Welcome to Francis Academic Press

Academic Journal of Computing & Information Science, 2024, 7(10); doi: 10.25236/AJCIS.2024.071018.

Research on privacy protection technology in computer data science

Author(s)

Zhenhan Tan

Corresponding Author:
Zhenhan Tan
Affiliation(s)

University College London, London, UK

Abstract

With the widespread application of big data and artificial intelligence, data privacy issues in computer data science have become increasingly important. This paper reviews the main privacy-preserving technologies, including differential privacy, homomorphic encryption, secure multi-party computation, and federated learning. These techniques offer methods to protect user privacy without compromising data utility. The paper analyzes their fundamental principles, strengths, and weaknesses, and discusses their applications and challenges in fields such as healthcare, finance, social networks, and the Internet of Things (IoT). The study shows that although these technologies significantly enhance data privacy, challenges remain in terms of computational efficiency, scalability, and practical deployment. Finally, the paper explores future trends in privacy-preserving technologies, suggesting further exploration in the areas of technology integration, standardization, and balancing efficiency with security to promote feasibility and adoption in real-world applications. This study aims to provide valuable insights for researchers and practitioners in the field.

Keywords

Privacy-preserving, Data Science, Differential Privacy, Homomorphic Encryption, Federated Learning

Cite This Paper

Zhenhan Tan. Research on privacy protection technology in computer data science. Academic Journal of Computing & Information Science (2024), Vol. 7, Issue 10: 133-139. https://doi.org/10.25236/AJCIS.2024.071018.

References

[1] Lee, C., Lee, C.C., and Kim, S. (2016) Understanding Information Security Stress: Focusing on the Type of Information Security Compliance Activity. Computers & Security, 12-26.

[2] Ardito, L., Messeni Petruzzelli, A., and Albino, V. (2015) From Technological Inventions to New Products: A Systematic Review and Research Agenda of the Main Enabling Factors. European Management Review, 35-48.

[3] Yang, T.H., Ku, C.Y., and Liu, M.N. (2014) An Integrated System for Information Security Management with the Unified Framework. Journal of Risk Research, 1, 50-65.

[4] Beckers, K., Côté, I., Faßbender, S., Heisel, M., and Hofbauer, S. (2013) A Pattern-Based Method for Establishing a Cloud-Specific Information Security Management System. Requirements Engineering, 1, 30-45.

[5] Flowers, A., Zeadally, S., and Murray, A. (2013) Cybersecurity and US Legislative Efforts to Address Cybercrime. Journal of Homeland Security and Emergency Management, 1, 15-35.

[6] Czarnitzki, D., Hanel, P., and Rosa, J.M. (2010) Evaluating the Impact of R&D Tax Credits on Innovation: A Microeconometric Study on Canadian Firms. Research Policy, 1, 100-120.

[7] Tassey, G. (2008) Globalization of Technology-Based Growth: The Policy Imperative. Journal of Technology Transfer, 1, 55-75.