Data Sovereignty and National Security: Governance Challenges and Pathways in the Digital Age
Abstract
In the digital age, data has become an integral part of national security, and the issue of data sovereignty is increasingly becoming a global focus. The intensification of global data flow and the rapid development of information technology present numerous challenges for countries in protecting their data, ensuring national security, and safeguarding economic interests. The maintenance of data sovereignty has become a part of international geopolitical competition. In response to these challenges, countries must strengthen their data governance frameworks, establish stringent data protection regulations, and promote international cooperation and coordination to ensure the security and controllability of data flow. This article analyzes the relationship between data sovereignty and national security in the digital age, explores the main dilemmas in data governance, and proposes pathways such as strengthening laws, technology, and international collaboration to enhance national security competitiveness in the global digital economy.
Keywords:
data sovereignty, national security, governance, challenges, pathwaysCopyright Notice & License:
All articles published in Global Review of Humanities, Arts, and Society (GRHAS) are licensed under the Creative Commons Attribution 4.0 International License (CC BY 4.0).
This license allows anyone to share, copy, distribute, transmit, and adapt the work, including for commercial purposes, provided that proper attribution is given to the original author(s) and the source.

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
References
Ali, D. A. (2024). Artificial intelligence and data privacy: Balancing innovation with security. Frontiers in Artificial Intelligence Research, 1(2), Article 2.
Chai, Y., & Wang, T. (2024). Legal regulation and optimization path for the supervision of cross-border data flows in China. Journal of Jiangsu Police Institute, 39(04), 49–58.
Dong, K., Chen, X., & Wu, J. (2025). Research on policy attention in cross-border data flow governance from the perspectives of isomeric and isomorphism. Information Studies: Theory & Application, 1–10.
Friis, K., & Lysne, O. (2021). Huawei, 5G and security: Technological limitations and political responses. Development and Change, 52(5), 1174–1195.
Gu, H. (2024). Data, big tech, and the new concept of sovereignty. Journal of Chinese Political Science, 29(4), 591–612.
Jia, K., & Zhao, J. (2024). “Dual-goal” sovereignty theory innovation and cross-border data flow ginzo. Academia Bimestris, 04, 105–113+215.
Kaska, K., Beckvard, H., & Minárik, T. (2019). Huawei, 5G and China as a security threat. NATO Cooperative Cyber Defence Center of Excellence (CCDCOE), 28, 1–26.
Sun, C. (2023). Comparative study on supervision and security of cross-border data flow. Journal of China Academy of Electronics and Information Technology, 18(1), 91–96+102.
Wan, G., & Ma, X. (2025). Review and improvement path of legal regulations on cross-border data flows in China. Journal of Zhengzhou University of Light Industry (Social Science Edition), 26(01), 59–68.
Wang, X. (2024). Discussion on the cultivation of professional talent in computer network security technology in the context of big data technology applications. Computer Knowledge and Technology, 20(09), 148–150.
Wu, S. (2016). Studies on transnational data flow and data sovereignty. Journal of Xinjiang Normal University (Edition of Philosophy and Social Sciences), 37(05), 112–119.
Yao, T., & Wang, Y. (2025). Cross-border data flows from the perspective of data sovereignty and China’s response. International Business, 02, 141–156.
Yue, S., & Xu, C. (2024). Legal obstacles and innovative strategies for data cross-border flow of RCEP. Journal of Changchun University, 34(09), 80–85.
Yun, H. (2024). China’s data sovereignty and security: Implications for global digital borders and governance. Chinese Political Science Review, 1–26.
Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2017). An overview of blockchain technology: Architecture, consensus, and future trends. 2017 IEEE International Congress on Big Data (BigData Congress), 557–564. https://doi.org/10.1109/BigDataCongress.2017.85
Zhou, M. (2025). Research on the extraterritorial data jurisdiction model and its improvement of data security law. Journal of Huaqiao University (Philosophy & Social Sciences), 01, 116–127.

