Preserving Privacy using Column Masking and Data Encryption Techniques
Keywords:
Data Masking, Column Masking and Data EncryptionAbstract
Information Technology plays an important role in Multi-National corporations with thousands of computer systems to small business organizations with a single system. Every business organization maintains IT Sector which is charged with maintaining and monitoring information. As rapid increase in information technology and omnipresent of internet has caused information breaches to grow faster. An information breach is a security incident in which confidential data of the organization has been stolen and used by unauthorized personnel. Information breaches may involve financial, personal information such as credit card or bank details, personal identification details, health insurance details and trade secret information of organizations. So protecting such confidential data has become a vital and integral part of each and every organization. This paper deals with security breaches, vulnerabilities in information systems and demonstrates security with column masking and data encryption techniques.
References
B. Lakshmi, K. Parish Venkata Kumar, A. Shahnaz Banu and K. Anji Reddy, “Data Confidentiality and Loss Prevention using Virtual Private Database.”, International Journal on Computer Science and Engineering (IJCSE) ISSN : 0975-3397 Vol. 5 No. 03 Mar 2013 143.
Ravikumar G K, Manjunath T N, Ravindra S Hegadi, Umesh I M, “A Survey on Recent Trends, Process and Development in Data Masking for Testing” IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 2, March 2011.
Ajayi, Olusola Olajide, Adebiyi, Termidayo Olarewaju, “ Application of Data Masking in Achieving Information Privacy” IOSR Journal of Engineering, ISSN (e): 2250-3021, ISSN (p): 2278-8719, Vol. 04, Issue 02 (February. 2014), ||V1|| PP 13-21.
Insiders Behaving Badly, IEEE Security & Privacy (Volume:6 , Issue: 4 )
A Review on Database Security, International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064
http://spdp.di.unimi.it/papers/wiley.pdf
http://www.cse.hcmut.edu.vn/~c503002/Files/TRUONGQuynhChi/Slides/Chap9_DBS.pdf
https://www.dtc.umn.edu/umssia/resources/day7a_08.pdf
Emil Burtescu, “Database Security - Attacks And Control Methods”, Journal of Applied Quantative Methods http://www.jaqm.ro/issues/volume-4,issue-4/pdfs/burtescu.pdf
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
