Data Protection of Internet Enterprise Platforms in the Era of Big Data
DOI:
https://doi.org/10.13052/jwe1540-9589.21314Keywords:
Internet platform, Data protection, Cause analysis, Protection pathAbstract
With the development of big data technology, processed data has become an important source of value. Data has played a pivotal role in the development of enterprises, especially internet enterprises. However, Internet enterprise platform companies generally infringe on personal privacy in various stages of information collection, processing and application, and Internet enterprise platform data protection research is of great significance. The study found that the current problems of data protection on Internet enterprise platforms include: extremely weak user data protection measures, intellectual property risks throughout the whole process of big data processing, and infringements that have both new and high-tech characteristics. The high ambiguity in the definition and attribution of “data rights”, the low cost and high concealment of infringements, and the value difference between intellectual property protection and digital economy are the main causes of these problems. As far as the protection path is concerned, we should start from the three aspects of technology empowerment, governance empowerment and legal empowerment, and work together to promote the proper protection of Internet enterprise platform data.
Downloads
References
Shi D. The Research on Data Property and Protection in Big Data Era[J]. Journal of Xi’an Jiaotong University (Social Sciences), 2018, 38(3): 78–85.
Katz M and Shapiro C. Network Externalities, Competition, and Compatibility[J]. The American Economic Review, 1985, 75(3): 424–440.
Mcgowan L D. Legal Implications of Network Economic Effects[J]. California Law Review, 1998, 86(3):479–611.
Solove D J. Nothing to Hide: The False Tradeoff between Privacy and Security[J]. Social Science Electronic Publishing, 2006, 111(6): 1021–1043.
Helbing D and Stefano B. Big Data, Privacy, and Trusted Web: What Needs to Be Done[M]. University Library of Munich, Germany, 2011.
Mantelero A. The EU Proposal for a General Data Protection Regulation and the roots of the ‘right to be forgotten’[J]. Computer Law & Security Review, 2013, 29(3):229–235.
Szekely I. The Right to Forget, the Right to be Forgotten[C]. In: Gutwirth S, Leenes R, De Hert P & Poullet Y(eds). European Data Protection: In Good Health?[M]. Springer, Dordrecht, 2012, pp. 347–363.
Costa L and Poullet Y. Privacy and the Regulation of 2012[J]. Computer Law and Security Review, 2012(28): 254–262.
Yan C L. How to Prevent the “Streaking” of Personal Privacy in the Era of Big Data[J]. People’s Tribune, 2018(16): 82–83.
Hansmann H and Kraakman R. Property, Contract, and Verification: The Numerus Clausus Problem and the Divisibility of Rights[J]. Journal of Legal Studies, 2002, 31(S2):S373–S420.
Ding X D. Who Owns the Data? Platform Data Ownership and Protection from the Perspective of Web Crawler[J]. ECUPL Journal, 2019, 22(5): 69–83.
Nissenbaum H. Privacy As Contextual Integrity[J]. Washington Law Review, 2004, 79(1): 119–158.
Sokol D D & Comerford R E. Antitrust and Regulating Big Data[J]. University of Florida Levin College of Law Research, 2016(SEP): 16–40.
Chen B & Gu D D. Rethinking and Restructuring of the Rational Way of Data Sharing in Digital Economy: From the Perspective of Data Typing[J]. Journal of Shanghai University of Finance and Economics(Philosophy and Social Science), 2020, 22(2): 122–137.
Wang L M. Data Sharing and Personal Information Protection[J]. Modern Law Science, 2019, 41(1): 45–57.
Sweeny L. K-anonymity: a Model for Protecting Privacy[J]. International Journal on Uncertainty, Fuzziness and Knowledge Based Systems, 2012, 10(5): 557–570.
Barbaro M and Zeller T. A face is exposed for AOL searcher No. 4417749[N/OL]. New York Times, (2006-08-09). http://www.nytimes.com/2006/08/09/technology/09aol.html
Narayanan A and Shmatikov V. How To Break Anonymity of the Netflix Prize Dataset[J]. Computer Science, 2006(Oct), arXiv:cs/0610105.
Xiao X K and Tao Y F. M-invariance: towards Privacy Preserving Re-publication of Dynamic Datasets[C]. Proceedings of the 2007, ACM SIGMOD International Conference on Management of Data, June 12–14, 2007, Beijing, China. New York: ACM Press, 2007: 689–700.
Bu Y Y, Fu A W C and Wong R C W, et al. Privacy Preserving Serial Data Publishing byRole Composition[C]. Proceedings of the 34th International Conference on Very Large Data Bases, August 23–28, 2008, Auckland, New Zealand. [S.l.: s.n.], 2008: 845–856.
Van D M, Gentry C & Halevi S, et al. Fully Homomorphic Encryption over the Integers[C]. Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 30–June 3, 2010, Riviera, French. New York: Springer Berlin Heidelberg, 2010: 24–43.
Chen X and Huang Q. The Data Protection of Map Reduce Using Homomorphic Encryption[C]. Proceedings of the 4th IEEE International Conference on Software Engineering and Service Science (ICSESS), May 23–25, 2013, Beijing, China. Piscataway: IEEE Press, 2013: 419–421.
Juels A & Kaliski B S. PORs: Proofs of Retrievability for Large Files[C]. Proceedings of the 14th ACM Conference on Computer and Communications Security, October 29-November 2, 2007, Alexandria, VA, USA. New York: ACM Press, 2007: 584–597.
Erway C, KüPçü A and Papamanthou, et al. Dynamic Provable Data Possession[C]. Proceedings of the 16th ACM Conference on Computer and Communications Security, November 9–13, 2009, Chicago, IL, USA. New York: ACM Press, 2009: 213–222.
Wang Q, Wang C and Li J, et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing[C]. Proceedings of ESORICS, September 21–25, 2009, Saint Malo, France. [S.l.:s.n.], 2009: 355–370.
Aggarwal C C and Philip S Y. A General Survey of Privacy-Preserving Data Mining Models and Algorithms[M]. New York: Springer US, 2008.
Oliveira S M and Zaiane O R. Privacy Preserving Clustering by Data Transformation[J]. Journal of Information and Data Management, 2010, 1(1): 37.
Damiani M L, Bertino E & Catania B, et al. Geo-rbac: A Spatially Aware rbac[J]. ACM Transactions on Information and System Security (TISSEC), 2007, 10(1): 2.
Goyal V, Pandey O and Sahai A, et al. Attribute-based Encryption for Fine-grained Access Control of Encrypted Data[C]. Proceedings of the 13th ACM Conference on Computer and Communications Security, October 30–November 3, 2006, Alexandria, Virginia, USA. New York: ACM Press, 2006: 89–98.
Bobba R, Khurana H and Prabhakaran M. Attribute-sets: A Practically Motivated Enhancement to Attribute-based Encryption[C]. Proceedings of the 14th European Symposium on Research in Computer Security, September 21–25, 2009, Saint-Malo, France. [S.l.: s.t.], 2009: 587–604.
Wan Z, Liu J E and Deng R H. HASBE: A Hierarchical Attribute-based Solution for Flexible and Scalable Access Control in Cloud Computing[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 743–754.
Watanabe H, Fujimura S and Nakadaira A, et al. Blockchain Contract: Securing a Blockchain Applied to Smart Contracts[C]. IEEE International Conference on Consumer Electronics. IEEE, 2016: 467–468.
Li G J, Du X H and Wang N, et al. Research Progress of Blockchain Technology and Its Application in Information Security[J]. Journal of Software, 2018, 29(7): 2029–2115.
Lessig L. The Law of the Horse: What Cyberlaw Might Teach[J]. Harvard Law Review, 1999, 113(2): 501–549.
Li G J and Cheng X Q. Research Status and Scientific Thinking of Big Data[J]. Bulletin of Chinese Academy of Sciences, 2012, 27(6): 647–657.
Patrick A, Marsh S and Briggs P. Designing Systems that People Will Trust[J]. Security and Usability, 2005, 1(1): 75–99.
Wang Y and Ye M. Conflict and Balance between Personal Data Sharing and Privacy Protection in the Era of Artificial Intelligence[J]. Journal of Socialist Theory Guide, 2019(1): 99–106.
Long W Q. On the Construction of New Data Property and its System Structure[J]. Tribune of Political Science and Law, 2017, 35(4): 63–77.
Cheng X. Personal Data Rights in the Era of Big Data[J]. Social Sciences in China, 2018, 40(3): 174–188.