Review of privacy computing techniques for multi-party data fusion analysis

In the data era, threats to personal privacy information in ubiquitous sharing environments are widespread, such as apps frequently collecting personal information beyond scope, and big data-enabled price discrimination against frequent customers. The need for multi-party privacy computing for cros...

Full description

Saved in:
Bibliographic Details
Main Authors: LIU Shenglong, HUANG Xiuli, JIANG Yiwen, JIANG Jiawei, TIAN Yuechi, ZHOU Zejun, NIU Ben
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2024-12-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024078
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1823864885921972224
author LIU Shenglong
HUANG Xiuli
JIANG Yiwen
JIANG Jiawei
TIAN Yuechi
ZHOU Zejun
NIU Ben
author_facet LIU Shenglong
HUANG Xiuli
JIANG Yiwen
JIANG Jiawei
TIAN Yuechi
ZHOU Zejun
NIU Ben
author_sort LIU Shenglong
collection DOAJ
description In the data era, threats to personal privacy information in ubiquitous sharing environments are widespread, such as apps frequently collecting personal information beyond scope, and big data-enabled price discrimination against frequent customers. The need for multi-party privacy computing for cross-system exchanges is urgent. This work focused on the needs of multi-party privacy computing for cross-system exchanges in ubiquitous sharing environments, taking the security sharing and controlled dissemination of private data in multi-party data fusion applications as the starting point, and provided reviews of existing relevant work from the perspectives of multi-party privacy computing, multi-party privacy information sharing control, and multi-party data collaborative secure computing. First, the background and research status of personal privacy information protection in a ubiquitous sharing environment were analyzed. Then, the latest domestic and foreign research results in recent years regarding multi-party privacy computing, multi-party privacy information sharing control, and multi-party data collaborative security computing were reviewed and comparatively analyzed. Regarding multi-party privacy computing, technologies such as full lifecycle privacy protection, privacy information flow control, and secure exchange of sensitive data were introduced. In terms of multi-party privacy information sharing control, localized control, extended control, and anonymization control techniques were discussed. In the aspect of multi-party data collaborative secure computing, commonly used techniques in both academia and industry were discussed. Finally, the challenges and development directions of multi-party privacy computing were prospected. There were still limitations for anonymity, scrambling, or access control-based traditional privacy desensitization measures, cryptography-based measures, and federated learning-based measures, while privacy computing theory provided a computational and information system framework for full-lifecycle protection, which needed to be combined with different application scenarios to implement full-lifecycle privacy information protection.
format Article
id doaj-art-87eb187dad5f4c359465efba639f4c5a
institution Kabale University
issn 2096-109X
language English
publishDate 2024-12-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-87eb187dad5f4c359465efba639f4c5a2025-02-08T19:00:07ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2024-12-0110243680361642Review of privacy computing techniques for multi-party data fusion analysisLIU ShenglongHUANG XiuliJIANG YiwenJIANG JiaweiTIAN YuechiZHOU ZejunNIU BenIn the data era, threats to personal privacy information in ubiquitous sharing environments are widespread, such as apps frequently collecting personal information beyond scope, and big data-enabled price discrimination against frequent customers. The need for multi-party privacy computing for cross-system exchanges is urgent. This work focused on the needs of multi-party privacy computing for cross-system exchanges in ubiquitous sharing environments, taking the security sharing and controlled dissemination of private data in multi-party data fusion applications as the starting point, and provided reviews of existing relevant work from the perspectives of multi-party privacy computing, multi-party privacy information sharing control, and multi-party data collaborative secure computing. First, the background and research status of personal privacy information protection in a ubiquitous sharing environment were analyzed. Then, the latest domestic and foreign research results in recent years regarding multi-party privacy computing, multi-party privacy information sharing control, and multi-party data collaborative security computing were reviewed and comparatively analyzed. Regarding multi-party privacy computing, technologies such as full lifecycle privacy protection, privacy information flow control, and secure exchange of sensitive data were introduced. In terms of multi-party privacy information sharing control, localized control, extended control, and anonymization control techniques were discussed. In the aspect of multi-party data collaborative secure computing, commonly used techniques in both academia and industry were discussed. Finally, the challenges and development directions of multi-party privacy computing were prospected. There were still limitations for anonymity, scrambling, or access control-based traditional privacy desensitization measures, cryptography-based measures, and federated learning-based measures, while privacy computing theory provided a computational and information system framework for full-lifecycle protection, which needed to be combined with different application scenarios to implement full-lifecycle privacy information protection.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024078privacy computingprivacy information sharing controldata collaborative secure computing
spellingShingle LIU Shenglong
HUANG Xiuli
JIANG Yiwen
JIANG Jiawei
TIAN Yuechi
ZHOU Zejun
NIU Ben
Review of privacy computing techniques for multi-party data fusion analysis
网络与信息安全学报
privacy computing
privacy information sharing control
data collaborative secure computing
title Review of privacy computing techniques for multi-party data fusion analysis
title_full Review of privacy computing techniques for multi-party data fusion analysis
title_fullStr Review of privacy computing techniques for multi-party data fusion analysis
title_full_unstemmed Review of privacy computing techniques for multi-party data fusion analysis
title_short Review of privacy computing techniques for multi-party data fusion analysis
title_sort review of privacy computing techniques for multi party data fusion analysis
topic privacy computing
privacy information sharing control
data collaborative secure computing
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024078
work_keys_str_mv AT liushenglong reviewofprivacycomputingtechniquesformultipartydatafusionanalysis
AT huangxiuli reviewofprivacycomputingtechniquesformultipartydatafusionanalysis
AT jiangyiwen reviewofprivacycomputingtechniquesformultipartydatafusionanalysis
AT jiangjiawei reviewofprivacycomputingtechniquesformultipartydatafusionanalysis
AT tianyuechi reviewofprivacycomputingtechniquesformultipartydatafusionanalysis
AT zhouzejun reviewofprivacycomputingtechniquesformultipartydatafusionanalysis
AT niuben reviewofprivacycomputingtechniquesformultipartydatafusionanalysis