International Journal of Neural Network, 2025, 4(1); doi: 10.38007/NN.2025.040101.
Yantao Tao
School of Artificial Intelligence, Jingchu University of Technology, Jingmen 448000, Hubei, China
In the context of big data, trajectory data, as an important resource in areas such as location services, urban planning, and business analysis, continues to expand its collection and application scope. However, sensitive information such as user behavior characteristics and social relationships contained in it can easily be uniquely identified through a few location points, leading to privacy leakage risks. Existing protection technologies (such as encryption and anonymization) have problems of being cracked or data distortion, while the integration of differential privacy, 5G edge computing and artificial intelligence provides a new path to balance privacy and availability. This research focuses on the privacy protection of trajectory data throughout its life cycle, and proposes two innovative mechanisms: first, the trajectory differential privacy protection mechanism (5GMEC-DP) based on 5G mobile edge computing improves the Geo Indistinguishability method through the client coordinate differential privacy algorithm and the MEC server truncation mechanism. When the privacy budget ε=0.001 and ε=0.0005, the average availability (AQ) of trajectory coordinates decreases by 64% and 81% respectively compared with the traditional methods, and the overall database availability loss (HD) decreases by 64% and 82%; Secondly, based on the LSTM-GAN trajectory data differential privacy publishing mechanism (LGAN-DP), combined with deep learning models to generate synthetic trajectories and apply differential privacy processing result sets, its HD index is improved by 40% to 50% compared to existing methods, and its time complexity is lower. In addition, a trajectory privacy protection and publishing system has been developed that integrates modules such as visualization, encryption, and caching. Currently, the system focuses on location encryption and trajectory publishing, and plans to expand modules such as peripheral recommendation and travel prediction in the future. Through the integration of 5G edge computing and deep learning model, this research provides an efficient and scalable technical solution for track data privacy protection, which significantly improves the balance between privacy and availability compared with traditional methods.
Big data security, track privacy protection, differential privacy technology, 5G edge computing, deep learning model
Yantao Tao. Research on Computer Network Information Security and Protection under the Background of Big Data. International Journal of Neural Network (2025), Vol. 4, Issue 1: 1-11. https://doi.org/10.38007/NN.2025.040101.
[1] Chen, X. (2025). Research on the Application of Multilingual Natural Language Processing Technology in Smart Home Systems. Journal of Computer, Signal, and System Research, 2(5), 8-14.
[2] Yue X, Research on User Feedbak and Improvemet Mechanisms in Enterprise Social Media Pplication [J]. International Journal of Finance and Investment, 2025, 2(2): 25-28.
[3] Pan Y. Research on Cloud Storage Data Access Control Based on the CP-ABE Algorithm[J]. Pinnacle Academic Press Proceedings Series, 2025, 2: 122-129.
[4] Xiu L. Analyses of Online Learning Behaviour Based on Linear Regression Algorithm[C]//2025 IEEE International Conference on Electronics, Energy Systems and Power Engineering (EESPE). IEEE, 2025: 1333-1338.
[5] Pan Y. Research on the Design of a Real-Time E-Commerce Recommendation System Based on Spark in the Context of Big Data[C]//2025 IEEE International Conference on Electronics, Energy Systems and Power Engineering (EESPE). IEEE, 2025: 1028-1033.
[6] Yan J. Research on Application of Big Data Mining and Analysis in Image Processing[J]. Pinnacle Academic Press Proceedings Series, 2025, 2: 130-136.
[7] Xiu L. Research on the Design of Modern Distance Education System Based on Agent Technology[J]. Pinnacle Academic Press Proceedings Series, 2025, 2: 160-169.
[8] Hui, X. (2025). Research on Improving the Matching Efficiency between Cancer Patients and Clinical Trials Based on Machine Learning Algorithms. Journal of Medicine and Life Sciences, 1(3), 74-80.
[9] Chen A. Research on the Demand Hierarchy of E-Commerce Products Based on Text Mining and the IPA-KANO Model[J]. Pinnacle Academic Press Proceedings Series, 2025, 2: 153-159.
[10] Guo, Xingwen. “Study on the New Path of Chinese Commercial Banks' Globalization Development.” International Journal of Global Economics and Management (2024): 5(1),152-157.
[11] Fu, Yilin. "Design and Empirical Analysis of Financial Quantitative Trading Model based on VMD-DCNN-SGRU Architecture and Integrated System." In 2025 4th International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE), pp. 1-7. IEEE, 2025.
[12] Xu, Yue. “Research on Software Development Amd Design of Computer Network Automatic Detection and Control System.” Scientific Journal of Technology (2025): 7(3),77-83
[13] Zhou, Yixin. "Design and Implementation of Online Log Anomaly Detection Model based on Text CM and Hierarchical Attention Mechanism." In 2025 4th International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE), pp. 1-6. IEEE, 2025.
[14] Jiang, Yixian. "Research on Random Sampling Data Diffusion Technique in the Construction of Digital Object System Test Dataset." In 2025 4th International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE), pp. 1-6. IEEE, 2025.
[15] Tu, Xinran. "Feature Selection and Classification of Electronic Product Fault Short Text by Integrating TF-IDF and Wor D2vec." In 2025 4th International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE), pp. 1-6. IEEE, 2025.
[16] Ma, Zhuoer. "Research and Development of Financial Contract Text Information Extraction System based on M-BiLSTM and Our-M Models." In 2025 4th International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE), pp. 1-7. IEEE, 2025.
[17] Yuan S. Design and Optimization of Network Security Situation Awareness Algorithm for Generative Adversarial Networks Targeting Attack Data and Traffic [C]//2025 4th International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE). IEEE, 2025: 1-6.
[18] Wei Z. Construction of Supply Chain Finance Game Model Based on Blockchain Technology and Nash Equilibrium Analysis[J]. Procedia Computer Science, 2025, 262: 901-908.
[19] Lai L. Research and Design of Data Security Risk Assessment Model Based on Fusion of Deep Learning and Analytic Hierarchy Process (AHP)[J]. Procedia Computer Science, 2025, 262: 747-756.
[20] Jiang Y. Research on the Optimization of Digital Object System by Integrating Metadata Standard and Machine Learning Algorithm[J]. Procedia Computer Science, 2025, 262: 849-858.
[21] An C. Research on High Frequency Financial Transaction Data Modeling and Cloud Computing Implementation Based on SSA-GA-BP Model[J]. Procedia Computer Science, 2025, 262: 859-867.
[22] Zhang X. Optimization and Implementation of Time Series Dimensionality Reduction Anti-fraud Model Integrating PCA and LSTM under the Federated Learning Framework[J]. Procedia Computer Science, 2025, 262: 992-1001.
[23] Wang C. Research on Modeling and Forecasting High-Frequency Financial Data Based on Histogram Time Series[J]. Procedia Computer Science, 2025, 262: 894-900.
[24] Huang, Jiangnan. "Online Platform user Behavior Prediction and Decision Optimization based on Deep Reinforcement Learning." In 2025 4th International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE), pp. 1-6. IEEE, 2025.
[25] Wei X. Research on Preprocessing Techniques for Software Defect Prediction Dataset Based on Hybrid Category Balance and Synthetic Sampling Algorithm[J]. Procedia Computer Science, 2025, 262: 840-848.
[26] Pan H. Design and Implementation of a Cloud Computing Privacy-Preserving Machine Learning Model for Multi-Key Fully Homomorphic Encryption[J]. Procedia Computer Science, 2025, 262: 887-893.
[27] Cai Y. Design and Implementation of a Cross Platform i0s Application Development Framework Based on YAI Configuration Files[J]. Procedia Computer Science, 2025, 262: 939-947.
[28] Pan Y. Research on Enterprise Data Security Protection Technology on Cloud Platforms[J]. European Journal of AI, Computing & Informatics, 2025, 1(2): 30-36.
[29] Yan J. Analysis and Application of Spark Fast Data Recommendation Algorithm Based on Hadoop Platform[C]//2025 Asia-Europe Conference on Cybersecurity, Internet of Things and Soft Computing (CITSC). IEEE, 2025: 872-876.
[30] Hao, Linfeng. "Research on Automatic Driving Road Object Detection Algorithm Integrating Multi Scale Detection and Boundary Box Regression Optimization." In 2025 4th International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE), pp. 1-6. IEEE, 2025.
[31] Guo Y. Research on Investment Bank Risk Monitoring and Early Warning Model Combining Factor Analysis and Artificial Neural Network[J]. Procedia Computer Science, 2025, 262: 878-886.
[32] Varatharajah, Y., Chen, H., Trotter, A., & Iyer, R. K. (2020). A Dynamic Human-in-the-loop Recommender System for Evidence-based Clinical Staging of COVID-19. In HealthRecSys@ RecSys (pp. 21-22).
[33] Chen, H., Zhu, Y., Zuo, J., Kabir, M. R., & Han, A. (2024). TranSpeed: Transformer-based Generative Adversarial Network for Speed-of-sound Reconstruction in Pulse-echo Mode. In 2024 IEEE Ultrasonics, Ferroelectrics, and Frequency Control Joint Symposium (UFFC-JS) (pp. 1-4). IEEE.
[34] Chen, H., Yang, Y., & Shao, C. (2021). Multi-task learning for data-efficient spatiotemporal modeling of tool surface progression in ultrasonic metal welding. Journal of Manufacturing Systems, 58, 306-315.
[35] Chen, H., Wang, Z., & Han, A. (2024). Guiding Ultrasound Breast Tumor Classification with Human-Specified Regions of Interest: A Differentiable Class Activation Map Approach. In 2024 IEEE Ultrasonics, Ferroelectrics, and Frequency Control Joint Symposium (UFFC-JS) (pp. 1-4). IEEE.
[36] Liu Y. The Latest Application and Security Analysis of Cryptography in Cloud Storage Data Audit[J]. Procedia Computer Science, 2025, 259: 984-990.
[37] Zhang M. Design of Object Segmentation and Feature Extraction Based On Deep Learning for AFM Image Processing and Analysis System[J]. Procedia Computer Science, 2025, 262: 982-991.
[38] Yang, D., & Liu, X. (2025). Research on Large-Scale Data Processing and Dynamic Content Optimization Algorithm Based On Reinforcement Learning. Procedia Computer Science, 261, 458-466.
[39] Cui N. Research and Application of Traffic Simulation Optimization Algorithm Based on Improved Road Network Topology Structure[C]//The International Conference on Cyber Security Intelligence and Analytics. Springer, Cham, 2025: 156-163.
[40] Zhang J. Design and Implementation of a Fuzzy Testing Framework for Hyper-V Virtualization Engine Based on Nested Virtualization and Coverage Orientation[C]//The International Conference on Cyber Security Intelligence and Analytics. Springer, Cham, 2025: 176-183.
[41] Chen, H., Zuo, J., Zhu, Y., Kabir, M. R., & Han, A. (2024). Polar-Space Frequency-Domain Filtering for Improved Pulse-echo Speed of Sound Imaging with Convex Probes. In 2024 IEEE Ultrasonics, Ferroelectrics, and Frequency Control Joint Symposium (UFFC-JS) (pp. 1-4). IEEE.
[42] Shen, D. (2025). AI-Driven Clinical Decision Support Optimizes Treatment Accuracy for Mental Illness. Journal of Medicine and Life Sciences, 1(3), 81-87.
[43] Yang D, Liu X. Collaborative Algorithm for User Trust and Data Security Based on Blockchain and Machine Learning[J]. Procedia Computer Science, 2025, 262: 757-765.
[44] Shi, Chongwei. “Genetic DNA Testing: Current Applications and Future Prospects.” Frontiers in Business, Economics and Management (2024): 17(1),10-13
[45] Ren B. Research Progress of Content Generation Model Based on EEG Signals[J]. Journal of Computer, Signal, and System Research, 2025, 2(4): 97-103.