Preserving Privacy using Column Masking and Data Encryption Techniques

Authors

  • Lakshmi B Department of Computer Applications, V.R.S.E.C, Vijayawada -7, Andhra Pradesh, India
  • Ravindra Babu H IT company, Bangalore, India
  • Krishna M Department of Electronics and Communications, RVR & JC College of Engineering, Andhra Pradesh, India

Keywords:

Data Masking, Column Masking and Data Encryption

Abstract

Information Technology plays an important role in Multi-National corporations with thousands of computer systems to small business organizations with a single system. Every business organization maintains IT Sector which is charged with maintaining and monitoring information. As rapid increase in information technology and omnipresent of internet has caused information breaches to grow faster. An information breach is a security incident in which confidential data of the organization has been stolen and used by unauthorized personnel. Information breaches may involve financial, personal information such as credit card or bank details, personal identification details, health insurance details and trade secret information of organizations. So protecting such confidential data has become a vital and integral part of each and every organization. This paper deals with security breaches, vulnerabilities in information systems and demonstrates security with column masking and data encryption techniques.

References

B. Lakshmi, K. Parish Venkata Kumar, A. Shahnaz Banu and K. Anji Reddy, “Data Confidentiality and Loss Prevention using Virtual Private Database.”, International Journal on Computer Science and Engineering (IJCSE) ISSN : 0975-3397 Vol. 5 No. 03 Mar 2013 143.

Ravikumar G K, Manjunath T N, Ravindra S Hegadi, Umesh I M, “A Survey on Recent Trends, Process and Development in Data Masking for Testing” IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 2, March 2011.

Ajayi, Olusola Olajide, Adebiyi, Termidayo Olarewaju, “ Application of Data Masking in Achieving Information Privacy” IOSR Journal of Engineering, ISSN (e): 2250-3021, ISSN (p): 2278-8719, Vol. 04, Issue 02 (February. 2014), ||V1|| PP 13-21.

Insiders Behaving Badly, IEEE Security & Privacy (Volume:6 , Issue: 4 )

A Review on Database Security, International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064

http://spdp.di.unimi.it/papers/wiley.pdf

http://www.cse.hcmut.edu.vn/~c503002/Files/TRUONGQuynhChi/Slides/Chap9_DBS.pdf

https://www.dtc.umn.edu/umssia/resources/day7a_08.pdf

Emil Burtescu, “Database Security - Attacks And Control Methods”, Journal of Applied Quantative Methods http://www.jaqm.ro/issues/volume-4,issue-4/pdfs/burtescu.pdf

Downloads

Published

2025-11-11

How to Cite

[1]
B. Lakshmi, H. Ravindra Babu, and M. Krishna, “Preserving Privacy using Column Masking and Data Encryption Techniques”, Int. J. Comp. Sci. Eng., vol. 4, no. 6, pp. 136–141, Nov. 2025.

Issue

Section

Research Article