Education, Science, Technology, Innovation and Life
Open Access
Sign In

Privacy Protection in Information and Communication Technology Applications Based on Big Data

Download as PDF

DOI: 10.23977/jeis.2024.090209 | Downloads: 7 | Views: 138

Author(s)

Dongyuan Ge 1, Qianyi Fang 2, Qi Han 1

Affiliation(s)

1 State Grid Heilongjiang Information & Telecommunication Company Ltd, Harbin, Heilongjiang, China
2 Faculty of Science, Northeast Forrstry University, Harbin, Heilongjiang, China

Corresponding Author

Dongyuan Ge

ABSTRACT

With the advent of the information age, big data has become an important force driving the rapid development of information and communication technology, while also bringing huge challenges to user privacy and security. This article is based on various privacy protection methods such as data anonymity, differential privacy, and ciphertext. Through quantitative and empirical research, the application of big data in information communication was deeply explored. Therefore, this article focused on how to efficiently apply data in network security while ensuring its availability and accuracy. A new data anonymity model was designed to address the issue of data anonymity, which can maximize the protection of user privacy and the availability of user data; the impact of different noise addition strategies on the accuracy of data analysis in differential security systems was studied; on this basis, a study was conducted on the combination of multiple encryption methods to improve their security in storage and transmission. In the latest data security assessment, data encryption led with a high score of 9.5, demonstrating its outstanding performance in protecting data security. This study provided a new approach and method for China's privacy protection in the field of information and communication, which can enhance the country's credibility in the field of public information and communication.

KEYWORDS

Big Data, Information and Communication Technology Applications, Privacy Protection, Data Encryption

CITE THIS PAPER

Dongyuan Ge, Qianyi Fang, Qi Han, Privacy Protection in Information and Communication Technology Applications Based on Big Data. Journal of Electronics and Information Science (2024) Vol. 9: 80-87. DOI: http://dx.doi.org/10.23977/10.23977/jeis.2024.090209.

REFERENCES

[1] Chen Qiqi, Feng Jian. The research progress and inspiration of information and communication technology (ICT) in children's geography [J]. Progress in Geographic Science, 2024, 43 (1): 147-162.
[2] Wang Guidong, Yang Delin. Does the Internet improve the total factor productivity of manufacturing enterprises— Further exploration of the paradox of information and communication technology productivity in China [J]. Statistical Research, 2023, 40 (6): 63-76.
[3] Zhang Yan. Anti interference grounding design for electronic information and communication engineering [J]. Information Record Materials, 2023, 24 (6): 185-187.
[4] Chen Congbo, Ye Azhong, Chen Juan. The impact of information and communication technology on urban innovation output [J]. Economic Geography, 2022, 42 (10): 92-99.
[5] Zhang Yurong, Zhu Jingyu. A Study on the Risk of Necessary Patent Litigation for NPE Standards in the Information and Communication Technology Industry - Based on Fuzzy Set Qualitative Comparative Analysis [J]. Intelligence Journal, 2022, 41 (2): 104-111.
[6] Han Guoying, Liu Tongshan. Can information and communication technology promote the upgrading of rural industrial structure? Evidence from the Third National Agricultural Census in Beijing. Research on Agricultural Modernization, 2023, 44 (1): 108-118.
[7] Shukla S , Kapoor R , Gupta N ,et al.Role of information and communication technology in mitigating risks in Indian agricultural supply chains[J].Supply Chain Management: An International Journal, 2023, 28(3):544-558.
[8] Kramer V, Krafft M.When and how information and communication technology orientation affects salespeople's role stress: the interplay of salesperson characteristics and environmental complexity[J].European Journal of Marketing, 2023, 57(3):659-682.
[9] Abraham J, Geobey S. Digital elixir? The Aakash tablet as a social innovation in information and communication technology for development (ICT4D)[J].Social Enterprise Journal, 2022, 18(2):288-305.
[10] Naik B J , Rao B M , Rambabu P ,et al.Attitude of Farmers towards Information and Communication Technology (Ict) Tools[J].Current Journal of Applied Science and Technology, 2021, 39(43):72-81.
[11] Gupta M K, Chandra P. A comprehensive survey of data mining[J]. International Journal of Information Technology, 2020, 12(4): 1243-1257. 
[12] Ni, Z. & Ouyang, T. On the Use of ICT by Enterprises to Activate Industrial Heritage: A Case Study of Taoxichuan in China. Journal of Organizational and End User Computing, 2023, 35(3), 1-21.

Downloads: 8248
Visits: 278857

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.