Data Protection of Internet Enterprise Platforms in the Era of Big Data

Authors

  • Jiaxing Zhang School of Social and Behavioral Sciences, Nanjing University, Nanjing, Jiangsu Province, China
  • Anuo Yang School of Social and Behavioral Sciences, Nanjing University, Nanjing, Jiangsu Province, China
  • Feng Shuaishuai School of Sociology, Wuhan University, Wuhan, Hubei, China

DOI:

https://doi.org/10.13052/jwe1540-9589.21314

Keywords:

Internet platform, Data protection, Cause analysis, Protection path

Abstract

With the development of big data technology, processed data has become an important source of value. Data has played a pivotal role in the development of enterprises, especially internet enterprises. However, Internet enterprise platform companies generally infringe on personal privacy in various stages of information collection, processing and application, and Internet enterprise platform data protection research is of great significance. The study found that the current problems of data protection on Internet enterprise platforms include: extremely weak user data protection measures, intellectual property risks throughout the whole process of big data processing, and infringements that have both new and high-tech characteristics. The high ambiguity in the definition and attribution of “data rights”, the low cost and high concealment of infringements, and the value difference between intellectual property protection and digital economy are the main causes of these problems. As far as the protection path is concerned, we should start from the three aspects of technology empowerment, governance empowerment and legal empowerment, and work together to promote the proper protection of Internet enterprise platform data.

Downloads

Download data is not yet available.

Author Biographies

Jiaxing Zhang, School of Social and Behavioral Sciences, Nanjing University, Nanjing, Jiangsu Province, China

Jiaxing Zhang is a PhD candidate in sociology at Nanjing University. Her research interests include Computational Social Science, Blockchain Technology and Social Governance, Big Data, etc.

She attended the Wuhan University where she received her B.Sc. in Software Engineering in 2009. Jiaxing Zhang then went on to pursuit a M.Sc. in software Engineering from Wuhan University, China in 2011. After that, she got a M.Sc. in Digital Media from Wuhan University, China in 2013.

Jiaxing Zhang has held solution and software engineering senior positions at Shenzhen since 2014. And she got some awards from some other research institutes in her research areas.

Anuo Yang, School of Social and Behavioral Sciences, Nanjing University, Nanjing, Jiangsu Province, China

Anuo Yang is a PhD candidate in sociology at Nanjing University. Her research interests include the labor research, population migration, social class, and computational social science. She has published research include “The Impact of Perceived Discrimination, Positive Aspects of Caregiving on Depression among Caregivers: Mediating Effect of Job Satisfaction”“ Prediction of Epidemic Spread of the 2019 Novel Coronavirus Driven by Spring Festival Transportation in China: A Population-Based Study”, etc.

Feng Shuaishuai, School of Sociology, Wuhan University, Wuhan, Hubei, China

Feng Shuaishuai is a PhD candidate in sociology at Wuhan University. He received his bachelor’s degree and master’s degree in sociology from Northwest A&F University and Wuhan University respectively. His current focus is on computational social science research.

References

Shi D. The Research on Data Property and Protection in Big Data Era[J]. Journal of Xi’an Jiaotong University (Social Sciences), 2018, 38(3): 78–85.

Katz M and Shapiro C. Network Externalities, Competition, and Compatibility[J]. The American Economic Review, 1985, 75(3): 424–440.

Mcgowan L D. Legal Implications of Network Economic Effects[J]. California Law Review, 1998, 86(3):479–611.

Solove D J. Nothing to Hide: The False Tradeoff between Privacy and Security[J]. Social Science Electronic Publishing, 2006, 111(6): 1021–1043.

Helbing D and Stefano B. Big Data, Privacy, and Trusted Web: What Needs to Be Done[M]. University Library of Munich, Germany, 2011.

Mantelero A. The EU Proposal for a General Data Protection Regulation and the roots of the ‘right to be forgotten’[J]. Computer Law & Security Review, 2013, 29(3):229–235.

Szekely I. The Right to Forget, the Right to be Forgotten[C]. In: Gutwirth S, Leenes R, De Hert P & Poullet Y(eds). European Data Protection: In Good Health?[M]. Springer, Dordrecht, 2012, pp. 347–363.

Costa L and Poullet Y. Privacy and the Regulation of 2012[J]. Computer Law and Security Review, 2012(28): 254–262.

Yan C L. How to Prevent the “Streaking” of Personal Privacy in the Era of Big Data[J]. People’s Tribune, 2018(16): 82–83.

Hansmann H and Kraakman R. Property, Contract, and Verification: The Numerus Clausus Problem and the Divisibility of Rights[J]. Journal of Legal Studies, 2002, 31(S2):S373–S420.

Ding X D. Who Owns the Data? Platform Data Ownership and Protection from the Perspective of Web Crawler[J]. ECUPL Journal, 2019, 22(5): 69–83.

Nissenbaum H. Privacy As Contextual Integrity[J]. Washington Law Review, 2004, 79(1): 119–158.

Sokol D D & Comerford R E. Antitrust and Regulating Big Data[J]. University of Florida Levin College of Law Research, 2016(SEP): 16–40.

Chen B & Gu D D. Rethinking and Restructuring of the Rational Way of Data Sharing in Digital Economy: From the Perspective of Data Typing[J]. Journal of Shanghai University of Finance and Economics(Philosophy and Social Science), 2020, 22(2): 122–137.

Wang L M. Data Sharing and Personal Information Protection[J]. Modern Law Science, 2019, 41(1): 45–57.

Sweeny L. K-anonymity: a Model for Protecting Privacy[J]. International Journal on Uncertainty, Fuzziness and Knowledge Based Systems, 2012, 10(5): 557–570.

Barbaro M and Zeller T. A face is exposed for AOL searcher No. 4417749[N/OL]. New York Times, (2006-08-09). http://www.nytimes.com/2006/08/09/technology/09aol.html

Narayanan A and Shmatikov V. How To Break Anonymity of the Netflix Prize Dataset[J]. Computer Science, 2006(Oct), arXiv:cs/0610105.

Xiao X K and Tao Y F. M-invariance: towards Privacy Preserving Re-publication of Dynamic Datasets[C]. Proceedings of the 2007, ACM SIGMOD International Conference on Management of Data, June 12–14, 2007, Beijing, China. New York: ACM Press, 2007: 689–700.

Bu Y Y, Fu A W C and Wong R C W, et al. Privacy Preserving Serial Data Publishing byRole Composition[C]. Proceedings of the 34th International Conference on Very Large Data Bases, August 23–28, 2008, Auckland, New Zealand. [S.l.: s.n.], 2008: 845–856.

Van D M, Gentry C & Halevi S, et al. Fully Homomorphic Encryption over the Integers[C]. Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 30–June 3, 2010, Riviera, French. New York: Springer Berlin Heidelberg, 2010: 24–43.

Chen X and Huang Q. The Data Protection of Map Reduce Using Homomorphic Encryption[C]. Proceedings of the 4th IEEE International Conference on Software Engineering and Service Science (ICSESS), May 23–25, 2013, Beijing, China. Piscataway: IEEE Press, 2013: 419–421.

Juels A & Kaliski B S. PORs: Proofs of Retrievability for Large Files[C]. Proceedings of the 14th ACM Conference on Computer and Communications Security, October 29-November 2, 2007, Alexandria, VA, USA. New York: ACM Press, 2007: 584–597.

Erway C, KüPçü A and Papamanthou, et al. Dynamic Provable Data Possession[C]. Proceedings of the 16th ACM Conference on Computer and Communications Security, November 9–13, 2009, Chicago, IL, USA. New York: ACM Press, 2009: 213–222.

Wang Q, Wang C and Li J, et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing[C]. Proceedings of ESORICS, September 21–25, 2009, Saint Malo, France. [S.l.:s.n.], 2009: 355–370.

Aggarwal C C and Philip S Y. A General Survey of Privacy-Preserving Data Mining Models and Algorithms[M]. New York: Springer US, 2008.

Oliveira S M and Zaiane O R. Privacy Preserving Clustering by Data Transformation[J]. Journal of Information and Data Management, 2010, 1(1): 37.

Damiani M L, Bertino E & Catania B, et al. Geo-rbac: A Spatially Aware rbac[J]. ACM Transactions on Information and System Security (TISSEC), 2007, 10(1): 2.

Goyal V, Pandey O and Sahai A, et al. Attribute-based Encryption for Fine-grained Access Control of Encrypted Data[C]. Proceedings of the 13th ACM Conference on Computer and Communications Security, October 30–November 3, 2006, Alexandria, Virginia, USA. New York: ACM Press, 2006: 89–98.

Bobba R, Khurana H and Prabhakaran M. Attribute-sets: A Practically Motivated Enhancement to Attribute-based Encryption[C]. Proceedings of the 14th European Symposium on Research in Computer Security, September 21–25, 2009, Saint-Malo, France. [S.l.: s.t.], 2009: 587–604.

Wan Z, Liu J E and Deng R H. HASBE: A Hierarchical Attribute-based Solution for Flexible and Scalable Access Control in Cloud Computing[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 743–754.

Watanabe H, Fujimura S and Nakadaira A, et al. Blockchain Contract: Securing a Blockchain Applied to Smart Contracts[C]. IEEE International Conference on Consumer Electronics. IEEE, 2016: 467–468.

Li G J, Du X H and Wang N, et al. Research Progress of Blockchain Technology and Its Application in Information Security[J]. Journal of Software, 2018, 29(7): 2029–2115.

Lessig L. The Law of the Horse: What Cyberlaw Might Teach[J]. Harvard Law Review, 1999, 113(2): 501–549.

Li G J and Cheng X Q. Research Status and Scientific Thinking of Big Data[J]. Bulletin of Chinese Academy of Sciences, 2012, 27(6): 647–657.

Patrick A, Marsh S and Briggs P. Designing Systems that People Will Trust[J]. Security and Usability, 2005, 1(1): 75–99.

Wang Y and Ye M. Conflict and Balance between Personal Data Sharing and Privacy Protection in the Era of Artificial Intelligence[J]. Journal of Socialist Theory Guide, 2019(1): 99–106.

Long W Q. On the Construction of New Data Property and its System Structure[J]. Tribune of Political Science and Law, 2017, 35(4): 63–77.

Cheng X. Personal Data Rights in the Era of Big Data[J]. Social Sciences in China, 2018, 40(3): 174–188.

Downloads

Published

2022-03-22

How to Cite

Zhang, J. ., Yang, . A. ., & Shuaishuai, F. . (2022). Data Protection of Internet Enterprise Platforms in the Era of Big Data. Journal of Web Engineering, 21(03), 861–878. https://doi.org/10.13052/jwe1540-9589.21314

Issue

Section

Articles