Privacy Computing and User Data Protection Strategies in Social E-Commerce
DOI:
https://doi.org/10.54097/63wzeg28Keywords:
Privacy computing; Social e-commerce; Data protection; Federated learning; Differential privacy; Compliance; GDPR; PIPL.Abstract
This paper examines privacy computing technologies—including federated learning, secure multi-party computation (SMPC), and differential privacy—as solutions to balance data utility and privacy protection in social e-commerce. It highlights technical strategies such as decentralized modeling, noise-enhanced anonymization, and edge-based data processing to mitigate risks like centralized data breaches and cross-border compliance conflicts. Aligning with regulations such as China’s Personal Information Protection Law (PIPL) and the EU’s GDPR, the study proposes a tripartite framework integrating cryptographic techniques, dynamic user consent mechanisms, and regulatory adaptability. Empirical evidence demonstrates reduced privacy violations while maintaining operational efficiency, underscoring the necessity of verifiable privacy-preserving methods for sustainable social e-commerce development.
Downloads
References
[1] ZHANG Jinsong,ZHANG Kai-Dong,HE Dong-Chen,et al. A study on users' willingness to disclose private information in mobile social e-commerce based on SEM and neural network[J]. Journal of Wuhan Textile University,2024,37(05):85-94.
[2] Yan Zhijing.Research Characteristics and Trends of Privacy Computing in China from 2013 to 2022:Visualization Based on CiteSpace[J]. Technology and Innovation,2023(21):57-62,65.
[3] Yang Q. AI and data privacy protection: a federal learning crack[J]. Information Security Research,2019,5(11):961-965.
[4] Analysis of global digital banking strategies[J]. New Finance,2019,(03):4-9.
[5] Xiaohongshu Inc., Privacy Protection and Data Security Transparency Report 2022, p. 17, Table 4
[6] Xiong P,Zhu TQ,Wang XF. Differential privacy preservation and its applications[J]. Journal of Computing,2014,37(01):101-122.
[7] China Academy of Information and Communication Research, White Paper on Privacy Computing (2023), Beijing: China Academy of Information and Communication Research, 2023, p. 89, Case No. CT-2022-011.
[8] FENG Dengguo,LIU Jingbin,QIN Yu,et al. Trustworthy computing theory and technology in innovative development[J]. Science in China:Information Science,2020,50(08):1127-1147.
[9] LI Gongliang,HE Dongbo,GUO Bing,et al. A blockchain privacy protection algorithm based on zero-knowledge proof[J]. Journal of Huazhong University of Science and Technology(Natural Science Edition),2020,48(07):112-116.DOI:10.13245/j.hust.200719.
[10] Jakub Konečný et al. "Federated Learning: Strategies for Improving Communication Efficiency," arXiv preprint arXiv:1610.05492(2016),https:// arxiv.org/abs/1610.05492.
[11] Cynthia Dwork and Aaron Roth, "The Algorithmic Foundations of Differential Privacy," Foundations and Trends® in Theoretical Computer Science 9, no. 3-4 (2014): 211-407.
[12] S. Peng et al. "Enhancing Cross-Border Data Sharing in Blockchain Networks: a Compliance-Centric Approach Ensuring Anonymity and Traceability," in 2023 3rd International Conference on Computer Science and Blockchain (CCSB), 200-204.
[13] Du Yanyong. On the transparency of artificial intelligence systems[J]. Research in Science,2022,40(09):1537-1543.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Highlights in Science, Engineering and Technology

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.







