• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhao Jingxin, Yue Xinghui, Feng Chongpeng, Zhang Jing, Li Yin, Wang Na, Ren Jiadong, Zhang Haoxing, Wu Gaofei, Zhu Xiaoyan, Zhang Yuqing. Survey of Data Privacy Security Based on General Data Protection Regulation[J]. Journal of Computer Research and Development, 2022, 59(10): 2130-2163. DOI: 10.7544/issn1000-1239.20220800
Citation: Zhao Jingxin, Yue Xinghui, Feng Chongpeng, Zhang Jing, Li Yin, Wang Na, Ren Jiadong, Zhang Haoxing, Wu Gaofei, Zhu Xiaoyan, Zhang Yuqing. Survey of Data Privacy Security Based on General Data Protection Regulation[J]. Journal of Computer Research and Development, 2022, 59(10): 2130-2163. DOI: 10.7544/issn1000-1239.20220800

Survey of Data Privacy Security Based on General Data Protection Regulation

Funds: This work was supported by the National Natural Science Foundation of China (U1836210, 61941105, 61772406), the Key Research and Development Science and Technology of Hainan Province (ZDYF202012, GHYF2022010), and the Project of Hebei Key Laboratory of Software Engineering (22567637H).
More Information
  • Published Date: September 30, 2022
  • With the gradual acceleration of the global digitalization process, data has now become an important factor of production in society. The flow of data has created infinite value for the society, but it also has huge hidden privacy risks. With the introduction of the EU General Data Protection Regulation (GDPR), personal data security has become a sensitive topic in the era of big data, and it has been paid more and more attention by researchers. Firstly, we review the development of data privacy security, introduce the EU General Data Protection Regulation (GDPR) and analyze its applications and influences. Secondly, we summarize the domestical and abroad related research literatures in recent years. We divide the GDPR compliance into three aspects: GDPR violation analysis, privacy policy analysis and GDPR model framework, and analyze the research status of these three aspects. We analyze the data technology based on GDPR, and discuss the application of GDPR in specific fields such as blockchain and Internet of Things respectively. Finally, according to the limitations of the existing research work, we summarize the main challenges and opportunities of data privacy security research based on GDPR, and put forward some inspirations for data privacy protection in China.
  • Related Articles

    [1]Zhang Xueqing, Liu Yanwei, Liu Jinxia, Han Yanni. An Overview of Federated Learning in Edge Intelligence[J]. Journal of Computer Research and Development, 2023, 60(6): 1276-1295. DOI: 10.7544/issn1000-1239.202111100
    [2]Zhang Xuejun, He Fucun, Gai Jiyang, Bao Junda, Huang Haiyan, Du Xiaogang. A Differentially Private Federated Learning Model for Fingerprinting Indoor Localization in Edge Computing[J]. Journal of Computer Research and Development, 2022, 59(12): 2667-2688. DOI: 10.7544/issn1000-1239.20210270
    [3]Li Xiaowei, Chen Benhui, Yang Dengqi, Wu Gaofei. Review of Security Protocols in Edge Computing Environments[J]. Journal of Computer Research and Development, 2022, 59(4): 765-780. DOI: 10.7544/issn1000-1239.20210644
    [4]Lu Xiaofeng, Liao Yuying, Pietro Lio, Pan Hui. An Asynchronous Federated Learning Mechanism for Edge Network Computing[J]. Journal of Computer Research and Development, 2020, 57(12): 2571-2582. DOI: 10.7544/issn1000-1239.2020.20190754
    [5]Zhou Jun, Shen Huajie, Lin Zhongyun, Cao Zhenfu, Dong Xiaolei. Research Advances on Privacy Preserving in Edge Computing[J]. Journal of Computer Research and Development, 2020, 57(10): 2027-2051. DOI: 10.7544/issn1000-1239.2020.20200614
    [6]Huang Qianyi, Li Zhiyang, Xie Wentao, Zhang Qian. Edge Computing in Smart Homes[J]. Journal of Computer Research and Development, 2020, 57(9): 1800-1809. DOI: 10.7544/issn1000-1239.2020.20200253
    [7]Yue Guangxue, Dai Yasheng, Yang Xiaohui, Liu Jianhua, You Zhenxu, Zhu Youkang. Model of Trusted Cooperative Service for Edge Computing[J]. Journal of Computer Research and Development, 2020, 57(5): 1080-1102. DOI: 10.7544/issn1000-1239.2020.20190077
    [8]Ning Zhenyu, Zhang Fengwei, Shi Weisong. A Study of Using TEE on Edge Computing[J]. Journal of Computer Research and Development, 2019, 56(7): 1441-1453. DOI: 10.7544/issn1000-1239.2019.20180522
    [9]Shi Weisong, Zhang Xingzhou, Wang Yifan, Zhang Qingyang. Edge Computing: State-of-the-Art and Future Directions[J]. Journal of Computer Research and Development, 2019, 56(1): 69-89. DOI: 10.7544/issn1000-1239.2019.20180760
    [10]Zhao Ziming, Liu Fang, Cai Zhiping, Xiao Nong. Edge Computing: Platforms, Applications and Challenges[J]. Journal of Computer Research and Development, 2018, 55(2): 327-337. DOI: 10.7544/issn1000-1239.2018.20170228
  • Cited by

    Periodical cited type(1)

    1. 程高飞,姜建华. 随机空间几何构型下物联网络攻击节点定位. 信息技术. 2024(06): 147-153 .

    Other cited types(0)

Catalog

    Article views (483) PDF downloads (331) Cited by(1)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return