Privacy computing:concept, connotation and its research trend

s: With the widespread application of mobile Internet, cloud computing and big data technologies, people enjoy the convenience of electronic business, information retrieval, social network and other services, whereas the threats of privacy leaks are ever growing due to the use of big data analytics....

Full description

Saved in:
Bibliographic Details
Main Authors: Feng-hua LI, Hui LI, Yan JIA, Neng-hai YU, Jian WENG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2016-04-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016078/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539601784635392
author Feng-hua LI
Hui LI
Yan JIA
Neng-hai YU
Jian WENG
author_facet Feng-hua LI
Hui LI
Yan JIA
Neng-hai YU
Jian WENG
author_sort Feng-hua LI
collection DOAJ
description s: With the widespread application of mobile Internet, cloud computing and big data technologies, people enjoy the convenience of electronic business, information retrieval, social network and other services, whereas the threats of privacy leaks are ever growing due to the use of big data analytics. The differences of privacy protection strategy and ability in different systems bring more difficulties in privacy extended management. In addition, the requirements of pro-tecting the same information at different time need the combination of various privacy protection schemes. However, nearly all the current privacy protection schemes are ing at a single case, which lacks systematic and quantized pri-vacy characterization. Furthermore, there is no systematic computing model describing the relationship between the pro-tection level, profit and loss of privacy leaks and the complexity of integrated privacy protection methods. Based on the analysis on the research status of privacy protection, the concept and connotation of privacy computing is proposed and defined. Then the privacy computing research category will be discussed from the whole life cycle of information privacy protection. Finally, some research directions of privacy computing are given, including privacy computing model, context adaptive cryptology for privacy protection, big data a lytics resisted privacy control and protection, privacy protection based on information hiding and system architecture for high concurrent privacy preserving services.
format Article
id doaj-art-acf2a76192964de8b46697cf57518513
institution Kabale University
issn 1000-436X
language zho
publishDate 2016-04-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-acf2a76192964de8b46697cf575185132025-01-14T06:55:11ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2016-04-013711159700256Privacy computing:concept, connotation and its research trendFeng-hua LIHui LIYan JIANeng-hai YUJian WENGs: With the widespread application of mobile Internet, cloud computing and big data technologies, people enjoy the convenience of electronic business, information retrieval, social network and other services, whereas the threats of privacy leaks are ever growing due to the use of big data analytics. The differences of privacy protection strategy and ability in different systems bring more difficulties in privacy extended management. In addition, the requirements of pro-tecting the same information at different time need the combination of various privacy protection schemes. However, nearly all the current privacy protection schemes are ing at a single case, which lacks systematic and quantized pri-vacy characterization. Furthermore, there is no systematic computing model describing the relationship between the pro-tection level, profit and loss of privacy leaks and the complexity of integrated privacy protection methods. Based on the analysis on the research status of privacy protection, the concept and connotation of privacy computing is proposed and defined. Then the privacy computing research category will be discussed from the whole life cycle of information privacy protection. Finally, some research directions of privacy computing are given, including privacy computing model, context adaptive cryptology for privacy protection, big data a lytics resisted privacy control and protection, privacy protection based on information hiding and system architecture for high concurrent privacy preserving services.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016078/privacy computingquantificationformal descriptionprivacy awareness
spellingShingle Feng-hua LI
Hui LI
Yan JIA
Neng-hai YU
Jian WENG
Privacy computing:concept, connotation and its research trend
Tongxin xuebao
privacy computing
quantification
formal description
privacy awareness
title Privacy computing:concept, connotation and its research trend
title_full Privacy computing:concept, connotation and its research trend
title_fullStr Privacy computing:concept, connotation and its research trend
title_full_unstemmed Privacy computing:concept, connotation and its research trend
title_short Privacy computing:concept, connotation and its research trend
title_sort privacy computing concept connotation and its research trend
topic privacy computing
quantification
formal description
privacy awareness
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016078/
work_keys_str_mv AT fenghuali privacycomputingconceptconnotationanditsresearchtrend
AT huili privacycomputingconceptconnotationanditsresearchtrend
AT yanjia privacycomputingconceptconnotationanditsresearchtrend
AT nenghaiyu privacycomputingconceptconnotationanditsresearchtrend
AT jianweng privacycomputingconceptconnotationanditsresearchtrend