Font Size: a A A

On China’s Sovereignty And Security Of Database In The Age Of Cloud

Posted on:2016-07-22Degree:MasterType:Thesis
Country:ChinaCandidate:Y L WangFull Text:PDF
GTID:2308330464958746Subject:International politics
Abstract/Summary:PDF Full Text Request
Data sovereignty is in the era of big data cloud environment, network power and sovereign level links, datasovereignty has shaped the new geopolitics in a certain extent, the competition between countries has newheights, "Snowden" event spawned a global focus on their network security and data sovereignty。Dimension Data, one of a country’s ability to cloud era as structural power plays in the international competition an increasingly prominent role, and data sovereignty are also new developments in the cloud era theory of national sovereignty, and interdependence same logic, network space data sovereignty there are sensitivity and vulnerability. Promote the construction of China’s data sovereignty is conducive to safeguarding national sovereignty and legitimacy of authority, autonomy is conducive to China’s construction of data security, to make up for the security shortcomings promote the construction of our country’s overall security。Cloud technology as an emerging technology, its own technological vulnerabilities exist, differences between countries with regard to the law increased the risk of data sovereignty, and the reality of the hegemonic powers offensive highlights in the data field, from this point, " Snowden " event is obviously reflected, Cyber warfare has become a new means of containment western China, and our own network for the sense of security is to be improved。China is a big country network data, but it is far from the network power, China in the development of big data technology faces many constraints, China as a future world order change of leader in the network data sovereignty should pursue an "incremental improvements " the road, because the data sovereignty and security maintenance is a matter of internal affairs and diplomatic systems engineering, China should also rely on scientific and technological innovation, strengthen domestic reforms, to consolidate its network data border, transnational nature within the framework of regional security cooperation " network security exercise " network disarmament advocate, promote global network management return to the authority of the UN, advocating multilateral, democratic and transparent global network management。...
Keywords/Search Tags:Cyberspace Sovereignty in the Cloud Age, Database Sovereignty, Cyberspace Governance, Constructing Database Sovereignty
PDF Full Text Request
Related items