Journal Home Online First Current Issue Archive For Authors Journal Information 中文版

Strategic Study of CAE >> 2024, Volume 26, Issue 3 doi: 10.15302/J-SSCAE-2024.03.016

Digital Social Identity Management: Current Status, Problems, and Countermeasures

First Research Institute of the Ministry of Public Security of PRC, Beijing 100048, China

Funding project:Chinese Academy of Engineering project “Strategic Research Project on Scientific and Technological Innovation to Support the Modernization of National Security System and Capabilities” (2022-XBZD-28) Received: 2024-04-28 Revised: 2024-05-24 Available online: 2024-06-13

Next Previous

Abstract

Currently, China is undergoing a comprehensive transition toward a digital society, which has placed renewed emphasis on the need for robust national-level digital management capabilities. Identity management serves as a foundational support for the construction of Digital China and social security in the new era, with direct implications for national, social, and individual security. This study explores the major challenges faced by the digital identity system in supporting digital society governance, analyzes the current status and key problems of digital identity management, proposes the development goal and major tasks of building a secure and reliable digital social identity management system, and clarifies the trend of key technologies in establishing a digital identity system with Chinese characteristics. Furthermore, we propose the following suggestions: (1) strengthening toplevel design to formulate the development strategy and implementation roadmap of digital identity, (2) improving related laws and regulations, (3) establishing a digital identity management system with a hybrid architecture featuring centralized management and distributed authentication, (4) strengthening digital identity supervision capabilities, (5) enhancing the standard management of participants, (6) fostering ecological cooperation, and (7) actively engaging in global governance, thus to promote the development of the digital identity system and facilitate the long-term and stable development of digital society administration.

Figures

图1

图2

图3

图4

References

[ 1 ] 田轩. 完善数据基础设施 构筑金融科技数据治理体系 [J]. 中国银行业, 2023 (4): 49.
Tian X. Perfecting data infrastructure and constructing financial science and technology data governance system [J]. China Banking, 2023 (4): 49.

[ 2 ] 于锐. 各国数字身份建设情况及我国可信数字身份发展路径 [J]. 信息安全研究, 2022, 8(9): 858‒862.
Yu R. The status of digital identity construction in various countries and the development path of trusted digital identity in China [J]. Information Security Research, 2022, 8(9): 858‒862.

[ 3 ] 刘新海, 安光勇. 个人金融数据商业新模式——以韩国MyData为例 [J]. 清华金融评论, 2023 (4): 95‒98.
Liu X H, An G Y. A new business model for personal financial data—Taking MyData from Republic of Korea as an example [J]. Tsinghua Financial Review, 2023 (4): 95‒98.

[ 4 ] 刘新海, 安光勇. 数字经济下个人信息保护的挑战和应对——基于本人数据管理的新思路 [J]. 清华金融评论, 2021 (3): 95‒96.
Liu X H, An G Y. Challenges and responses to personal information protection in the digital economy: A new approach based on personal data management [J]. Tsinghua Financial Review, 2021 (3): 95‒96.

[ 5 ] McKeen F, Alexandrovich L, Berenzon A, et al. Innovative instructions and software model for isolated execution [R]. New York: the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, 2013.

[ 6 ] McMahan B H, Moore E, Ramage D, et al. Communication-efficient learning of deep networks from decentralized data [R]. Lauderdale: The 20th International Conference on Artificial Intelligence and Statistics (AISTATS), 2017.

[ 7 ] Bonawitz K, Ivanov V, Kreuter B, et al. Practical secure aggregation for privacy-preserving machine learning [R]. Texas: The 2017 ACM SIGSAS Conference on Computer and Communications Security, 2017.

[ 8 ] 韦韬, 潘无穷, 李婷婷, 等. 可信隐私计算: 破解数据密态时代“技术困局” [J].信息通信技术与政策, 2022 (5): 15‒24.
Wei T, Pan W Q, Li T T, et al. Trusted privacy computing: Breaking the “technical dilemma” in the era of data privacy [J]. ICT and policy, 2022 (5): 15‒24.

[ 9 ] Gao W, Hei X H, Wang Y C. The data privacy protection method for hyperledger fabric based on trustzone [J]. Mathematics, 2023, 11(6): 1357.

[10] Zhao W X, Zhou K, Li J, et al. A survey of large language models [EB/OL].(2023-03-31)[2024-03-18]. https://arxiv.org/abs/2303.18223.

[11] Ouyang L, Wu J, Jiang X, et al. Training language models to follow instructions with human feedback [J]. Advances in Neural Information Processing Systems, 2022, 35: 27730‒27744.

[12] 杨林, 国伟, 章锋, 等. 我国网络可信身份发展路径探索与展望 [J]. 信息安全研究, 2022, 8(12): 1236‒1240.
Yang L, Guo W, Zhang F, et al. Exploration and prospect of the development path of trusted identity in China´s network [J]. Information Security Research, 2022, 8(12): 1236‒1240.

[13] 杨滢, 陈绍泉. 元宇宙时代下的数字身份初探 [J]. 警察技术, 2023 (4): 36‒38.
Yang Y, Chen S Q. A preliminary exploration of digital identity in the Metaverse era [J]. Police Technology, 2023 (4): 36‒38.

[14] 郝久月, 杨林, 李頔, 等. 关于区块链支撑网络可信身份发展的研究与探索 [J]. 警察技术, 2023 (1): 32‒36.
Hao J Y, Yang L, Li D, et al. Research and exploration on the development of trusted identity in blockchain supported networks [J]. Police Technology, 2023 (4): 32‒36.

[15] 李俊, 柴海新. 数字身份安全治理研究[J].信息安全研究, 2021, 7(7): 598‒605.
Li J, Chai H X. Research on secure governance of digitai ldentity [J]. Information Security Research, 2021, 7(7): 598‒605.

Related Research