Return to Article Details Preserving Privacy using Column Masking and Data Encryption Techniques Download Download PDF