Academic Journals Database
Disseminating quality controlled scientific knowledge

Experimental Study of Various Data Masking Techniques with Random Replacement using Data Volume

Author(s): Ravikumar G K | B. Justus Rabi | Ravindra S. Hegadi | Manjunath T.N | Archana R A

Journal: International Journal of Computer Science and Information Security
ISSN 1947-5500

Volume: 9;
Issue: 8;
Start page: 154;
Date: 2011;
Original page

Keywords: Data Masking | Shuffling | Substitution | Testing | Random Replacement

Data masking is the process of protecting sensitive data from thefts and hackers. The main objective is to protect the privacy of individuals and security of society which is becoming crucial for effective function over the internet. Privacy enforcement today is being handled primarily through governments legally. We aim to provide uniform data masking architecture for masking the sensitive data like finance, retail, insurance securities etc. For development or testing purposes and study of various data masking techniques for different applications and their comparison study using statistical parameters. In this paper, we study the comparison of various data masking techniques using data samples for analysis. The results strongly suggest random replacement method can be used across the domains starting from critical businesses like finance, banking and securities...etc. We have proposed an algorithm for random replacement. As the advent of onsiteoffshore business model has resulted in security of sensitive data concerns on the part of the clients storing data with third party database service providers. No research has done on the comparison study of various data masking techniques which give a comfortable confidence to the customers for off shoring, we have been successful in this direction and have compared the random replacement method with other methods like encryption, shuffling, scrubling, order of masking with respect to sample data patterns and the results strongly emphasize the ‘Random Replacement’ as one of the standard method for data masking with the highest order of security.
Affiliate Program      Why do you need a reservation system?