Privacy Protection Measures in Large-Scale Data Environments

Authors

  • Dishu Yang

DOI:

https://doi.org/10.54691/sbxctt08

Keywords:

Large-scale data; Privacy protection; Data encryption; Differential privacy.

Abstract

With the rapid development of large-scale data environment, privacy protection is particularly urgent and critical. This paper analyzes the application scenarios and technical realization of privacy protection in large-scale data environment, including data encryption technology, differential privacy application and data anonymization processing. Through designing a multi-level privacy protection system and combining with specific application examples, this paper puts forward strengthening data encryption measures, perfecting multi-level protection strategies and deepening application of differential privacy technology. At the same time, how to build a legal framework that conforms to the standard and improve the privacy security in the process of cross-border data transmission is discussed in depth. It aims to provide practical guidance and suggestions for improving the efficiency of data privacy protection.

Downloads

Download data is not yet available.

References

[1] Smith A D , Lillo C D , Baxter R ,et al.Searching for individual determinants of probabilistic cueing in large-scale immersive virtual environments:[J].Quarterly Journal of Experimental Psychology, 2022, 75(2):328-347.

[2] Wang Y , Poor H V .Decentralized Stochastic Optimization With Inherent Privacy Protection[J].IEEE Transactions on Automatic Control, 2023, 68(4):2293-2308.

[3] Tachioka Y .Data Anonymization Balancing Privacy Preservation and Availability by Using Multi-objective Optimization[J].Transaction of the Japanese Society for Evolutionary Computation, 2022, 13(1):77-84.

[4] Yelmen B ,Decelle, Aurélien, Boulos L L ,et al.Deep convolutional and conditional neural networks for large-scale genomic data generation[J].PLoS Computational Biology, 2023, 19(10).

[5] Neves, Flávio, Souza R , Sousa M G V .Data privacy in the Internet of Things based on anonymization: A review[J].Journal of computer security, 2023, 31(3):261-291.

Downloads

Published

19-03-2025

Issue

Section

Articles