• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhao Jingxin, Yue Xinghui, Feng Chongpeng, Zhang Jing, Li Yin, Wang Na, Ren Jiadong, Zhang Haoxing, Wu Gaofei, Zhu Xiaoyan, Zhang Yuqing. Survey of Data Privacy Security Based on General Data Protection Regulation[J]. Journal of Computer Research and Development, 2022, 59(10): 2130-2163. DOI: 10.7544/issn1000-1239.20220800
Citation: Zhao Jingxin, Yue Xinghui, Feng Chongpeng, Zhang Jing, Li Yin, Wang Na, Ren Jiadong, Zhang Haoxing, Wu Gaofei, Zhu Xiaoyan, Zhang Yuqing. Survey of Data Privacy Security Based on General Data Protection Regulation[J]. Journal of Computer Research and Development, 2022, 59(10): 2130-2163. DOI: 10.7544/issn1000-1239.20220800

Survey of Data Privacy Security Based on General Data Protection Regulation

Funds: This work was supported by the National Natural Science Foundation of China (U1836210, 61941105, 61772406), the Key Research and Development Science and Technology of Hainan Province (ZDYF202012, GHYF2022010), and the Project of Hebei Key Laboratory of Software Engineering (22567637H).
More Information
  • Published Date: September 30, 2022
  • With the gradual acceleration of the global digitalization process, data has now become an important factor of production in society. The flow of data has created infinite value for the society, but it also has huge hidden privacy risks. With the introduction of the EU General Data Protection Regulation (GDPR), personal data security has become a sensitive topic in the era of big data, and it has been paid more and more attention by researchers. Firstly, we review the development of data privacy security, introduce the EU General Data Protection Regulation (GDPR) and analyze its applications and influences. Secondly, we summarize the domestical and abroad related research literatures in recent years. We divide the GDPR compliance into three aspects: GDPR violation analysis, privacy policy analysis and GDPR model framework, and analyze the research status of these three aspects. We analyze the data technology based on GDPR, and discuss the application of GDPR in specific fields such as blockchain and Internet of Things respectively. Finally, according to the limitations of the existing research work, we summarize the main challenges and opportunities of data privacy security research based on GDPR, and put forward some inspirations for data privacy protection in China.
  • Related Articles

    [1]Zhang Qiang, Ye Ayong, Ye Guohua, Deng Huina, Chen Aimin. k-Anonymous Data Privacy Protection Mechanism Based on Optimal Clustering[J]. Journal of Computer Research and Development, 2022, 59(7): 1625-1635. DOI: 10.7544/issn1000-1239.20210117
    [2]Fu Yao, Li Qingdan, Zhang Zehui, Gao Tiegang. Data Integrity Verification Scheme for Privacy Protection and Fair Payment[J]. Journal of Computer Research and Development, 2022, 59(6): 1343-1355. DOI: 10.7544/issn1000-1239.20210023
    [3]Liu Feng, Yang Jie, Li Zhibin, Qi Jiayin. A Secure Multi-Party Computation Protocol for Universal Data Privacy Protection Based on Blockchain[J]. Journal of Computer Research and Development, 2021, 58(2): 281-290. DOI: 10.7544/issn1000-1239.2021.20200751
    [4]Huang Haiping, Zhang Dongjun, Wang Kai, Zhu Yikai, Wang Ruchuan. Weighted Large-Scale Social Network Data Privacy Protection Method[J]. Journal of Computer Research and Development, 2020, 57(2): 363-377. DOI: 10.7544/issn1000-1239.2020.20190018
    [5]Liu Qiang, Li Tong, Yu Yang, Cai Zhiping, Zhou Tongqing. Data Security and Privacy Preserving Techniques for Wearable Devices: A Survey[J]. Journal of Computer Research and Development, 2018, 55(1): 14-29. DOI: 10.7544/issn1000-1239.2018.20160765
    [6]Zhang Honglei, Shi Yuliang, Zhang Shidong, Zhou Zhongmin, Cui Lizhen. A Privacy Protection Mechanism for Dynamic Data Based on Partition-Confusion[J]. Journal of Computer Research and Development, 2016, 53(11): 2454-2464. DOI: 10.7544/issn1000-1239.2016.20150553
    [7]Liu Yahui, Zhang Tieying, Jin Xiaolong, Cheng Xueqi. Personal Privacy Protection in the Era of Big Data[J]. Journal of Computer Research and Development, 2015, 52(1): 229-247. DOI: 10.7544/issn1000-1239.2015.20131340
    [8]Zhang Fengzhe, Chen Jin, Chen Haibo, and Zang Binyu. Lifetime Privacy and Self-Destruction of Data in the Cloud[J]. Journal of Computer Research and Development, 2011, 48(7): 1155-1167.
    [9]Hou Qinghua, Wu Yongwei, Zheng Weimin, and Yang Guangwen. A Method on Protection of User Data Privacy in Cloud Storage Platform[J]. Journal of Computer Research and Development, 2011, 48(7): 1146-1154.
    [10]Liu Yubao, Huang Zhilan, Ada Wai Chee Fu, Yin Jian. A Data Privacy Preservation Method Based on Lossy Decomposition[J]. Journal of Computer Research and Development, 2009, 46(7): 1217-1225.
  • Cited by

    Periodical cited type(24)

    1. 许炜,李卓卓,方向阳. 多向度的数据分类分级:目标、逻辑与路径. 图书情报工作. 2025(01): 68-79 .
    2. 刘怀骏,徐劲松. 基于区块链和代理重加密的快递出海数据共享方案. 物流科技. 2025(03): 82-86 .
    3. 白久君,陈雪波,李大明,刘锐. 构建数字化未来:算网融合的战略应用与研究. 广播电视网络. 2025(02): 28-31 .
    4. 任静,李筱永,梁恒瑜,赵依凡,吴佼玥. 脑科学视角下经颅磁刺激治疗精神障碍的法律问题及对策研究. 中国全科医学. 2024(08): 1015-1020 .
    5. 薛俊伟,吴凯,周静. 耳机式物联网血氧监护系统的设计. 中国医学物理学杂志. 2024(01): 60-65 .
    6. 杨斌,王正阳,程梓航,赵慧英,王鑫,管宇,程新洲. 基于扩散模型生成数据重构的客户流失预测. 计算机研究与发展. 2024(02): 324-337 . 本站查看
    7. 李敏,肖迪,陈律君. 兼顾通信效率与效用的自适应高斯差分隐私个性化联邦学习. 计算机学报. 2024(04): 924-946 .
    8. 刘立. 大数据技术在中职计算机教学应用初探. 科技风. 2024(12): 64-66+167 .
    9. 孔庆苹. 大数据环境下物联网设备数据隐私保护研究. 无线互联科技. 2024(07): 116-118 .
    10. 徐帅. 数据隐私保护与法律责任:新形势下的挑战与应对. 法制博览. 2024(14): 95-97 .
    11. 张海霞. 安全路由协议综合交互信任评价及性能分析. 山西电子技术. 2024(03): 69-70+90 .
    12. 张世涛,祁舒慧. 社交媒体数据分析在市场审计中的运用. 赤峰学院学报(自然科学版). 2024(07): 30-32 .
    13. 张国业,郎雅婧. 科技支撑区域工业治理能力提升路向选择及发展布局. 现代工业经济和信息化. 2024(10): 246-248 .
    14. 李卓卓,刘子轶. 从分野到融合:多学科视角下的数据跨境研究综述. 情报杂志. 2024(12): 198-207 .
    15. 蒋雷,朱婷婷,汤海林. 大数据背景下塑料加工行业的数据安全与隐私保护. 塑料助剂. 2024(06): 78-82 .
    16. 苗权,张弛,房硕,刘季平. 我国数据跨境流动管理的创新实践和思考. 互联网天地. 2023(03): 49-52 .
    17. 冯凡. 大数据分析技术下的隐私保护. 数字通信世界. 2023(03): 142-145 .
    18. 赵静. 基于区块链技术及数据挖掘技术推进数字经济发展. 科技资讯. 2023(15): 36-39 .
    19. 王鹏涛,徐润婕. AIGC介入知识生产下学术出版信任机制的重构研究. 图书情报知识. 2023(05): 87-96 .
    20. 赵尔波,苏玉成,黄少远. 医院部署GCP远程监查的多级安全防护设计与实践. 中国卫生信息管理杂志. 2023(05): 709-714 .
    21. 张铠,汪希,黄晋. 基于混沌技术的多域物联网敏感数据安全传输方法. 信息与电脑(理论版). 2023(16): 232-234 .
    22. 王大阜,王静,石宇凯,邓志文,贾志勇. 基于深度迁移学习的图像隐私目标检测研究. 图学学报. 2023(06): 1112-1120 .
    23. 郭赟赟,于浩. 突破语言障碍:ChatGPT在多语言教育中的作用与影响. 郑州师范教育. 2023(06): 48-53 .
    24. 姚莉娟,廖冬琴. 基于隐私保护的高校大数据挖掘平台设计. 无线互联科技. 2023(23): 50-54 .

    Other cited types(28)

Catalog

    Article views (444) PDF downloads (319) Cited by(52)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return