Privacy Computing and User Data Protection Strategies in Social E-Commerce

Authors

  • Yumeng Jin
  • Han Yang
  • Jiayi Zhang
  • Xiaotong Wang
  • Jiayi Gao

DOI:

https://doi.org/10.54097/63wzeg28

Keywords:

Privacy computing; Social e-commerce; Data protection; Federated learning; Differential privacy; Compliance; GDPR; PIPL.

Abstract

This paper examines privacy computing technologies—including federated learning, secure multi-party computation (SMPC), and differential privacy—as solutions to balance data utility and privacy protection in social e-commerce. It highlights technical strategies such as decentralized modeling, noise-enhanced anonymization, and edge-based data processing to mitigate risks like centralized data breaches and cross-border compliance conflicts. Aligning with regulations such as China’s Personal Information Protection Law (PIPL) and the EU’s GDPR, the study proposes a tripartite framework integrating cryptographic techniques, dynamic user consent mechanisms, and regulatory adaptability. Empirical evidence demonstrates reduced privacy violations while maintaining operational efficiency, underscoring the necessity of verifiable privacy-preserving methods for sustainable social e-commerce development.

Downloads

Download data is not yet available.

References

[1] ZHANG Jinsong,ZHANG Kai-Dong,HE Dong-Chen,et al. A study on users' willingness to disclose private information in mobile social e-commerce based on SEM and neural network[J]. Journal of Wuhan Textile University,2024,37(05):85-94.

[2] Yan Zhijing.Research Characteristics and Trends of Privacy Computing in China from 2013 to 2022:Visualization Based on CiteSpace[J]. Technology and Innovation,2023(21):57-62,65.

[3] Yang Q. AI and data privacy protection: a federal learning crack[J]. Information Security Research,2019,5(11):961-965.

[4] Analysis of global digital banking strategies[J]. New Finance,2019,(03):4-9.

[5] Xiaohongshu Inc., Privacy Protection and Data Security Transparency Report 2022, p. 17, Table 4

[6] Xiong P,Zhu TQ,Wang XF. Differential privacy preservation and its applications[J]. Journal of Computing,2014,37(01):101-122.

[7] China Academy of Information and Communication Research, White Paper on Privacy Computing (2023), Beijing: China Academy of Information and Communication Research, 2023, p. 89, Case No. CT-2022-011.

[8] FENG Dengguo,LIU Jingbin,QIN Yu,et al. Trustworthy computing theory and technology in innovative development[J]. Science in China:Information Science,2020,50(08):1127-1147.

[9] LI Gongliang,HE Dongbo,GUO Bing,et al. A blockchain privacy protection algorithm based on zero-knowledge proof[J]. Journal of Huazhong University of Science and Technology(Natural Science Edition),2020,48(07):112-116.DOI:10.13245/j.hust.200719.

[10] Jakub Konečný et al. "Federated Learning: Strategies for Improving Communication Efficiency," arXiv preprint arXiv:1610.05492(2016),https:// arxiv.org/abs/1610.05492.

[11] Cynthia Dwork and Aaron Roth, "The Algorithmic Foundations of Differential Privacy," Foundations and Trends® in Theoretical Computer Science 9, no. 3-4 (2014): 211-407.

[12] S. Peng et al. "Enhancing Cross-Border Data Sharing in Blockchain Networks: a Compliance-Centric Approach Ensuring Anonymity and Traceability," in 2023 3rd International Conference on Computer Science and Blockchain (CCSB), 200-204.

[13] Du Yanyong. On the transparency of artificial intelligence systems[J]. Research in Science,2022,40(09):1537-1543.

Downloads

Published

05-07-2025

How to Cite

Jin, Y., Yang, H., Zhang, J., Wang, X., & Gao, J. (2025). Privacy Computing and User Data Protection Strategies in Social E-Commerce. Highlights in Science, Engineering and Technology, 145, 194-203. https://doi.org/10.54097/63wzeg28