Chinese Journal of Network and Information Security ›› 2022, Vol. 8 ›› Issue (6): 1-8.doi: 10.11959/j.issn.2096-109x.2022078

• Perspective •     Next Articles

Academic connotation and research trends of privacy computing

Fenghua LI1, Hui LI2, Ben NIU1, Weidong QIU3   

  1. 1 Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100085, China
    2 School of Cyber Engineering, Xidian University, Xi’an 710126, China
    3 School of Cyber Science and Engineering, Shanghai Jiaotong University, Shanghai 200240, China
  • Revised:2022-11-30 Online:2022-12-15 Published:2023-01-16
  • Supported by:
    The National Key R&D Program of China(2021YFB3101301);The National Natural Science Foundation of China(61932015)

Abstract:

The authors of this paper first proposed the concept, definition and academic connotation of privacy computing, and formed a relatively mature theoretical and technical system accordingly.In order to continuously promote the academic research and industrial application of privacy computing, the academic connotation of privacy computing was elaborated, including how to understand the full-life cycle, extended control, privacy quantification and mapping, desensitization effect evaluation.Besides, the necessity of iterative on-demand desensitization and the motivation to study the language of privacy computing were presented.The role of audit log self-storage in ubiquitous sharing was explained and some distorted academic concepts were also clarified.Moreover, 37 research points in 9 aspects of privacy computing and 40 research points in 8 aspects of data security were given.It helps to better understand the research scope of privacy computing and correctly distinguish between privacy computing and data security.

Key words: privacy computing, extended control, dynamic measurement, iterative on-demand desensitization, protection effect evaluation

CLC Number: 

No Suggested Reading articles found!