pisco_log
banner

Intelligent Data Mining and Deep Learning Techniques for Enhancing Financial Data Security and Privacy in Cloud Computing

Jieting Lian

Abstract


With the wide application of cloud computing technology in the financial field, the confidentiality and security of financial data
are facing an unprecedented test. It is suggested to combine intelligent data mining with deep learning technology to improve the security
and privacy protection level of financial data in the cloud computing environment. Combining differential privacy and data encryption
and a deep learning model for data recovery and anomaly detection. After experimental verification, the differential privacy technology
significantly reduces the accuracy of data recovery on the premise of ensuring privacy security. Meanwhile, the deep learning model improves the accuracy of anomaly detection (92%) and reduces the possibility of false positives (2%). Although the computational cost of
the model has increased, the method can significantly enhance the protection performance of financial data privacy on the basis of ensuring high security.

Keywords


Cloud computing; Financial data; Privacy protection; Deep learning

Full Text:

PDF

Included Database


References


[1] Zheng Baohong. Research on Financial Data Security and Regulation under the Background of Digital Finance [J]. Fintech Era, 2024,

32 (04): 69-73.

[2] Zhang Yangjun, Yang Ping. Financial Data Security: Strategies and Practices to Address Emerging Technological Challenges [J]. Network Security and Data Governance, 2023, 42 (09): 6-10 + 20.

[3] Hou Peng, Li Zhixin, Zhang Fei, et al. Intelligent technology and practice of financial data security governance [J]. Journal of Network

and Information Security, 2023, 9 (03): 174-187.

[4] Li Fan. Application and utility research of bank data mining [D]. Wuhan University, 2012.

[5] Du Qian. Research and design of data distribution and storage system for financial Information cloud Platform [D]. Beijing University

of Posts and Telecommunications, 2012.




DOI: http://dx.doi.org/10.70711/aitr.v2i9.6860

Refbacks

  • There are currently no refbacks.