• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liu Yahui, Zhang Tieying, Jin Xiaolong, Cheng Xueqi. Personal Privacy Protection in the Era of Big Data[J]. Journal of Computer Research and Development, 2015, 52(1): 229-247. DOI: 10.7544/issn1000-1239.2015.20131340
Citation: Liu Yahui, Zhang Tieying, Jin Xiaolong, Cheng Xueqi. Personal Privacy Protection in the Era of Big Data[J]. Journal of Computer Research and Development, 2015, 52(1): 229-247. DOI: 10.7544/issn1000-1239.2015.20131340

Personal Privacy Protection in the Era of Big Data

More Information
  • Published Date: December 31, 2014
  • With the development of information technology, emerging services based on Web2.0 technologies such as blog, microblog, social networks, and the Internet of things produce various types of data at an unprecedented rate, while cloud computing provides a basic storage infrastructure for big data. All of these lead to the arrival of the big data era. Big data contains great value. Data become the most valuable wealth of the enterprise, but big data also brings grand challenges. Personal privacy protection is one of the major challenges of big data. People on the Internet leave many data footprint with cumulativity and relevance. Personal privacy information can be found by gathering data footprint in together. Malicious people use this information for fraud. It brings many trouble or economic loss to personal life. Therefore, the issue of personal privacy has caused extensive concern of the industry and academia. However, there is little work on the protection of personal privacy at present. Firstly, the basic concepts of big data privacy protection are introduced, and the challenges and research on personal privacy concern are discussed. Secondly, the related technology of privacy protection is described from the data layer, application layer and data display layer. Thirdly, several important aspects of the personal privacy laws and industry standards are probed in the era of big data. Finally, the further research direction of personal privacy protection is put forward.
  • Related Articles

    [1]Zhao Jingxin, Yue Xinghui, Feng Chongpeng, Zhang Jing, Li Yin, Wang Na, Ren Jiadong, Zhang Haoxing, Wu Gaofei, Zhu Xiaoyan, Zhang Yuqing. Survey of Data Privacy Security Based on General Data Protection Regulation[J]. Journal of Computer Research and Development, 2022, 59(10): 2130-2163. DOI: 10.7544/issn1000-1239.20220800
    [2]Huang Haiping, Zhang Dongjun, Wang Kai, Zhu Yikai, Wang Ruchuan. Weighted Large-Scale Social Network Data Privacy Protection Method[J]. Journal of Computer Research and Development, 2020, 57(2): 363-377. DOI: 10.7544/issn1000-1239.2020.20190018
    [3]Liu Qiang, Li Tong, Yu Yang, Cai Zhiping, Zhou Tongqing. Data Security and Privacy Preserving Techniques for Wearable Devices: A Survey[J]. Journal of Computer Research and Development, 2018, 55(1): 14-29. DOI: 10.7544/issn1000-1239.2018.20160765
    [4]Zhu Weijun, You Qingguang, Yang Weidong, Zhou Qinglei. Trajectory Privacy Preserving Based on Statistical Differential Privacy[J]. Journal of Computer Research and Development, 2017, 54(12): 2825-2832. DOI: 10.7544/issn1000-1239.2017.20160647
    [5]Zhang Honglei, Shi Yuliang, Zhang Shidong, Zhou Zhongmin, Cui Lizhen. A Privacy Protection Mechanism for Dynamic Data Based on Partition-Confusion[J]. Journal of Computer Research and Development, 2016, 53(11): 2454-2464. DOI: 10.7544/issn1000-1239.2016.20150553
    [6]Cao Zhenfu, Dong Xiaolei, Zhou Jun, Shen Jiachen, Ning Jianting, Gong Junqing. Research Advances on Big Data Security and Privacy Preserving[J]. Journal of Computer Research and Development, 2016, 53(10): 2137-2151. DOI: 10.7544/issn1000-1239.2016.20160684
    [7]Meng Xiaofeng, Du Zhijuan. Research on the Big Data Fusion: Issues and Challenges[J]. Journal of Computer Research and Development, 2016, 53(2): 231-246. DOI: 10.7544/issn1000-1239.2016.20150874
    [8]Meng Xiaofeng, Zhang Xiaojian. Big Data Privacy Management[J]. Journal of Computer Research and Development, 2015, 52(2): 265-281. DOI: 10.7544/issn1000-1239.2015.20140073
    [9]Meng Xiaofeng and Ci Xiang. Big Data Management: Concepts,Techniques and Challenges[J]. Journal of Computer Research and Development, 2013, 50(1): 146-169.
    [10]Zhang Fengzhe, Chen Jin, Chen Haibo, and Zang Binyu. Lifetime Privacy and Self-Destruction of Data in the Cloud[J]. Journal of Computer Research and Development, 2011, 48(7): 1155-1167.

Catalog

    Article views (5386) PDF downloads (3518) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return