Research on the Issues and Paths of Citizen Privacy Protection in China in the Era of Big Data

Authors

  • Wuguang Wei Faculty of Law, Universiti Kebangsaan Malaysia (UKM), Bangi, Selangor Malaysia, 43600 Author https://orcid.org/0009-0002-5468-7170
  • Abdul Manap Nazura Bt. Faculty of Law, Universiti Kebangsaan Malaysia (UKM), Bangi, Selangor Malaysia, 43600 Author
  • Mohamad Rizal Bin Abd Rahman Faculty of Law, Universiti Kebangsaan Malaysia (UKM), Bangi, Selangor Malaysia, 43600 Author

DOI:

https://doi.org/10.56294/saludcyt2024.1208

Keywords:

Citizen Privacy Protection, Big Data, Similarities and Differences, Comparative Perspective

Abstract

The development of big data technology has brought great impact and changes to social governance, and poses a great threat to personal privacy security, but it also effectively promotes the intellectualization of lifestyle, personalized service and scientific decision-making. At present, due to the imperfect legal system, the non-standard management of practitioners, and the weak awareness of personal privacy protection, cases of information security infringement occur from time to time. This paper analyzes the existing problems in the field of privacy protection and the reasons for privacy disclosure in the era of big data, and summarizes the important enlightenment of foreign privacy protection experience to the protection of privacy rights of Chinese citizens at this stage by drawing lessons from the successful practical experience of American industry self-regulation model, European Union legislative protection model and British technology control model. This paper puts forward specific measures to establish and improve the protection mechanism of citizens' privacy in the era of big data in China, that is, to strengthen legislative supervision and system formulation, to protect personal privacy through data desensitization, data encryption, data access control and data security audit technology; Improve the awareness and ability of personal privacy protection and other governance methods.

References

[1]Aho, B., & Duffield, R. . Beyond surveillance capitalism: Privacy, regulation and big data in Europe and China. Economy and Society, 2020:49(2), 187-212.https://doi.org/10.1080/03085147.2019.1690275

[2] Andrew J , Baker M .The General Data Protection Regulation in the Age of Surveillance Capitalism[J].Journal of Business Ethics, 2021, 168.DOI:10.1007/s10551-019-04239-z.

[3] Habrelian H .LEGAL PROTECTION OF MEDICAL PERSONNEL DURING ARMED CONFLICTS[J]. 2020.DOI:10.32518/2617-4162-2020-1-139-145.

[4] Deepa N , Pham Q V , Nguyen D C ,et al.A survey on blockchain for big data: Approaches, opportunities, and future directions[J].Future generations computer systems: FGCS, 2022(131-):131. DOI:10.1016/j.future.2022.01.017

[5] Elkawkagy M, Elwan E, Alsumayt A, et al. Elevating Big Data Privacy: Innovative Strategies and Challenges in Data Abundance[J]. IEEE Access, 2024. DOI:10.1109/access.2024.3357943

[6] Fu A, Zhang X, Xiong N, et al. VFL: A verifiable federated learning with privacy-preserving for big data in industrial IoT[J]. IEEE Transactions on Industrial Informatics, 2020, 18(5): 3316-3326. https://doi.org/10.48550/arXiv.2007.13585

[7] Hassan J, Shehzad D, Habib U, et al. [Retracted] The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)[J]. Computational intelligence and neuroscience, 2022(1): 8303504. https://doi.org/10.1155/2022/8303504

[8]Josphineleela R, Kaliappan S, Natrayan L, et al. Big Data Security through Privacy–Preserving Data Mining (PPDM): A Decentralization Approach[C]//2023 Second International Conference on Electronics and Renewable Systems (ICEARS). IEEE, 2023: 718-721. doi: 10.1109/ICEARS56392.2023.10085646.

[9]Keshk, M., Moustafa, N., Sitnikova, E., & Turnbull, B. (2022). Privacy-preserving big data analytics for cyber-physical systems. Wireless Networks, 28(3), 1241-1249. https://doi.org/10.1007/s11276-018-01912-5

[10]Lv Z, Qiao L, Hossain M S, et al. Analysis of using blockchain to protect the privacy of drone big data[J]. IEEE network, 2021, 35(1): 44-49. doi: 10.1109/MNET.011.2000154.

[11]Murdoch B. Privacy and artificial intelligence: challenges for protecting health information in a new era[J]. BMC Medical Ethics, 2021, 22: 1-5. DOI:10.1186/s12910-021-00687-3

[12]Nair A K, Sahoo J, Raj E D. Privacy preserving Federated Learning framework for IoMT based big data analysis using edge computing[J]. Computer Standards & Interfaces, 2023, 86: 103720. DOI:10.1016/j.csi.2023.103720

[13]Nguyen T, Gosine R G, Warrian P. A systematic review of big data analytics for oil and gas industry 4.0[J]. IEEE access, 2020, 8: 61183-61201. doi: 10.1109/ACCESS.2020.2979678.

[14]Ogbuke N J, Yusuf Y Y, Dharma K, et al. Big data supply chain analytics: ethical, privacy and security challenges posed to business, industries and society[J]. Production Planning & Control, 2022, 33(2-3): 123-137. doi: 10.1080/09537287.2020.1810764

[15]Oyewole, A. T., Oguejiofor, B. B., Eneh, N. E., Akpuokwe, C. U., & Bakare, S. S. (2024). Data privacy laws and their impact on financial technology companies: a review. Computer Science & IT Research Journal, 5(3), 628-650. https://doi.org/10.51594/csitrj.v5i3.911

[16] Ramachandra M N, Srinivasa Rao M, Lai W C, et al. An efficient and secure big data storage in cloud environment by using triple data encryption standard[J]. Big Data and Cognitive Computing, 2022, 6(4): 101. https://doi.org/10.3390/bdcc6040101

[17] Rizi M H P, Seno S A H. A systematic review of technologies and solutions to improve security and privacy protection of citizens in the smart city[J]. Internet of Things, 2022, 20: 100584. https://doi.10.1016/j.iot.2022.100584

[18] Robertson, V. H. (2020). Excessive data collection: privacy considerations and abuse of dominance in the era of big data. Common Market Law Review, 57(1). DOI: 10.54648/cola2020006

[19] Sousa, S., Kern, R. How to keep text private? A systematic review of deep learning methods for privacy-preserving natural language processing. Artif Intell Rev 56, 1427–1492 (2023). https://doi.org/10.1007/s10462-022-10204-6

[20] Talukder M S R. Digital Constitutionalism in Bangladesh to Protect Right to Privacy in the Big Data Regime[M]//The Constitutional Law of Bangladesh: Progression and Transformation at its 50th Anniversary. Singapore: Springer Nature Singapore, 2023: 317-334.

https://doi.org/10.1007/978-981-99-2579-7_18

[21] Tan L, Shi N, Yang C, et al. A blockchain-based access control framework for cyber-physical-social system big data[J]. IEEE Access, 2020, 8: 77215-77226. doi: 10.1109/ACCESS.2020.2988951.

[22] Wang X, Guo Y, Zhao Y, et al. The New Progress and Methods of Privacy Protection on Medical and Health Big Data[C]//2022 14th International Conference on Software, Knowledge, Information Management and Applications (SKIMA). IEEE, 2022: 73-78. doi: 10.1109/SKIMA57145.2022.10029494.

[23] Widanage C, Liu W, Li J, et al. HySec-Flow: privacy-preserving genomic computing with SGX-based big-data analytics framework[C]//2021 IEEE 14th International Conference on Cloud Computing (CLOUD). IEEE, 2021: 733-743. doi: 10.1109/CLOUD53861.2021.00098.

[24] Wu X, Zhang Y, Wang A, et al. MNSSp3: Medical big data privacy protection platform based on Internet of things[J]. Neural Computing and Applications, 2022: 1-15. doi: 10.1007/s00521-020-04873-z

[25]Zhao, B., Fan, K., Yang, K., Wang, Z., Li, H., & Yang, Y. (2021). Anonymous and privacy-preserving federated learning with industrial big data. IEEE Transactions on Industrial Informatics, 17(9), 6314-6323. doi: 10.1109/TII.2021.3052183.

Downloads

Published

2024-08-08

How to Cite

1.
Wei W, Nazura Bt. AM, Bin Abd Rahman MR. Research on the Issues and Paths of Citizen Privacy Protection in China in the Era of Big Data. Salud, Ciencia y Tecnología [Internet]. 2024 Aug. 8 [cited 2024 Dec. 10];4:.1208. Available from: https://sct.ageditor.ar/index.php/sct/article/view/948