Can't you have your cake and eat it? On large data and privacy

Source: Internet
Author: User
Keywords Google big data fish and paws not

Now many companies are more and more enthusiastic about large data, which is the inevitable trend of the development of the information age. But with the internet making people more and more convenient, the weakness of the Internet is becoming more and more obvious, that is, people are more and more concerned about the problem of privacy. Bear's paw and fish to make up both, big data and privacy should be how?

After the Prism gate incident, most people have a lingering fear of privacy leaks, and not long ago, Apple admitted that its mobile phone can not be user consent to collect user information, make people particularly insecure. In this case, both enterprises and individual consumers urgently need to create an enterprise-class large data security platform to protect their privacy security.

In fact, many web companies in the Internet field search for cookies and other means to analyze mobile phone user data. In the mobile Internet is also a, casually install a software has access to the user's mobile phone number and network permissions, more malicious software to operate the user's mobile phone, hair deduction, let users complain regret.

In addition to the NSA, companies such as Google and Facebook have not agreed to collect user personal information and share data. Google, for example, is the most popular analytics tool analytics, which companies and governments often use to analyze web traffic. Although popular, users cannot guarantee their data security when they use it. If you use Google Analytics, Google will not only know all visitors to your site, but since most other sites use GA (or other Google products), Google also knows, for example, 19 other sites that visited at some point last month.

With more than 60% of Web sites using Google Analytics, Google advertising alliances or other products that Google can track to, Google can build a huge database to accurately analyze and locate users.

For the user, the data stored in the other server, itself represents a kind of collateral, because the other party want to take use without any application, the user is helpless, so the protection of privacy can not talk about. The author has several suggestions:

First, the use of anonymous IP address, prohibit Web site collection and tracking, cookies, do not use respect for Donottrack request browser.

Second, encrypting your data, Zettaset's modularity is specifically designed to handle Apache open source applications, for Hadoop or NoSQL databases, giving customers maximum flexibility. Its data-at-rest encryption technology is based on the KMIP (Key Management Protocol) and the PKCS (public key encryption Standard) standard design. Of course this is mainly for enterprise-level users, for individual users, when you upload a private file to the network, it is best to compress the time to set up a cryptographic password, which will undoubtedly let your data more than a lock.

Third, refusing unreasonable permission requirements, this is mainly for mobile phone users, now mobile applications, especially the domestic software its permission requirements are simply lion mouth, what permissions are required to give, completely do not put the user in the eye, so that some of the garbage software in the background to run also affect the performance of mobile phones and user experience. In the Xposed module, there is an app seting application that can effectively limit unnecessary software permissions.

Four, the use of HTTPS protocol to browse the Web, HTTPS protocol is built by the SSL+HTTP protocol can be encrypted transmission, identity authentication network protocol, than the HTTP protocol security, so that your computer and the server to send and receive information transmission will be more secure.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.