Privacy Protection Measures in Large-Scale Data Environments
DOI:
https://doi.org/10.54691/sbxctt08Keywords:
Large-scale data; Privacy protection; Data encryption; Differential privacy.Abstract
With the rapid development of large-scale data environment, privacy protection is particularly urgent and critical. This paper analyzes the application scenarios and technical realization of privacy protection in large-scale data environment, including data encryption technology, differential privacy application and data anonymization processing. Through designing a multi-level privacy protection system and combining with specific application examples, this paper puts forward strengthening data encryption measures, perfecting multi-level protection strategies and deepening application of differential privacy technology. At the same time, how to build a legal framework that conforms to the standard and improve the privacy security in the process of cross-border data transmission is discussed in depth. It aims to provide practical guidance and suggestions for improving the efficiency of data privacy protection.
Downloads
References
[1] Smith A D , Lillo C D , Baxter R ,et al.Searching for individual determinants of probabilistic cueing in large-scale immersive virtual environments:[J].Quarterly Journal of Experimental Psychology, 2022, 75(2):328-347.
[2] Wang Y , Poor H V .Decentralized Stochastic Optimization With Inherent Privacy Protection[J].IEEE Transactions on Automatic Control, 2023, 68(4):2293-2308.
[3] Tachioka Y .Data Anonymization Balancing Privacy Preservation and Availability by Using Multi-objective Optimization[J].Transaction of the Japanese Society for Evolutionary Computation, 2022, 13(1):77-84.
[4] Yelmen B ,Decelle, Aurélien, Boulos L L ,et al.Deep convolutional and conditional neural networks for large-scale genomic data generation[J].PLoS Computational Biology, 2023, 19(10).
[5] Neves, Flávio, Souza R , Sousa M G V .Data privacy in the Internet of Things based on anonymization: A review[J].Journal of computer security, 2023, 31(3):261-291.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Frontiers in Science and Engineering

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.