Application Status and Prospect of Data Privacy Protection Technology
DOI: https://doi.org/10.62517/jbdc.202401217
Author(s)
Cui Yiming
Affiliation(s)
School of Artificial Intelligence and Big Data, Henan University of Technology, Zhengzhou, Henan, China
Abstract
This article aims to explore the current application status and future prospects of data privacy protection technology, analyze the challenges faced by current data privacy, explore possible solutions, and provide reference and inspiration for the development of data privacy protection technology. This article adopts literature review and experience summary methods. Through sorting and summarizing relevant literature, combined with the author's own experience in the field of data privacy protection, a comprehensive and in-depth analysis is conducted on the current application status of data privacy protection technology. Through literature review and experience summary, we found that current data privacy protection technologies have made significant progress with the rapid development of information technology. Among them, the research and application of data encryption technology based on encryption algorithms, privacy protection protocols, and privacy protection tools have gradually matured data privacy protection technology. At the same time, the frequent occurrence of data privacy breaches also highlights the importance and urgency of data privacy protection technology. Data privacy protection technology is particularly important in the current context of information technology in society. In the future, with the continuous development of technologies such as big data and artificial intelligence, data privacy protection technology will face greater challenges and opportunities.
Keywords
Data Privacy Protection Technology; Application Status; Prospect
References
[1] Lin Long. Research on technology of multi-factor authentication and data privacy protection based on trusted digital identity and electronic certificate [ J ] . China hi-tech, 2023, (21) : 47-49.
[2] Hicks. Analysis of Internet data privacy technologies and their development trends [ J ] . Toy World, 2023, (03) : 230-232.
[3] Ma Xinkun, Li Yingna, Li Shenzhang. Power grid data privacy protection and sharing method based on blockchain technology [ J ] . Power Science and engineering, 2023,39(05) : 1-9.
[4] Niu Xin Yi, Yu Yue, Liu Ting Yue. Privacy protection method for sharing confidential data based on encryption technology [ J ] . Enterprise technology and development, 2023, (01) : 61-63.
[5] Pan Han. Blockchain-based personal data privacy protection platform [ J ] . Electronic components and information technology, 2022,6(11) : 223-226.
[6] Ma Ying, Wen Bo. Data privacy protection in wireless sensor networks [ J ] . Network security technologies and applications, 2021, (12) : 75-76.
[7] Pan Han. Blockchain-based personal data privacy protection platform [ J ] . Electronic components and information technology, 2022,6(11) : 223-226.
[8] Ma Ying, Wen Bo. Data privacy protection in wireless sensor networks [ J ] . Network security technologies and applications, 2021, (12) : 75-76.
[9] Liang Xiubo, Wu Junhan, Zhao Yu, Yin keting. Review of research on blockchain data security management and privacy protection technologies [ J ] . Journal of Zhejiang University (engineering edition) , 2022,56(01) : 1-15.
[10] Zhong bei Xin, Lin Hao, Kong Su Peng, Cheng Shi. A multi-source network data privacy protection method based on blockchain technology [ J ] . Information Security Research, 2021,7(01) : 86-89.
[11]Ganesh Dagadu Puri, D. Haritha. Implementation of Big Data Privacy Preservation Technique for Electronic Health Records in Multivendor Environment[J]. International Journal of Advanced Computer Science and Applications (IJACSA), 2023, 14 (2):
[12]Cheng Shanying. Research on data privacy protection technology of social network users based on differential disturbance[J]. Ain Shams Engineering Journal, 2022, 13 (5):
[13]Sridhar Reddy Vulapula, Srinivas Malladi. Privacy Preservation of Healthcare Data in Hybrid Cloud using a Hybrid Meta-Heuristics Based Sanitization Technique[J]. International Journal of Recent Technology and Engineering (IJRTE), 2019, 8 (4): 2882-2890.