Guangzhou Huashang College, Guangzhou, 511399, China
With the rapid development of information technology, big data technology has become an important component of modern society. In this context, the collection and use of personal data is becoming increasingly common, involving people's daily lives, work, learning and other aspects. However, this data collection and use behavior has also brought problems of personal privacy disclosure and security risks, posing potential threats to people's lives. This article aims to explore issues related to personal big data privacy protection and security risk prevention to ensure personal privacy safety. This article conducts in-depth research on the current status and existing problems of personal big data privacy protection through a survey and analysis approach, and proposes corresponding solutions. It is hoped that this research can provide ideas for improving the level of personal big data privacy protection and ensuring personal privacy safety.
big data hidden, security risk, technology strengthening
Zeng Yingqing. Research on Personal Big Data Privacy Protection and Security Risk Prevention. International Journal of Frontiers in Sociology (2023), Vol. 5, Issue 13: 65-69. https://doi.org/10.25236/IJFS.2023.051312.
 Xu Mengyao. Research on privacy flow and Personal Information Protection in Big Data [J]. Journal of Southeast University (Philosophy and Social Sciences Edition), 2022,24(S1):pp.46-49.
 Wang Weijie.. Common Problems and Countermeasures of data security risk Assessment [J]. Security Science and Technology,2023,(06):pp.11-14. (in Chinese)
 WU Z G.. Progress of privacy protection technology for big data applications [J]. Telecom Network Technology, 2016,(02):pp.7-10. (in Chinese)
 Dou Y. Research on the countermeasures of data open sharing and personal privacy protection--Hierarchical data and algorithm accountability [J]. Modern Information, 2021, 41(07):pp.146-153.
 Wang Yang. Research on privacy protection of Network users under big Data environment [J]. Network Security Technology and Application, 2022 (10):pp.56-59. (in Chinese)