Review of privacy computing techniques for multi-party data fusion analysis
In the data era, threats to personal privacy information in ubiquitous sharing environments are widespread, such as apps frequently collecting personal information beyond scope, and big data-enabled price discrimination against frequent customers. The need for multi-party privacy computing for cros...
Saved in:
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2024-12-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024078 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1823864885921972224 |
---|---|
author | LIU Shenglong HUANG Xiuli JIANG Yiwen JIANG Jiawei TIAN Yuechi ZHOU Zejun NIU Ben |
author_facet | LIU Shenglong HUANG Xiuli JIANG Yiwen JIANG Jiawei TIAN Yuechi ZHOU Zejun NIU Ben |
author_sort | LIU Shenglong |
collection | DOAJ |
description | In the data era, threats to personal privacy information in ubiquitous sharing environments are widespread, such as apps frequently collecting personal information beyond scope, and big data-enabled price discrimination against frequent customers. The need for multi-party privacy computing for cross-system exchanges is urgent. This work focused on the needs of multi-party privacy computing for cross-system exchanges in ubiquitous sharing environments, taking the security sharing and controlled dissemination of private data in multi-party data fusion applications as the starting point, and provided reviews of existing relevant work from the perspectives of multi-party privacy computing, multi-party privacy information sharing control, and multi-party data collaborative secure computing. First, the background and research status of personal privacy information protection in a ubiquitous sharing environment were analyzed. Then, the latest domestic and foreign research results in recent years regarding multi-party privacy computing, multi-party privacy information sharing control, and multi-party data collaborative security computing were reviewed and comparatively analyzed. Regarding multi-party privacy computing, technologies such as full lifecycle privacy protection, privacy information flow control, and secure exchange of sensitive data were introduced. In terms of multi-party privacy information sharing control, localized control, extended control, and anonymization control techniques were discussed. In the aspect of multi-party data collaborative secure computing, commonly used techniques in both academia and industry were discussed. Finally, the challenges and development directions of multi-party privacy computing were prospected. There were still limitations for anonymity, scrambling, or access control-based traditional privacy desensitization measures, cryptography-based measures, and federated learning-based measures, while privacy computing theory provided a computational and information system framework for full-lifecycle protection, which needed to be combined with different application scenarios to implement full-lifecycle privacy information protection. |
format | Article |
id | doaj-art-87eb187dad5f4c359465efba639f4c5a |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2024-12-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-87eb187dad5f4c359465efba639f4c5a2025-02-08T19:00:07ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2024-12-0110243680361642Review of privacy computing techniques for multi-party data fusion analysisLIU ShenglongHUANG XiuliJIANG YiwenJIANG JiaweiTIAN YuechiZHOU ZejunNIU BenIn the data era, threats to personal privacy information in ubiquitous sharing environments are widespread, such as apps frequently collecting personal information beyond scope, and big data-enabled price discrimination against frequent customers. The need for multi-party privacy computing for cross-system exchanges is urgent. This work focused on the needs of multi-party privacy computing for cross-system exchanges in ubiquitous sharing environments, taking the security sharing and controlled dissemination of private data in multi-party data fusion applications as the starting point, and provided reviews of existing relevant work from the perspectives of multi-party privacy computing, multi-party privacy information sharing control, and multi-party data collaborative secure computing. First, the background and research status of personal privacy information protection in a ubiquitous sharing environment were analyzed. Then, the latest domestic and foreign research results in recent years regarding multi-party privacy computing, multi-party privacy information sharing control, and multi-party data collaborative security computing were reviewed and comparatively analyzed. Regarding multi-party privacy computing, technologies such as full lifecycle privacy protection, privacy information flow control, and secure exchange of sensitive data were introduced. In terms of multi-party privacy information sharing control, localized control, extended control, and anonymization control techniques were discussed. In the aspect of multi-party data collaborative secure computing, commonly used techniques in both academia and industry were discussed. Finally, the challenges and development directions of multi-party privacy computing were prospected. There were still limitations for anonymity, scrambling, or access control-based traditional privacy desensitization measures, cryptography-based measures, and federated learning-based measures, while privacy computing theory provided a computational and information system framework for full-lifecycle protection, which needed to be combined with different application scenarios to implement full-lifecycle privacy information protection.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024078privacy computingprivacy information sharing controldata collaborative secure computing |
spellingShingle | LIU Shenglong HUANG Xiuli JIANG Yiwen JIANG Jiawei TIAN Yuechi ZHOU Zejun NIU Ben Review of privacy computing techniques for multi-party data fusion analysis 网络与信息安全学报 privacy computing privacy information sharing control data collaborative secure computing |
title | Review of privacy computing techniques for multi-party data fusion analysis |
title_full | Review of privacy computing techniques for multi-party data fusion analysis |
title_fullStr | Review of privacy computing techniques for multi-party data fusion analysis |
title_full_unstemmed | Review of privacy computing techniques for multi-party data fusion analysis |
title_short | Review of privacy computing techniques for multi-party data fusion analysis |
title_sort | review of privacy computing techniques for multi party data fusion analysis |
topic | privacy computing privacy information sharing control data collaborative secure computing |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024078 |
work_keys_str_mv | AT liushenglong reviewofprivacycomputingtechniquesformultipartydatafusionanalysis AT huangxiuli reviewofprivacycomputingtechniquesformultipartydatafusionanalysis AT jiangyiwen reviewofprivacycomputingtechniquesformultipartydatafusionanalysis AT jiangjiawei reviewofprivacycomputingtechniquesformultipartydatafusionanalysis AT tianyuechi reviewofprivacycomputingtechniquesformultipartydatafusionanalysis AT zhouzejun reviewofprivacycomputingtechniquesformultipartydatafusionanalysis AT niuben reviewofprivacycomputingtechniquesformultipartydatafusionanalysis |