RETRACTED: Personal Information Security Environment Monitoring and Law Protection Using Big Data Analysis (Retracted Article)

被引:4
作者
Zhu, Wei [1 ]
机构
[1] East China Normal Univ, Dept Law, Shanghai 200241, Peoples R China
关键词
PRIVACY; ALGORITHM;
D O I
10.1155/2022/1558161
中图分类号
R1 [预防医学、卫生学];
学科分类号
1004 ; 120402 ;
摘要
This article explores the causes of the issues with personal data privacy and outlines the limitations of China's current legal framework. This article makes the argument that, in the information age, self-discipline and legal protection should be combined in order to safeguard personal information safety. It also makes specific recommendations for strengthening legal protection. This research also develops a data processing platform for data safety and privacy protection while studying the technology of data safety environment monitoring and privacy protection. This work develops optimization methodologies, such as dynamic privacy budget allocation, to increase the model's speed of convergence and the calibre of the generated data. It adjusts to various privacy and timeliness needs under the assumption that the objective of selective matching of private safety will be satisfied. According to the experimental findings, this algorithm's accuracy can reach 96.27%. This method enhances the model's speed of convergence and the calibre of the data created, and it addresses the flaw that the present data fusion publishing procedure cannot withstand the attack of background information. The study's findings can serve as a starting point for future work on data security and the protection of personal information.
引用
收藏
页数:12
相关论文
共 23 条
[1]   ODIN: Obfuscation-Based Privacy-Preserving Consensus Algorithm for Decentralized Information Fusion in Smart Device Networks [J].
Ambrosin, Moreno ;
Braca, Paolo ;
Conti, Mauro ;
Lazzeretti, Riccardo .
ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2017, 18 (01)
[2]  
Chen G., 2017, REV FACULTAD INGENIE, V32, P443
[3]   Novel Privacy-preserving algorithm based on frequent path for trajectory data publishing [J].
Dong, Yulan ;
Pi, Dechang .
KNOWLEDGE-BASED SYSTEMS, 2018, 148 :55-65
[4]  
Gao E., 2017, B TECNICOTECHNICAL B, V55, P14
[5]   A Novel Time-Obfuscated Algorithm for Trajectory Privacy Protection [J].
Hwang, Ren-Hung ;
Hsueh, Yu-Ling ;
Chung, Hao-Wei .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2014, 7 (02) :126-139
[6]  
Ito K, 2016, FUJITSU SCI TECH J, V52, P28
[7]   Impact of Imperfect Channel State Information on the Physical Layer Security in D2D Wireless Networks Using Untrusted Relays [J].
Izanlou, Marzieh ;
Mohammadi, Abbas ;
Dosaranian-Moghadam, Mohamad .
WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (01) :341-368
[8]   An Efficient Authentication Scheme to Protect User Privacy in Seamless Big Data Services [J].
Jeong, Yoon-Su ;
Shin, Seung-Soo .
WIRELESS PERSONAL COMMUNICATIONS, 2016, 86 (01) :7-19
[9]   The Personal Data Store Approach to Personal Data Security [J].
Kirkham, Tom ;
Winfield, Sandra ;
Ravet, Serge ;
Kellomaki, Sampo .
IEEE SECURITY & PRIVACY, 2013, 11 (05) :12-19
[10]   Efficient privacy-preserving content recommendation for online social communities [J].
Li, Dongsheng ;
Lv, Qin ;
Shang, Li ;
Gu, Ning .
NEUROCOMPUTING, 2017, 219 :440-454