CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

A Robust Approach to Secure Structured Sensitive Data using Non-Deterministic Random Replacement Algorithm

by Ruby Bhuvan Jain, Manimala Puri, Umesh Jain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 179 - Number 50
Year of Publication: 2018
Authors: Ruby Bhuvan Jain, Manimala Puri, Umesh Jain
10.5120/ijca2018917306

Ruby Bhuvan Jain, Manimala Puri, Umesh Jain . A Robust Approach to Secure Structured Sensitive Data using Non-Deterministic Random Replacement Algorithm. International Journal of Computer Applications. 179, 50 ( Jun 2018), 17-21. DOI=10.5120/ijca2018917306

@article{ 10.5120/ijca2018917306,
author = { Ruby Bhuvan Jain, Manimala Puri, Umesh Jain },
title = { A Robust Approach to Secure Structured Sensitive Data using Non-Deterministic Random Replacement Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2018 },
volume = { 179 },
number = { 50 },
month = { Jun },
year = { 2018 },
issn = { 0975-8887 },
pages = { 17-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume179/number50/29515-2018917306/ },
doi = { 10.5120/ijca2018917306 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:58:50.416635+05:30
%A Ruby Bhuvan Jain
%A Manimala Puri
%A Umesh Jain
%T A Robust Approach to Secure Structured Sensitive Data using Non-Deterministic Random Replacement Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 179
%N 50
%P 17-21
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The first list of Jan 2018 is one of the longest lists, with a count of 7,073,069cases, which include Cyber attacks & ransom ware, Data breaches, financial information, and others.Security and risk management leaders should use data masking to desensitize or protect sensitive data and address the changing threat and compliance landscape. Masking is a philosophy or new way of thinking about safeguarding sensitive data in such a way that accessible and usable data is still available for non- production environment. In this research paper authors proposed a dynamic data masking model to protect sensitive data using non-deterministic randomreplacement algorithm. This paper contains comparative analysis of proposed model with existing masking methods and result shows that proposed model is would be superior in terms of sensitive data discovery, dynamic data masking and data security.

References
  1. Oracle leads gartner’s data masking technology available on http://www.firstpost.com/business/biztech/oracle-leads-gartners-data-masking-technology-quadrant-1892231.html
  2. Report on data masking Tools available on https://www.bloorresearch.com/research/data-masking-2017/
  3. S. Moro, P. Cortez and P. Rita. A Data-Driven Approach to Predict the Success of Bank Telemarketing. Decision Support Systems, Elsevier, 62:22-31, June 2014
  4. S. Moro, Machine learning repository, bank marketing dataset, available on http://archive.ics.uci.edu/ml/machine-learning-databases/00222/
  5. Asha Kiran Grandhi, Manimala Puri, S. Srinivasa Suresh, Application of PSO Optimization Technique on Medical Data to uphold data privacy, proceedings of 67th IASTEM international conference, Dubai, UAE, 1st-2nd august 2017
  6. Ravikumar G K, Dr. B. Justus Rabi, Manjunath T. N, Dr.Ravindra S. Hegadi, Archana.R.A,Design of Data Masking Architecture and Analysis of Data Masking Techniques for Testing, International Journal of Engineering Science and Technology (IJEST) Vol. 3 No. 6 June 2011, ISSN : 0975-5462
  7. Oracle White Paper—Data Masking Best Practices JULY 2013
  8. Ruby Bhuvan Jain, Dr. Manimala Puri, Umesh Jain, An Approach To Safeguard Sensitive Data Using Shift Left Masking Model, 978-1-5386-4304-4/18/$31.00 ©2018
  9. Adrian Lane (2012). Understanding and Selecting Data Masking Solutions: Creating Secure and Useful Data, Securosis Version 1.0, August 10, 2012
  10. Ruby Bhuvan Jain, Dr. Manimala Puri, Umesh Jain, A Robust Dynamic Data Masking Transformation approach To Safeguard Sensitive Data, International Journal on Future Revolution in Computer Science & Communication Engineering, Volume: 4 Issue: 2 ISSN: 2454-4248.
  11. XiaolingXia ,Qiang Xiao and Wei Ji (2012). An Efficient Method to Implement Data Private Protection for dynamic Numerical Sensitive Attributes, The 7th International Conference on Computer Science & Education (ICCSE 2012) July 14-17, 2012. Melbourne, Australia.
  12. Waleed Ahmed, Jagan Athreya (2013). Data Masking Best Practices- white paper
  13. Kamlesh Kumar Hingwe, S. Mary SairaBhanu (2014). Sensitive Data Protection of DBaaS using OPE and FPE, 2014 Fourth International Conference of Emerging Applications of Information Technology, 978-1-4799-4272-5/14 $31.00 © 2014 IEEE DOI 10.1109/EAIT.2014.22 pg no. 320-327
  14. Muralidhar, K. and R.Sarathy,(1999). Security of Random Data Perturbation Methods, ACM Transactions on Database Systems, 24(4), 487-493.
  15. S. Vijayarani, Dr. A. Tamilarasi (2011). An Efficient Masking Technique for Sensitive Data Protection, IEEE-International Conference on Recent Trends in Information Technology, ICRTIT 2011 978-1-4577-0590-8/11/$26.00 ©2011 IEEE, MIT, Anna University, Chennai. June 3-5, 2011
  16. Data Masking: What You Need to Know What You Really Need To Know Before You Begin A Net 2000 Ltd. White Paper.
Index Terms

Computer Science
Information Sciences

Keywords

Data Discovery Sensitivity Diligence File Testing Integration Security Integration.