Welcome to Scholar Publishing Group

International Journal of Neural Network, 2026, 5(1); doi: 10.38007/NN.2026.050102.

Research on Big Data Security Governance and Privacy Protection Strategies for Cross-Domain Data Circulation Scenarios

Author(s)

Yongqiang Ma

Corresponding Author:
Yongqiang Ma
Affiliation(s)

School of Computer and Big Data, Jining Normal University, Ulanqab 012000, Inner Mongolia, China

Abstract

In an era of expanding cross-domain data flow, algorithm-driven decision-making, and intelligent services, traditional data security solutions based on boundary protection and static authorization are no longer adequate for the governance needs of the big data era. This article, based on a review of international and industry research reports from recent years, analyzes the increasing cost of data breaches, stricter privacy regulations, the development of privacy-enhancing technologies, and the risks of secondary inference brought about by artificial intelligence. Research indicates that the main contradictions in data security and privacy protection currently lie in the conflict between releasing data value and the principle of minimum necessity, the conflict between the cost of privacy computing and business real-time requirements, and the imbalance between the black box nature of algorithms and accountability. Therefore, this paper proposes a comprehensive strategy system that combines classification and grading, zero-trust access, differential privacy, and federated learning, supported by a trusted execution environment, establishing complete on-chain auditing, and scoring governance capabilities. This research can provide a reference for government agencies, healthcare institutions, financial institutions, and platform enterprises to create data governance systems that balance security, compliance, and business value.

Keywords

Big data; data security; privacy protection; cross-domain data flow; governance strategies

Cite This Paper

Yongqiang Ma. Research on Big Data Security Governance and Privacy Protection Strategies for Cross-Domain Data Circulation Scenarios. International Journal of Neural Network (2026), Vol. 5, Issue 1: 11-21. https://doi.org/10.38007/NN.2026.050102

References

[1] Wu, W. (2025, June). Construction and optimization of intelligent gateway software management platform based on jenkins cluster management under cloud edge integration architecture in industrial internet of things. In International Conference on 6G Communications Networking and Signal Processing (pp. 633-645). Singapore: Springer Nature Singapore.

[2] Hua, X. (2024, November). Design and Implementation of a Game QoE Monitoring and Evaluation System Driven by Network Traffic Analysis. In International Conference on Cognitive based Information Processing and Applications (pp. 149-161). Singapore: Springer Nature Singapore.

[3] Huang, J. (2025, September). Performance Evaluation Index System and Engineering Best Practice of Production-Level Time Series Machine Learning System. In 2025 International Conference on Intelligent Communication Networks and Computational Techniques (ICICNCT) (pp. 01-07). IEEE.

[4] Sun, Q. (2026). Research on a Robotic Natural Language Intelligent Decision-Making Framework Based on Large Language Models, Thinking Chain Reasoning, and Multi-Agent Collaboration.

[5] Wang, Y. (2026). Research on the Application of Artificial Intelligence in Supply Chain Risk Early Warning.

[6] Wu, W. (2025, June). Construction and optimization of intelligent gateway software management platform based on jenkins cluster management under cloud edge integration architecture in industrial internet of things. In International Conference on 6G Communications Networking and Signal Processing (pp. 633-645). Singapore: Springer Nature Singapore.

[7] Hua, X. (2024, November). Design and Implementation of a Game QoE Monitoring and Evaluation System Driven by Network Traffic Analysis. In International Conference on Cognitive based Information Processing and Applications (pp. 149-161). Singapore: Springer Nature Singapore.

[8] Huang, J. (2025, September). Performance Evaluation Index System and Engineering Best Practice of Production-Level Time Series Machine Learning System. In 2025 International Conference on Intelligent Communication Networks and Computational Techniques (ICICNCT) (pp. 01-07). IEEE.

[9] Sun, Q. (2026). Research on a Robotic Natural Language Intelligent Decision-Making Framework Based on Large Language Models, Thinking Chain Reasoning, and Multi-Agent Collaboration.

[10] Wang, Y. (2026). Research on the Application of Artificial Intelligence in Supply Chain Risk Early Warning.

[11] Liu, H. (2026). Research on Dynamic Price Prediction of E-commerce Based on Time Series Modeling.

[12] Yu, X. (2026). Strategy Models and Practical Research of Growth Marketing under the Background of Digital Transformation.

[13] Hou, Y. (2026). Research on Server Performance Stability Assurance Mechanisms during Cross-Generation Computing Platform Upgrades.

[14] Han, X. (2026). Research on Process Decision-Making Behavior under Incomplete Information Conditions in Automobile Manufacturing Systems.

[15] Han, X. (2026). Research on Automotive Manufacturing Process Optimization Methods for Multi-Supplier Collaboration.

[16] Yu, X. (2026). Exploration of Multi-Channel Conversion Path Optimization Methods Based on A/B Testing.

[17] Zheng, H. (2026). Research on Edge Computing Network Task Scheduling and Resource Management Optimization Based on Artificial Intelligence Technology.

[18] Zhang, Z. (2026). Research on the Design of Scalable Enterprise-Level AI Systems Data Platform Architectures from an SDE Perspective.

[19] Xiao Ma. Engineering Study of Disaster Recovery and Fault Self-Healing Mechanisms for Distributed Systems under Cross-Regional Deployment Conditions. International Journal of Engineering Technology and Construction (2026), Vol. 7, Issue 1: 1-7.

[20] Zheng, H. (2026). Research on Edge Computing Deep Neural Network Task Unloading Based on Resource Collaboration Framework and Multi Strategy Optimization.

[21] Zinuo Wang. Value Reassessment Logic of Resource-Based Enterprises in the Context of Energy Transition. International Journal of Social Sciences and Economic Management (2026), Vol. 7, Issue 1: 141-149.

[22] Weiyao Ma. Automated Operation Approach for Scalable Cloud Data Platform. International Journal of Big Data Intelligent Technology (2026), Vol. 7, Issue 1: 131-139.

[23] Zelin Wang. Data Analysis and Risk in Supply Chain Management. International Journal of Social Sciences and Economic Management (2026), Vol. 7, Issue 1: 132-140.

[24] Truong, T. H. (2025). Research on the Application of Digital Healthcare Platforms in Chronic Disease Management. Advances in Computer and Communication, 6(5).

[25] Ye, J. (2025). Optimization of Neural Motor Control Model Based on EMG Signals. International Journal of Engineering Advances, 2(4), 1-8.

[26] Ye, J. (2025). Design of a Non-Invasive Brain Computer Interface System for Handwritten Text Based on L2 Regularization and Attention Supervision Paradigm, and Optimization of EEG Signal Decoding. International Journal of Big Data Intelligent Technology, 2025, 6 (1), 126, 134.

[27] Yin, J. (2026). Research on a CLO Secondary Market Spread Volatility Prediction Model Based on RoBERTa Sentiment Factors. Advances in Computer and Communication, 7(1).

[28] Liu, H. (2025). Research on the Application of Sentiment Analysis in Customer Segmentation and Precision Marketing. Advances in Computer and Communication, 6(4).

[29] Liu, H. (2025). Research on the Evaluation of User Safety Intervention Measures Based on Causal Inference. Engineering Advances, 5(4).

[30] Wang, B. (2025). Research on Load Balancing Technology in Distributed System Architecture. International Journal of Multimedia Computing (2025), 6(1), 152-159.

[31] Wang, B. (2025). Application of Efficient Load Test Strategies in Infrastructure. Journal of Computer, Signal, and System Research, 2(4), 69-75.