
Rely on Negotiable Hash Algorithm of Data Exchange in the Relational Data Privacy Protection
Author(s) -
Yuhong Zhang
Publication year - 2020
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1533/4/042041
Subject(s) - computer science , computer security , information privacy , database transaction , privacy software , hash function , privacy protection , data protection act 1998 , transaction data , internet privacy , database
In order to ensure that data privacy in the deal, people need to deal with the data privacy fully autonomous, it was a man of data made by a reflection, is also an effective method for individuals to take the initiative to protect privacy. At the same time in the data business, real-time data is a kind of valuable data, how to prevent the real-time data privacy, and ensure the data transaction security implementation is also an important part of the problem. So far, researchers have put forward a lot of privacy protection method; however, these models cannot effectively protect after fully autonomous data privacy, and for the privacy of the real-time release wasn’t reasonable privacy protection model is put forward.