, the disposal of cyber crimes, the attack of cyber sabotage activities, especially cyber terrorism, and the threat of cyber war.