z-logo
open-access-imgOpen Access
Rely on Negotiable Hash Algorithm of Data Exchange in the Relational Data Privacy Protection
Author(s) -
Yuhong Zhang
Publication year - 2020
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1533/4/042041
Subject(s) - computer science , computer security , information privacy , database transaction , privacy software , hash function , privacy protection , data protection act 1998 , transaction data , internet privacy , database
In order to ensure that data privacy in the deal, people need to deal with the data privacy fully autonomous, it was a man of data made by a reflection, is also an effective method for individuals to take the initiative to protect privacy. At the same time in the data business, real-time data is a kind of valuable data, how to prevent the real-time data privacy, and ensure the data transaction security implementation is also an important part of the problem. So far, researchers have put forward a lot of privacy protection method; however, these models cannot effectively protect after fully autonomous data privacy, and for the privacy of the real-time release wasn’t reasonable privacy protection model is put forward.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here