Advances in Economics, Management and Political Sciences
- The Open Access Proceedings Series for Conferences
Series Vol. 41 , 10 November 2023
* Author to whom correspondence should be addressed.
Financial Big Data is a contentious topic that needs to be addressed because it is having an increasingly negative impact on people's everyday lives, work habits, and thought patterns. The leakage of financial big data is just one of the issues that financial big data is now dealing with. As a result, the study focus of this work is on the data security problems and solutions related to financial big data. This paper summarizes four main categories of data security issues related to financial big data: attacks on financial big data, data leaks related to financial big data, issues with the reliability of financial big data, and issues with access control related to financial big data. Based on these four problem categories, it searches the literature and organizes the suggested solutions as follows: pay attention to the development of financial data security systems in a big data environment, strengthen education and training, increase the da-ta security awareness of various roles, optimize the processing of big data, and strengthen the storage security of big data by strict user access control. This paper's thought and research also reveal that while financial big data does provide data security issues, it also serves as the primary means of addressing the issue itself. Less research has been done on using financial big data as a countermeasure in and of itself. In the future, we should focus on financial big data itself and explore ways to use financial big data as a countermeasure to data security problems.
financial big data, data security issues, countermeasures
1. Zhang, B.: The application of big data technology in the financial field and its regulation. Journal of Beijing Vocational College of Economics and Management (01), 16-23+33 (2020).
2. Lu, S.; Financial big data security risks and countermeasures. Financial technology era (01),68-69 (2015).
3. Zhang, H. J.: Research on the application of big data in the financial field. Think Tank Times 8(34),175+180 (2018).
4. Wang, J. J.: Challenges and considerations of financial data security under the new situation. Financial technology era (08),53-54+58 (2020).
5. Feng, D. G., Zhang M., Li H.: Big data security and privacy protection. Journal of Computer Science (01), 246-258 (2014).
6. Wu, X. Q., Zhang, Z. N.: Research and practical suggestions on data security construction model for financial industry. China financial computer 2(12),86-87 (2022).
7. Dong, L. G.: Building data security system to help efficient application of financial data. Financial Electronic (07),39-40 (2021).
8. Dun, H. C.: Thinking about data security under the marketization environment of data elements. China Financial Computer (09),10-13 (2020).
9. Zhou, W., Liu Z.: Data security issues and countermeasures in the era of intelligence. Digital design (11),10-11 (2017).
10. Zhang, D. E., Zhou, Y.: A few thoughts on data security in the big data environment. Cyberspace security (08),17-20 (2016).
11. Sweeney L.: A model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10 (5) ,557-570 (2002).
12. Pease A., Niles I., Li J.: The suggested upper merged ontology: A large ontology for the semantic web and its applications//Proceedings of the AAAI-2002 Workshop on Ontologies and the Semantic Web. Edmonton, Canada1-4 (2002).
The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. Authors who publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See Open Access Instruction).