Abstract
The development of the Internet has promoted the development of big data, and the quantification of information in the era of big data has caused an upsurge of personal privacy protection. To solve the problem of privacy protection of personal privacy in the era of big data, this article uses the literature analysis method to refer to the research experience of many previous scholars, and synthesize your own understanding, use cryptography to encrypt personal privacy in the era of big data, and implement encryption and decryption operations of the data processing process through the ESF algorithm to ensure the security of personal privacy. And comparatively analyzed the degree of importance my country and the United Kingdom, France and India attach to privacy-related laws, and the privacy leaks in four countries from 2015 to 2019. The final result shows that, before the right to privacy was widespread, China and India had 239 cases and 347 cases of privacy leakage, while Britain and France had 144 cases and 131 cases of privacy leakage because they had already implemented privacy laws. With the improvement of privacy-related laws, there are fewer and fewer privacy leaks, but the country still needs to pay attention to privacy-related laws and restrict and sanction offenders through relevant laws to reduce or avoid personal privacy leakage.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Li, F., Li, H., Wang, C., et al.: Guest editorial special issue on security and privacy protection for big data and IoT. IEEE Internet of Things J. 6(2), 1446–1449 (2019)
Sicari, S., Rizzardi, A., Grieco, L.A., et al.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146–164 (2015)
Li, M., Lou, W., Ren, K.: Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17(1), 51–58 (2016)
Bednar, K., Spiekermann, S., Langheinrich, M.: Engineering privacy. Inf. Soc. 35(5), 122–142 (2018)
Mannhardt, F., Koschmider, A., Baracaldo, N., et al.: Privacy-preserving process mining. Wirtschaftsinformatik 61(5), 595–614 (2019)
Abbas, H., Maennel, O., Assar, S.: Security and privacy issues in cloud computing. Ann. Telecommun. 72(5–6), 233–235 (2017)
Andreu-Perez, J., Poon, C.C.Y., Merrifield, R.D., et al.: Big data for health. IEEE J. Biomed. Health Inf. 19(4), 1193–1208 (2015)
Li, Q.Y., Zhang, L.: The public security and personal privacy survey: biometric technology in Hong Kong. IEEE Secur. Priv. 14(4), 12–21 (2016)
Mathew, G., Obradovic, Z.: A distributed decision support algorithm that preserves personal privacy. J. Intel. Inf. Syst. 44(1), 107–132 (2015)
Ruiz, R.D.S., Rogério, W., Park, K., et al.: Overconfidence: personal behaviors regarding privacy that allows the leakage of information in private browsing mode. Soc. Dig. Inf. Wireless Commun. 4(3), 404–416 (2015)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Liu, X. (2021). Legal Dilemma and Outlet of Privacy Protection in the Era of Big Data. In: Huang, C., Chan, YW., Yen, N. (eds) 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems. Advances in Intelligent Systems and Computing, vol 1379 . Springer, Singapore. https://doi.org/10.1007/978-981-16-1726-3_95
Download citation
DOI: https://doi.org/10.1007/978-981-16-1726-3_95
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-1725-6
Online ISBN: 978-981-16-1726-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)