Preserving Privacy using Column Masking and Data Encryption Techniques
Lakshmi B1 , Ravindra Babu H2 , Murali Krishna A3
Section:Research Paper, Product Type: Journal Paper
Volume-4 ,
Issue-6 , Page no. 136-141, Jun-2016
Online published on Jul 01, 2016
Copyright © Lakshmi B, Ravindra Babu H , Murali Krishna A . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Lakshmi B, Ravindra Babu H , Murali Krishna A, “Preserving Privacy using Column Masking and Data Encryption Techniques,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.6, pp.136-141, 2016.
MLA Style Citation: Lakshmi B, Ravindra Babu H , Murali Krishna A "Preserving Privacy using Column Masking and Data Encryption Techniques." International Journal of Computer Sciences and Engineering 4.6 (2016): 136-141.
APA Style Citation: Lakshmi B, Ravindra Babu H , Murali Krishna A, (2016). Preserving Privacy using Column Masking and Data Encryption Techniques. International Journal of Computer Sciences and Engineering, 4(6), 136-141.
BibTex Style Citation:
@article{B_2016,
author = {Lakshmi B, Ravindra Babu H , Murali Krishna A},
title = {Preserving Privacy using Column Masking and Data Encryption Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2016},
volume = {4},
Issue = {6},
month = {6},
year = {2016},
issn = {2347-2693},
pages = {136-141},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=981},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=981
TI - Preserving Privacy using Column Masking and Data Encryption Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - Lakshmi B, Ravindra Babu H , Murali Krishna A
PY - 2016
DA - 2016/07/01
PB - IJCSE, Indore, INDIA
SP - 136-141
IS - 6
VL - 4
SN - 2347-2693
ER -
VIEWS | XML | |
1512 | 1360 downloads | 1533 downloads |
Abstract
Information Technology plays an important role in Multi-National corporations with thousands of computer systems to small business organizations with a single system. Every business organization maintains IT Sector which is charged with maintaining and monitoring information. As rapid increase in information technology and omnipresent of internet has caused information breaches to grow faster. An information breach is a security incident in which confidential data of the organization has been stolen and used by unauthorized personnel. Information breaches may involve financial, personal information such as credit card or bank details, personal identification details, health insurance details and trade secret information of organizations. So protecting such confidential data has become a vital and integral part of each and every organization. This paper deals with security breaches, vulnerabilities in information systems and demonstrates security with column masking and data encryption techniques.
Key-Words / Index Term
Data Masking, Column Masking and Data Encryption
References
[1] B. Lakshmi, K. Parish Venkata Kumar, A. Shahnaz Banu and K. Anji Reddy, “Data Confidentiality and Loss Prevention using Virtual Private Database.”, International Journal on Computer Science and Engineering (IJCSE) ISSN : 0975-3397 Vol. 5 No. 03 Mar 2013 143.
[2] Ravikumar G K, Manjunath T N, Ravindra S Hegadi, Umesh I M, “A Survey on Recent Trends, Process and Development in Data Masking for Testing” IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 2, March 2011.
[3] Ajayi, Olusola Olajide, Adebiyi, Termidayo Olarewaju, “ Application of Data Masking in Achieving Information Privacy” IOSR Journal of Engineering, ISSN (e): 2250-3021, ISSN (p): 2278-8719, Vol. 04, Issue 02 (February. 2014), ||V1|| PP 13-21.
[4] Insiders Behaving Badly, IEEE Security & Privacy (Volume:6 , Issue: 4 )
[5] A Review on Database Security, International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064
[6] http://spdp.di.unimi.it/papers/wiley.pdf
[7] http://www.cse.hcmut.edu.vn/~c503002/Files/TRUONGQuynhChi/Slides/Chap9_DBS.pdf
[8] https://www.dtc.umn.edu/umssia/resources/day7a_08.pdf
[9] Emil Burtescu, “Database Security - Attacks And Control Methods”, Journal of Applied Quantative Methods http://www.jaqm.ro/issues/volume-4,issue-4/pdfs/burtescu.pdf