Open Access   Article Go Back

Preserving Privacy using Column Masking and Data Encryption Techniques

Lakshmi B1 , Ravindra Babu H2 , Murali Krishna A3

Section:Research Paper, Product Type: Journal Paper
Volume-4 , Issue-6 , Page no. 136-141, Jun-2016

Online published on Jul 01, 2016

Copyright © Lakshmi B, Ravindra Babu H , Murali Krishna A . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Lakshmi B, Ravindra Babu H , Murali Krishna A, “Preserving Privacy using Column Masking and Data Encryption Techniques,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.6, pp.136-141, 2016.

MLA Style Citation: Lakshmi B, Ravindra Babu H , Murali Krishna A "Preserving Privacy using Column Masking and Data Encryption Techniques." International Journal of Computer Sciences and Engineering 4.6 (2016): 136-141.

APA Style Citation: Lakshmi B, Ravindra Babu H , Murali Krishna A, (2016). Preserving Privacy using Column Masking and Data Encryption Techniques. International Journal of Computer Sciences and Engineering, 4(6), 136-141.

BibTex Style Citation:
@article{B_2016,
author = {Lakshmi B, Ravindra Babu H , Murali Krishna A},
title = {Preserving Privacy using Column Masking and Data Encryption Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2016},
volume = {4},
Issue = {6},
month = {6},
year = {2016},
issn = {2347-2693},
pages = {136-141},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=981},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=981
TI - Preserving Privacy using Column Masking and Data Encryption Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - Lakshmi B, Ravindra Babu H , Murali Krishna A
PY - 2016
DA - 2016/07/01
PB - IJCSE, Indore, INDIA
SP - 136-141
IS - 6
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1512 1360 downloads 1533 downloads
  
  
           

Abstract

Information Technology plays an important role in Multi-National corporations with thousands of computer systems to small business organizations with a single system. Every business organization maintains IT Sector which is charged with maintaining and monitoring information. As rapid increase in information technology and omnipresent of internet has caused information breaches to grow faster. An information breach is a security incident in which confidential data of the organization has been stolen and used by unauthorized personnel. Information breaches may involve financial, personal information such as credit card or bank details, personal identification details, health insurance details and trade secret information of organizations. So protecting such confidential data has become a vital and integral part of each and every organization. This paper deals with security breaches, vulnerabilities in information systems and demonstrates security with column masking and data encryption techniques.

Key-Words / Index Term

Data Masking, Column Masking and Data Encryption

References

[1] B. Lakshmi, K. Parish Venkata Kumar, A. Shahnaz Banu and K. Anji Reddy, “Data Confidentiality and Loss Prevention using Virtual Private Database.”, International Journal on Computer Science and Engineering (IJCSE) ISSN : 0975-3397 Vol. 5 No. 03 Mar 2013 143.
[2] Ravikumar G K, Manjunath T N, Ravindra S Hegadi, Umesh I M, “A Survey on Recent Trends, Process and Development in Data Masking for Testing” IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 2, March 2011.
[3] Ajayi, Olusola Olajide, Adebiyi, Termidayo Olarewaju, “ Application of Data Masking in Achieving Information Privacy” IOSR Journal of Engineering, ISSN (e): 2250-3021, ISSN (p): 2278-8719, Vol. 04, Issue 02 (February. 2014), ||V1|| PP 13-21.
[4] Insiders Behaving Badly, IEEE Security & Privacy (Volume:6 , Issue: 4 )
[5] A Review on Database Security, International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064
[6] http://spdp.di.unimi.it/papers/wiley.pdf
[7] http://www.cse.hcmut.edu.vn/~c503002/Files/TRUONGQuynhChi/Slides/Chap9_DBS.pdf
[8] https://www.dtc.umn.edu/umssia/resources/day7a_08.pdf
[9] Emil Burtescu, “Database Security - Attacks And Control Methods”, Journal of Applied Quantative Methods http://www.jaqm.ro/issues/volume-4,issue-4/pdfs/burtescu.pdf