Academic Journal of Engineering and Technology Science, 2023, 6(4); doi: 10.25236/AJETS.2023.060407.
Jiana Bi1, Yonghong Guo1, Ning He1, Shuang Wang2
1School of Software and Big Data, Changzhou College of Information Technology, Changzhou, China
2School of Physical Education, Bohai University, Jinzhou, China
Big data is composed of linear associated data and nonlinear data. Big data is characterized by multiple types, large data scale, fast data processing, high data value and low value density. As more information can be obtained through big data mining or web crawler, the leakage of users' personal information occurs from time to time, which seriously endangers the stability of social order. Therefore, protecting personal information from infringement in the era of big data has become an urgent problem to be solved. This paper constructs the technical framework of the life cycle and protection of personal information in big data, and summarizes the key technologies such as authorization, access control, security audit, traceability audit and data desensitization. In addition, in-depth research on these key technologies will be conducted to provide complete solutions for the protection of personal information in big data, crack down on illegal behaviors of user information trading, and create a positive network security environment.
Big Data; Personal Information Security; Key Technology; Authorization; Access Control; Security Audit; Traceability Audit; Data Desensitization
Jiana Bi, Yonghong Guo, Ning He, Shuang Wang. Research on Key Technologies of Personal Information Security Protection in Big Data. Academic Journal of Engineering and Technology Science (2023) Vol. 6, Issue 4: 42-47. https://doi.org/10.25236/AJETS.2023.060407.
 J. Li, J. Zhang, L. Wang. Research on Personal Information Security Protection from the perspective of Big Data[J]. Satellite TV & IP Multimedia, 2019, 16(18): 75-76.
 W. Zhao, M. W. Shui. Research on Personal Information Security Protection Measures under the background of Big data[J]. Computer Programming Skills & Maintenance, 2018, 25(07): 86-87+93.
 Y. M. Bao, P. J. Song, G. Q. Yu, et al. Research on Technical architecture of Personal Information Protection based on Data security[J]. China Security & Protection, 2022, 13(Z1): 42-48.
 L. P. Gu, S. Fan. The Licensing Management of Data Flow and Data Migration[J]. Frontiers of Data & Computing, 2019, 10(02): 51-60.
 W. Y. Li. Big Data Access Control Method Based on Machine Learning[J]. China Computer & Communication, 2021, 33(13): 30-32.
 Y. J. Lu, Y. H. Li. Research and lmplementation of Access Control Method for Big Data Platform[J]. Journal of Information Security Research, 2016, 2(10): 926-930.
 W. J. Liu, Q. J. Rong, Y. Wang. Analysis on Internet security audit in the era of big data[J]. Auditing and Finance, 2022, 39(02): 50-52.
 R. Tao, S. J. Zhang. Research and analysis of security audit system under Big data technology[J]. Chinese informatization, 2020, 17(04): 90-91.
 Z. T. Chen, B. Jin, M. Y. Guo, M. M. Li. Research on data desensitization technology of big data platform[J]. Communication & Information Technology, 2022, 52(04): 31-33+42.
 D. Tang, J. Gu, K. Y. Zhang, X. Gu. Development trend of data desensitization technology[J]. Secrecy Science and Technology, 2021, 22(04): 4-11.
 B. He. Research on data desensitization technology of big data platform[J]. Information Recording Materials, 2020, 21(09): 134-135.