Journal on Communications ›› 2016, Vol. 37 ›› Issue (4): 1-11.doi: 10.11959/j.issn.1000-436x.2016078

• academic paper •     Next Articles

Privacy computing:concept, connotation and its research trend

Feng-hua LI1,Hui LI2,Yan JIA3,Neng-hai YU4,Jian WENG5   

  1. 1 State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100195, China
    2 School of Cyber Engineering, Xidian University, Xi'an 710071, China
    3 College of Computer, National University of Defense Technology, Changsha 410073, China
    4 School of Information Science and Technology, University of Science and Technology of China, Hefei 230026, China
    5 College of Information Science and Technology,Jinan University, Guangzhou 510632, China
  • Online:2016-04-25 Published:2016-04-26
  • Supported by:
    The National Natural Science Foundation of China-Guangdong Joint Program;111 Project

Abstract:

s: With the widespread application of mobile Internet, cloud computing and big data technologies, people enjoy the convenience of electronic business, information retrieval, social network and other services, whereas the threats of privacy leaks are ever growing due to the use of big data analytics. The differences of privacy protection strategy and ability in different systems bring more difficulties in privacy extended management. In addition, the requirements of pro-tecting the same information at different time need the combination of various privacy protection schemes. However, nearly all the current privacy protection schemes are ing at a single case, which lacks systematic and quantized pri-vacy characterization. Furthermore, there is no systematic computing model describing the relationship between the pro-tection level, profit and loss of privacy leaks and the complexity of integrated privacy protection methods. Based on the analysis on the research status of privacy protection, the concept and connotation of privacy computing is proposed and defined. Then the privacy computing research category will be discussed from the whole life cycle of information privacy protection. Finally, some research directions of privacy computing are given, including privacy computing model, context adaptive cryptology for privacy protection, big data a lytics resisted privacy control and protection, privacy protection based on information hiding and system architecture for high concurrent privacy preserving services.

Key words: privacy computing, quantification, formal description, privacy awareness

No Suggested Reading articles found!